Troubleshoot Windows Server
Troubleshoot Windows Server
c HOW-TO GUIDE
Active Directory
Group Policy
Networking
c HOW-TO GUIDE
Networking
c HOW-TO GUIDE
High Availability
Virtualization
Containers
User Experience
c HOW-TO GUIDE
Application Management
Printing
Windows Performance
c HOW-TO GUIDE
Performance
Shell Experience
Windows Security
c HOW-TO GUIDE
Windows Security
Management
c HOW-TO GUIDE
Admin Development
c HOW-TO GUIDE
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve Active Directory-related issues. The topics are divided into
subcategories. Browse the content or use the search feature to find relevant content.
Feedback
Was this page helpful? Yes No
This article helps to fix the error c00002e2 or "Choose an option" when Domain
controller does not start.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2737463
Symptoms
A domain controller does not start or does not display the logon screen. After you
restart the domain controller and watch the start process, you notice the following
symptoms, according to your operating system.
1. At startup, the server experiences a Stop error and briefly displays the following
error message:
STOP: c00002e2 Directory Services could not start because of the following
error:
The specified procedure could not be found
Error status: 0xc000007a.
2. The server then switches to the startup menu for recovery or for a regular startup.
At startup, the server switches to the Choose an option menu that offers to continue or
troubleshoot.
Cause
This issue happens because the Active Directory Domain Services role was removed
from a domain controller without first demoting it. Using Dism.exe, Pkgmgr.exe, or
Ocsetup.exe to remove the DirectoryServices-DomainController role will succeed, but
these servicing tools do not validate whether the computer is a domain controller.
Resolution
7 Note
These steps assume that you have other working domain controllers, and you only
want to remove Active Directory Domain Services from this server. If you do not
have other working domain controllers, and this is the only domain controller in the
domain, you must restore an earlier system state backup.
2. Select Directory Services Repair Mode (DSRM), and then log on by using the
DSRM account.
3. Validate that the role was removed. For example, to do it on Windows Server 2008
R2, use the following command:
Console
Console
Console
dcpromo.exe /forceremoval
7. To remove the domain controller metadata, use the ntdsutil.exe or dsa.msc tool.
1. From the Choose an option menu, select Troubleshoot, click Startup Settings, and
then click Restart.
2. Select Directory Services Repair Mode (DSRM), and then log on by using the
DSRM password.
3. Validate that the role was removed. To do it, use the following command:
Console
Console
5. Restart, select Directory Services Restore Mode again, and log on by using the
DSRM account.
PowerShell
Uninstall-AddsDomaincontroller -ForceRemoval
7. To remove the domain controller metadata, use the ntdsutil.exe or dsa.msc tool.
More information
Always use Server Manager or the ServerManager Windows PowerShell module to
remove the Active Directory Domain Services role binaries. These tools validate whether
a server is an active domain controller and do not let you remove critical files.
For more information about how to remove domain controller metadata, go to the
following Microsoft TechNet website:
Clean Up Server Metadata
If it is the only server domain in the domain, do not remove the Active Directory Domain
Services from the server. Instead, restore its system state from the most recent backup.
Feedback
Was this page helpful? Yes No
This article describes how to detect and recover if a Windows Server domain controller
is incorrectly rolled back by using an image-based installation of the operating system.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 875495
7 Note
This article is intended for only technical support agents and IT professionals. If
you're looking for help with a problem, please ask the Microsoft Community .
Summary
This article describes a silent Active Directory replication failure that is caused by an
update sequence number (USN) rollback. A USN rollback occurs when an older version
of an Active Directory database is incorrectly restored or pasted into place.
When a USN rollback occurs, modifications to objects and attributes that occur on one
domain controller do not replicate to other domain controllers in the forest. Because
replication partners believe that they have an up-to-date copy of the Active Directory
database, monitoring and troubleshooting tools such as Repadmin.exe don't report any
replication errors.
Domain Controllers log Directory Services Event 2095 in the Directory Services event log
when they detect a USN rollback. The text of the event message directs administrators
to this article to learn about recovery options.
The most probable cause of this situation is the improper restore of Active
Directory Domain Services on the local domain controller.
User Actions:
The following topics discuss how to detect and recover from a USN rollback in a
Windows Server-based domain controller.
This is one of the scenarios that is covered in Virtualized Domain Controller Deployment
and Configuration.
The following are supported methods that you can use to roll back the contents of
Active Directory:
Use an Active Directory-aware backup and restoration utility that uses Microsoft-
provided and Microsoft-tested APIs. These APIs non-authoritatively or
authoritatively restore a system state backup. The backup that is restored should
originate from the same operating system installation and from the same physical
or virtual computer that is being restored.
Use an Active Directory-aware backup and restoration utility that uses Microsoft
Volume Shadow Copy Service APIs. These APIs back up and restore the domain
controller system state. The Volume Shadow Copy Service supports creating single
point-in-time shadow copies of single or multiple volumes on computers that are
running Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2.
Single point-in-time shadow copies are also known as snapshots. For more
information, search "Volume Shadow Copy Service" in Microsoft Support .
Restore the system state. Evaluate whether valid system state backups exist for this
domain controller. If a valid system state backup was made before the rolled-back
domain controller was incorrectly restored, and if the backup contains recent
changes that were made on the domain controller, restore the system state from
the most recent backup.
Typical behavior that occurs when you restore
an Active Directory-aware system state backup
Windows Server domain controllers use USNs together with the invocation IDs to track
updates that must be replicated between replication partners in an Active Directory
forest.
Source domain controllers use USNs to determine what changes have already been
received by the destination domain controller that is requesting changes. Destination
domain controllers use USNs to determine what changes should be requested from
source domain controllers.
The invocation ID identifies the version or the instantiation of the Active Directory
database that is running on a given domain controller.
When Active Directory is restored on a domain controller by using the APIs and
methods that Microsoft has designed and tested, the invocation ID is correctly reset on
the restored domain controller. domain controllers in the forest receive notification of
the invocation reset. Therefore, they adjust their high watermark values accordingly.
Starting an Active Directory domain controller whose Active Directory database file
was restored (copied) into place by using an imaging program such as Norton
Ghost.
Starting a previously saved virtual hard disk image of a domain controller. The
following scenario can cause a USN rollback:
For more information about the support conditions for domain controllers in
virtual hosting environments, see Things to consider when you host Active
Directory domain controllers in virtual hosting environments.
Even if not intended, each of these scenarios can cause domain controllers to roll back
to an older version of the Active Directory database by unsupported methods. The only
supported way to roll back the contents of Active Directory or the local state of an
Active Directory domain controller is to use an Active Directory-aware backup and
restoration utility to restore a system state backup that originated from the same
operating system installation and the same physical or virtual computer that is being
restored.
Microsoft does not support any other process that takes a snapshot of the elements of
an Active Directory domain controller's system state and copies elements of that system
state to an operating system image. Unless an administrator intervenes, such processes
cause a USN rollback. This USN rollback causes the direct and transitive replication
partners of an incorrectly restored domain controller to have inconsistent objects in
their Active Directory databases.
USN rollback may affect the replication of any object or attribute in any partition. The
most frequently observed side effect is that user accounts and computer accounts that
are created on the rollback domain controller do not exist on one or more replication
partners. Or, the password updates that originated on the rollback domain controller
don't exist on replication partners.
The following steps show the sequence of events that may cause a USN rollback. A USN
rollback occurs when the domain controller system state is rolled back in time using an
unsupported system state restoration.
3. A disk image of an operating system is captured on DC1. This image has a record
of objects that correspond to local USNs 1 through 10 on DC1.
The passwords for all 10 user accounts that were created in step 2 are reset
on DC1. These passwords correspond to USNs 11 through 20. All 10 updated
passwords replicate to DC2 and DC3.
10 new user accounts that correspond to USNs 21 through 30 are created on
DC1. These 10 user accounts replicate to DC2 and DC3.
10 new computer accounts that correspond to USNs 31 through 40 are
created on DC1. These 10 computer accounts replicate to DC2 and DC3.
10 new security groups that correspond to USNs 41 through 50 are created
on DC1. These 10 security groups replicate to DC2 and DC3.
Because the operating system image was copied into place, and a supported
method of restoring the system state wasn't used, DC1 continues to use the same
invocation ID that created the initial copy of the database and all changes up to
USN 50. DC2 and DC3 also maintain the same invocation ID for DC1 well as an up-
to-date vector of USN 50 for DC1. (An up-to-date vector is the current status of the
latest originating updates to occur on all domain controllers for a given directory
partition.)
Unless an administrator intervenes, DC2 and DC3 don't inbound replicate the
changes that correspond to local USN 11 through 50 that originate from DC1. Also,
according to the invocation ID that DC2 uses, DC1 already has knowledge of the
changes that correspond to USN 11 to 50. Therefore, DC2 doesn't send those
changes. Because the changes in step 4 do not exist on DC1, logon requests fail
with an "access denied" error. This error occurs either because passwords do not
match or because the account does not exist when the newer accounts randomly
authenticate with DC1.
6. Administrators who monitor replication health in the forest note the following
situations:
User authentication requests for the 10 user accounts that were created in
step 2 occasionally generate an "access denied" or "incorrect password" error.
This error may occur because a password mismatch exists between these user
accounts on DC1 and the accounts on DC2 and DC3. The user accounts that
experience this problem correspond to the user accounts that were created in
step 4. The user accounts and password resets in step 4 didn't replicate to
other domain controllers in the domain.
Although the symptoms that are mentioned in step 6 represent some of the effect that a
USN rollback can have on user and computer accounts, a USN rollback can prevent any
object type in any Active Directory partition from replicating. These object types include
the following:
The existence of domain controllers in the forest and the roles that these domain
controllers hold
7 Note
These roles include the global catalog, relative identifier (RID) allocations, and
operations master roles. (Operations master roles are also known as flexible
single master operations or FSMO.)
The size of the USN hole may represent hundreds, thousands, or even tens of thousands
of changes to users, computers, trusts, passwords, and security groups. (The USN hole is
defined by the difference between the highest USN number that existed when the
restored system state backup was made and the number of originating changes that
were created on the rolled-back domain controller before it was taken offline.)
To prevent unique originating updates to Active Directory from being created on the
incorrectly restored domain controller, the Net Logon service is paused. When the Net
Logon service is paused, user and computer accounts can't change the password on a
domain controller that will not outbound-replicate such changes. Similarly, Active
Directory administration tools will favor a healthy domain controller when they make
updates to objects in Active Directory.
On a domain controller, event messages that resemble the following are recorded if the
following conditions are true:
These events may be captured in the Directory Service event log. However, they may be
overwritten before they're observed by an administrator.
You may suspect that a USN rollback has occurred. However, you don't see the
correlating events in the Directory Service event log. In this scenario, check for the Dsa
Not Writable registry entry. This entry provides forensic evidence that a USN rollback
has occurred.
Registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
Remove the Domain Controller from the domain. To do this, follow these steps:
6. If you are required to, install Active Directory on the stand-alone server again.
You can use the snapshot as a source of a backup. Or you can set the database to
give itself a new invocation ID by using the procedure in the To restore a previous
version of a virtual domain controller VHD without system state data backup
section of Running Domain Controllers in Hyper-V.
References
Things to consider when you host Active Directory domain controllers in virtual
hosting environments
Feedback
Was this page helpful? Yes No
This article discusses the problem where a new event error message is logged if you
don't back up a Windows Server 2003 Service Pack 1 (SP1)-based domain controller in a
given time period that is called the backup latency interval.
Introduction
When you back up a domain controller that is running Microsoft Windows Server 2003
Service Pack 1 (SP1), a new event error message is logged for each writable domain or
application partition that the domain controller hosts. This is true if the partition isn't
backed up in a given time period. The time period is called a backup latency interval.
You can set a registry value to specify this interval in days.
More information
7 Note
The new event error message is not logged until a backup is made on a Windows
Server 2003-based domain controller that is running Windows Server 2003 SP1.
Only Windows Server 2003 SP1-based domain controllers log this event error
message.
The default time period of the backup latency interval is half of the Tombstone Lifetime
(TSL) for logging the event error message on the domain controller. The following list
shows the difference in the default TSL values for a forest that is created on Windows
Server 2003 and a forest that is created on Windows Server 2003 SP1:
By default, the TSL value in Windows Server 2003 is 60 days. Therefore, the event error
message isn't logged until 30 days after the last backup.
By default, the TSL value in new forest created by Windows Server 2003 SP1 is 180 days.
The TSL value is 60 days in all other cases. The event error message in a forest with a
180-day TSL isn't logged until 90 days after the last backup.
7 Note
If you just install Windows Server 2003 SP1 on Windows Server 2003-based
computers, this doesn't increase the TSL to 180 days. The forest must be created on
a server that has Windows Server 2003 SP1 installed at the time that you create it.
For more information, click the following article number to view the article in the
Microsoft Knowledge Base:
216993 Useful shelf life of a system-state backup of Active Directory
Deployment Strategy
The default value for the backup latency interval in a forest that uses the default TSL is
insufficient to correctly warn administrators that partitions aren't being backed up with
sufficient frequency.
In the registry, administrators can specify a value for the Backup Latency Threshold
(days) entry. This provides a simple method to adjust how soon event ID 2089, is logged
if a backup isn't made in a certain time period. Therefore, the time period reflects the
backup strategies of the administrators. This event error message serves as a warning to
administrators that domain controllers aren't being backed up before the TSL expires.
This event error message is also a useful tracking event to monitor applications such as
Microsoft Operations Manager (MOM).
We recommend that you take system state backups that include each forest, domain,
and application partition on at least two computers every day. We also recommend that
you configure this event to occur every other day if a backup isn't made. Third-party
backup programs may use a method that calls the backup API that updates the
attribute. When these programs use this method, it causes the DSA Signature attribute
to be updated.
An event ID 2089 error message is logged in the Directory Service event log when a
partition isn't backed up during the backup latency interval. Only one event error
message is logged each day for each partition that a domain controller hosts. The event
error message is similar to the following:
Directory partition:
DC=domainDC=com
It's recommended that you take a backup as often as possible to recover from
accidental loss of data. However, if you haven't taken a backup since at least the
"backup latency interval" number of days, this message will be logged every day until a
backup is taken. You can take a backup of any replica that holds this partition.
By default the "Backup latency interval" is set to half the "Tombstone Lifetime Interval". If
you want to change the default "Backup latency interval", you could do so by adding the
following registry key.
7 Note
The value of Backup Latency Threshold (days) is a registry entry but not a key as
stated in the event error message. The backup latency interval is half the value of
the TSL of the forest. When this value is reached, the operating system logs event
ID 2089 in the Directory Service event log. This event ID warns administrators to
monitor applications and to make sure that domain controllers are backed up
before the TSL expires. To set the interval that the operating system waits before an
event ID 2089 is logged, use Registry Editor to set the value of the Backup Latency
Threshold (days) entry. To do this, follow these steps:
References
https://blogs.msdn.com/brettsh/archive/2006/02/09/528708.aspx
Feedback
Was this page helpful? Yes No
Summary
Typically, when the last domain controller for a domain is demoted, the administrator
selects the This server is the last domain controller in the domain option in the
DCPromo tool. This procedure removes the domain metadata from Active Directory.
This article describes how to remove domain metadata from Active Directory if this
procedure isn't used, or if all domain controllers are taken offline but not demoted first.
U Caution
The administrator must verify that replication has occurred since the demotion of
the last domain controller before manually removing the domain meta-data. Using
the NTDSUTIL tool improperly can cause partial or complete loss of Active
Directory functionality.
7 Note
If it's changed recently, not all computer may have received this change yet
due to replication.
For more information about FSMO roles, see Active Directory FSMO roles in
Windows.
2. Verify that all servers for the domain have been demoted.
6. Type connections , and then press Enter. This menu is used to connect to the
specific server on which the changes will occur. If the currently logged-on user isn't
a member of the Enterprise Admins group, alternate credentials can be supplied by
specifying the credentials to use before making the connection. To do so, type: set
creds <domainname> <username> <password> , and then press Enter. For a null
8. Type quit , and then press Enter. The Metadata Cleanup menu is displayed.
10. Type list domains , and then press Enter. A list of domains in the forest is
displayed, each with an associated number.
11. Type select domain <number> , and then press Enter, where number is the number
associated with the domain to be removed.
12. Type quit , and then press Enter. The Metadata Cleanup menu is displayed.
13. Type remove selected domain , and then press Enter. You should receive
confirmation that the removal was successful. If an error occurs, see the Microsoft
Knowledge Base for articles on specific error messages.
14. Type quit at each menu to quit the NTDSUTIL tool. You should receive
confirmation that the connection disconnected successfully.
References
For more information about the NTDSUTIL tool, see the Support Tools documentation
located in the Support\Reskit folder on the Windows 2000 CD-ROM. The Help files
included with the Microsoft Windows 2000 Resource Kit contain a Books Online link. You
can click the link for information that describes the NTDSUTIL tool in greater detail.
For more information about removing domain controllers from the domain that you're
attempting to delete, see the following article:
Feedback
Was this page helpful? Yes No
This article provides information on how to restore deleted user accounts and group
memberships in Active Directory.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 840001
Introduction
You can use several methods to restore deleted user accounts, computer accounts, and
security groups. These objects are known collectively as security principals.
The most common method is to enable the AD Recycle Bin feature supported on
domain controllers based on Windows Server 2008 R2 and later. For more information
on this feature including how to enable it and restore objects, see Active Directory
Recycle Bin Step-by-Step Guide.
If this method isn't available to you, the following three methods can be used. In all
three methods, you authoritatively restore the deleted objects, and then you restore
group membership information for the deleted security principals. When you restore a
deleted object, you must restore the former values of the member and memberOf
attributes in the affected security principal.
7 Note
More information
Methods 1 and 2 provide a better experience for domain users and administrators.
These methods preserve the additions to security groups that were made between the
time of the last system state backup and the time the deletion occurred. In method 3,
you don't make individual adjustments to security principals. Instead, you roll back
security group memberships to their state at the time of the last backup.
Most large-scale deletions are accidental. Microsoft recommends that you take several
steps to prevent others from deleting objects in bulk.
7 Note
For example, to protect the organization unit that is called CONTOSO.COM from
accidentally being moved or deleted out of its parent organizational unit that is called
MyCompany, make the following configuration:
For the MyCompany organizational unit, add DENY ACE for Everyone to DELETE CHILD
with This object only scope:
Console
For the Users organizational unit, add DENY ACE for Everyone to DELETE and DELETE
TREE with This object only scope:
Console
The Active Directory Users and Computers snap-in in Windows Server 2008 includes a
Protect object from accidental deletion check box on the Object tab.
7 Note
The Advanced Features check box must be enabled to view that tab.
When you create an organizational unit by using Active Directory Users and Computers
in Windows Server 2008, the Protect container from accidental deletion check box
appears. By default, the check box is selected and can be deselected.
Although you can configure every object in Active Directory by using these ACEs, it's
best suited for organizational units. Deletion or movements of all leaf objects can have a
major effect. This configuration prevents such deletions or movements. To really delete
or move an object by using such a configuration, the Deny ACEs must be removed first.
This article discusses how to restore user accounts, computer accounts, and their group
memberships after they have been deleted from Active Directory. In variations of this
scenario, user accounts, computer accounts, or security groups may have been deleted
individually or in some combination. In all these cases, the same initial steps apply. You
authoritatively restore, or auth restore, those objects that were inadvertently deleted.
Some deleted objects require more work to be restored. These objects include objects
such as user accounts that contain attributes that are back links of the attributes of
other objects. Two of these attributes are managedBy and memberOf .
When you add security principals, such as a user account, a security group, or a
computer account to a security group, you make the following changes in Active
Directory:
1. The name of the security principal is added to the member attribute of each
security group.
2. For each security group that the user, the computer, or the security group is a
member of, a back link is added to the security principal's memberOf attribute.
Similarly, when a user, a computer, or a group is deleted from Active Directory, the
following actions occur:
1. The deleted security principal is moved into the deleted objects container.
2. A few attribute values, including the memberOf attribute, are stripped from the
deleted security principal.
3. Deleted security principals are removed from any security groups that they were a
member of. In other words, the deleted security principals are removed from each
security group's member attribute.
When you recover deleted security principals and restore their group memberships,
each security principal must exist in Active Directory before you restore its group
membership. The member may be a user, a computer, or another security group. To
restate this rule more broadly, an object that contains attributes whose values are back
links must exist in Active Directory before the object that contains that forward link can
be restored or modified.
This article focuses on how to recover deleted user accounts and their memberships in
security groups. Its concepts apply equally to other object deletions. This article's
concepts apply equally to deleted objects whose attribute values use forward links and
back links to other objects in Active Directory.
You can use either of the three methods to recover security principals. When you use
method 1, you leave in place all security principals that were added to any security
group across the forest. And you add only security principals that were deleted from
their respective domains back to their security groups. For example, you make a system
state backup, add a user to a security group, and then restore the system state backup.
When you use methods 1 or 2, you preserve any users who were added to security
groups that contain deleted users between the dates that the system state backup was
created and the date that the backup was restored. When you use method 3, you roll
back security group memberships for all the security groups that contain deleted users
to their state at the time of the system state backup.
When you use this method, you perform the following high-level steps:
1. Check if a global catalog in the user's domain hasn't replicated in the deletion. And
then prevent that global catalog from replicating. If there's no latent global
catalog, locate the most current system state backup of a global catalog domain
controller in the deleted user's home domain.
2. Auth restore all the deleted user accounts, and then permit end-to-end replication
of those user accounts.
3. Add all the restored users back to all the groups in all the domains that the user
accounts were a member of before they were deleted.
1. Check whether there's a global catalog domain controller in the deleted user's
home domain that hasn't replicated any part of the deletion.
7 Note
Focus on the global catalogs that have the least frequent replication
schedules.
If one or more of these global catalogs exist, use the Repadmin.exe command-line
tool to immediately disable inbound replication by following these steps:
c. Type the following command at the command prompt, and then press ENTER:
Console
7 Note
If you can't issue the Repadmin command immediately, remove all network
connectivity from the latent global catalog until you can use Repadmin to
disable inbound replication, and then immediately return network
connectivity.
2. It's best to stop making changes to security groups in the forest if all the following
statements are true:
If you're auth restoring security groups or organizational unit (OU) containers that
host security groups or user accounts, temporarily stop all these changes.
3. Create a new system state backup in the domain where the deletion occurred. You
can use this backup if you have to roll back your changes.
7 Note
If system state backups are current up to the point of the deletion, skip this
step and go to step 4.
If you identified a recovery domain controller in step 1, back up its system state
now.
If all the global catalogs located in the domain where the deletion occurred
replicated in the deletion, back up the system state of a global catalog in the
domain where the deletion occurred.
When you create a backup, you can return the recovery domain controller back to
its current state. And perform your recovery plan again if your first try isn't
successful.
4. If you can't find a latent global catalog domain controller in the domain where the
user deletion occurred, find the most recent system state backup of a global
catalog domain controller in that domain. This system state backup should contain
the deleted objects. Use this domain controller as the recovery domain controller.
Only restorations of the global catalog domain controllers in the user's domain
contain global and universal group membership information for security groups
that reside in external domains. If there's no system state backup of a global
catalog domain controller in the domain where users were deleted, you can't use
the memberOf attribute on restored user accounts to determine global or universal
group membership or to recover membership in external domains. Additionally,
it's a good idea to find the most recent system state backup of a non-global
catalog domain controller.
5. If you know the password for the offline administrator account, start the recovery
domain controller in Disrepair mode. If you don't know the password for the
offline administrator account, reset the password using ntdsutil.exe while the
recovery domain controller is still in normal Active Directory mode.
You can use the setpwd command-line tool to reset the password on domain
controllers while they are in online Active Directory mode.
7 Note
Administrators of Windows Server 2003 and later domain controllers can use the
set dsrm password command in the Ntdsutil command-line tool to reset the
For more information about how to reset the Directory Services Restore Mode
administrator account, see How To Reset the Directory Services Restore Mode
Administrator Account Password in Windows Server .
6. Press F8 during the startup process to start the recovery domain controller in
Disrepair mode. Sign in to the console of the recovery domain controller with the
offline administrator account. If you reset the password in step 5, use the new
password.
If the recovery domain controller is a latent global catalog domain controller, don't
restore the system state. Go to step 7.
If you're creating the recovery domain controller by using a system state backup,
restore the most current system state backup that was made on the recovery
domain controller now.
7. Auth restore the deleted user accounts, the deleted computer accounts, or the
deleted security groups.
7 Note
The terms auth restore and authoritative restore refer to the process of using
the authoritative restore command in the Ntdsutil command-line tool to
increment the version numbers of specific objects or of specific containers
and all their subordinate objects. As soon as end-to-end replication occurs,
the targeted objects in the recovery domain controller's local copy of Active
Directory become authoritative on all the domain controllers that share that
partition. An authoritative restoration is different from a system state
restoration. A system state restoration populates the restored domain
controller's local copy of Active Directory with the versions of the objects at
the time that the system state backup was made.
Authoritative restorations are performed with the Ntdsutil command-line tool, and
refer to the domain name (dn) path of the deleted users or of the containers that
host the deleted users.
When you auth restore, use domain name (dn) paths that are as low in the domain
tree as they have to be. The purpose is to avoid reverting objects that aren't
related to the deletion. These objects may include objects that were modified after
the system state backup was made.
a. Auth restore the domain name (dn) path for each deleted user account,
computer account, or security group.
Authoritative restorations of specific objects take longer but are less destructive
than authoritative restorations of a whole subtree. Auth restore the lowest
common parent container that holds the deleted objects.
Console
For example, to authoritatively restore the deleted user John Doe in the
Mayberry OU of the Contoso.com domain, use the following command:
Console
Console
ntdsutil "authoritative restore" "restore object
cn=ContosoPrintAccess,ou=Mayberry,dc=contoso,dc=com" q q
) Important
For each user that you restore, at least two files are generated. These files have
the following format:
ar_YYYYMMDD-HHMMSS_objects.txt
This file contains a list of the authoritatively restored objects. Use this file with
the ntdsutil authoritative restore create ldif file from command in any other
domain in the forest where the user was a member of Domain Local groups.
ar_YYYYMMDD-HHMMSS_links_usn.loc.ldf
If you perform the auth restore on a global catalog, one of these files is
generated for every domain in the forest. This file contains a script that you can
use with the Ldifde.exe utility. The script restores the backlinks for the restored
objects. In the user's home domain, the script restores all the group
memberships for the restored users. In all other domains in the forest where the
user has group membership, the script restores only universal and global group
memberships. The script doesn't restore any Domain Local group memberships.
These memberships are not tracked by a global catalog.
b. Auth restore only the OU or Common-Name (CN) containers that host the
deleted user accounts or groups.
passwords
the home directory
the profile path
location
contact info
group membership
any security descriptors that are defined on those objects and attributes.
Console
Console
7 Note
Repeat this step for each peer OU that hosts deleted users or groups.
) Important
When you restore a subordinate object of an OU, all the deleted parent
containers of the deleted subordinate objects must be explicitly auth
restored.
For each organizational unit that you restore, at least two files are generated.
These files have the following format:
ar_YYYYMMDD-HHMMSS_objects.txt
This file contains a list of the authoritatively restored objects. Use this file with
the ntdsutil authoritative restore create ldif file from command in any other
domain in the forest where the restored users were members of Domain Local
groups.
ar_YYYYMMDD-HHMMSS_links_usn.loc.ldf
This file contains a script that you can use with the Ldifde.exe utility. The script
restores the backlinks for the restored objects. In the user's home domain, the
script restores all the group memberships for the restored users.
10. Type the following command to disable inbound replication to the recovery
domain controller:
Console
Enable network connectivity back to the recovery domain controller whose system
state was restored.
11. Outbound-replicate the auth-restored objects from the recovery domain controller
to the domain controllers in the domain and in the forest.
While inbound replication to the recovery domain controller remains disabled, type
the following command to push the auth-restored objects to all the cross-site
replica domain controllers in the domain and to all the global catalogs in the
forest:
Console
If all the following statements are true, group membership links are rebuilt with the
restoration and the replication of the deleted user accounts. Go to step 14.
7 Note
Your forest is running at the Windows Server 2003 and later or later forest
functional level or at the Windows Server 2003 and later or later Interim
forest functional level.
Only user accounts or computer accounts were deleted, and not security
groups.
The deleted users were added to security groups in all the domains in the
forest after the forest was transitioned to Windows Server 2003 and later, or
later forest functional level.
12. On the console of the recovery domain controller, use the Ldifde.exe utility and the
ar_YYYYMMDD-HHMMSS_links_usn.loc.ldf file to restore the user's group
memberships. To do it, follow these steps:
Select Start, select Run, type cmd in the Open box, and then select OK.
At the command prompt, type the following command, and then press
ENTER:
Console
ldifde -i -f ar_YYYYMMDD-HHMMSS_links_usn.loc.ldf
13. Enable inbound replication to the recovery domain controller by using the
following command:
Console
14. If deleted users were added to local groups in external domains, take one of the
following actions:
15. Verify group membership in the recovery domain controller's domain, and in
global catalogs in other domains.
16. Make a new system state backup of domain controllers in the recovery domain
controller's domain.
17. Notify all the forest administrators, delegated administrators, help desk
administrators in the forest, and users in the domain that the user restore is
complete.
Help desk administrators may have to reset the passwords of auth-restored user
accounts and computer accounts whose domain password changed after the
restored system was made.
Users who changed their passwords after the system state backup was made will
find that their most recent password no longer works. Have such users try to log
on by using their previous passwords if they know them. Otherwise, help desk
administrators must reset the password and select the user must change
password at next logon check box. Do it preferably on a domain controller in the
same Active Directory site as the user is located in.
1. Check if a global catalog in the user's domain hasn't replicated in the deletion. And
then prevent that global catalog from replicating. If there is no latent global
catalog, locate the most current system state backup of a global catalog domain
controller in the deleted user's home domain.
2. Auth restore all the deleted user accounts, and then permit end-to-end replication
of those user accounts.
3. Add all the restored users back to all the groups in all the domains that the user
accounts were a member of before they were deleted.
1. Check whether there's a global catalog domain controller in the deleted user's
home domain that hasn't replicated any part of the deletion.
7 Note
Focus on the global catalogs that have the least frequent replication
schedules.
If one or more of these global catalogs exist, use the Repadmin.exe command-line
tool to immediately disable inbound replication. To do it, follow these steps:
a. Select Start, and then select Run.
b. Type cmd in the Open box, and then select OK.
c. Type the following command at the command prompt, and then press ENTER:
Console
repadmin /options <recovery dc name> +DISABLE_INBOUND_REPL
7 Note
If you can't issue the Repadmin command immediately, remove all network
connectivity from the latent global catalog until you can use Repadmin to
disable inbound replication, and then immediately return network
connectivity.
To maintain the most flexible recovery path, temporarily stop making changes to
the following items. Changes include password resets by domain users, help desk
administrators, and administrators in the domain where the deletion occurred, in
addition to group membership changes in the deleted users' groups. Consider
halting additions, deletions, and modifications to the following items:
a. User accounts and attributes on user accounts
b. Computer accounts and attributes on computer accounts
c. Service accounts
d. Security groups
It's best to stop making changes to security groups in the forest if all the following
statements are true:
If you're auth restoring security groups or organizational unit (OU) containers that
host security groups or user accounts, temporarily stop all these changes.
7 Note
If system state backups are current up to the point of the deletion, skip this
step and go to step 4.
If you identified a recovery domain controller in step 1, back up its system state
now.
If all the global catalogs located in the domain where the deletion occurred
replicated in the deletion, back up the system state of a global catalog in the
domain where the deletion occurred.
When you create a backup, you can return the recovery domain controller back to
its current state. And perform your recovery plan again if your first try isn't
successful.
4. If you can't find a latent global catalog domain controller in the domain where the
user deletion occurred, find the most recent system state backup of a global
catalog domain controller in that domain. This system state backup should contain
the deleted objects. Use this domain controller as the recovery domain controller.
Only restorations of the global catalog domain controllers in the user's domain
contain global and universal group membership information for security groups
that reside in external domains. If there is no system state backup of a global
catalog domain controller in the domain where users were deleted, you can't use
the memberOf attribute on restored user accounts to determine global or universal
group membership or to recover membership in external domains. Additionally,
it's a good idea to find the most recent system state backup of a non-global
catalog domain controller.
5. If you know the password for the offline administrator account, start the recovery
domain controller in Disrepair mode. If you don't know the password for the
offline administrator account, reset the password while the recovery domain
controller is still in normal Active Directory mode.
You can use the setpwd command-line tool to reset the password on domain
controllers that are running Windows 2000 Service Pack 2 (SP2) and later while
they are in online Active Directory mode.
7 Note
Administrators of Windows Server 2003 and later domain controllers can use the
set dsrm password command in the Ntdsutil command-line tool to reset the
For more information about how to reset the Directory Services Restore Mode
administrator account, see How To Reset the Directory Services Restore Mode
Administrator Account Password in Windows Server .
6. Press F8 during the startup process to start the recovery domain controller in
Disrepair mode. Sign in to the console of the recovery domain controller with the
offline administrator account. If you reset the password in step 5, use the new
password.
If the recovery domain controller is a latent global catalog domain controller, don't
restore the system state. Go to step 7.
If you're creating the recovery domain controller by using a system state backup,
restore the most current system state backup that was made on the recovery
domain controller now.
7. Auth restore the deleted user accounts, the deleted computer accounts, or the
deleted security groups.
7 Note
The terms auth restore and authoritative restore refer to the process of using
the authoritative restore command in the Ntdsutil command-line tool to
increment the version numbers of specific objects or of specific containers
and all their subordinate objects. As soon as end-to-end replication occurs,
the targeted objects in the recovery domain controller's local copy of Active
Directory become authoritative on all the domain controllers that share that
partition. An authoritative restoration is different from a system state
restoration. A system state restoration populates the restored domain
controller's local copy of Active Directory with the versions of the objects at
the time that the system state backup was made.
Authoritative restorations are performed with the Ntdsutil command-line tool, and
refer to the domain name (dn) path of the deleted users or of the containers that
host the deleted users.
When you auth restore, use domain name (dn) paths that are as low in the domain
tree as they have to be. The purpose is to avoid reverting objects that aren't
related to the deletion. These objects may include objects that were modified after
the system state backup was made.
a. Auth restore the domain name (dn) path for each deleted user account,
computer account, or security group.
Authoritative restorations of specific objects take longer but are less destructive
than authoritative restorations of a whole subtree. Auth restore the lowest
common parent container that holds the deleted objects.
Console
For example, to authoritatively restore the deleted user John Doe in the
Mayberry OU of the Contoso.com domain, use the following command:
Console
Console
) Important
This syntax is available only in Windows Server 2003 and later. The only
syntax in Windows 2000 is to use the following:
Console
7 Note
To work around this problem, wrap the DN that contains extended characters
and spaces with backslash-double-quotation-mark escape sequences. Here is
an example:
Console
7 Note
Console
7 Note
If the objects were restored from tape, marked authoritative and the
restore did not work as expected and then the same tape is used to restore
the NTDS database once again, the USN version of objects to be restored
authoritatively must be increased higher than the default of 100000 or the
objects will not replicate out after the second restore. The syntax below is
needed to script an increased version number higher than 100000 (default):
Console
7 Note
If the script prompts for confirmation on each object being restored you
can turn off the prompts. The syntax to turn off prompting is:
Console
b. Auth restore only the OU or Common-Name (CN) containers that host the
deleted user accounts or groups.
Console
ntdsutil "authoritative restore" "restore subtree <container DN
path>" q q
Console
7 Note
Repeat this step for each peer OU that hosts deleted users or groups.
) Important
When you restore a subordinate object of an OU, all the deleted parent
containers of the deleted subordinate objects must be explicitly auth
restored.
10. Type the following command to disable inbound replication to the recovery
domain controller:
Console
Enable network connectivity back to the recovery domain controller whose system
state was restored.
11. Outbound-replicate the auth-restored objects from the recovery domain controller
to the domain controllers in the domain and in the forest.
While inbound replication to the recovery domain controller remains disabled, type
the following command to push the auth-restored objects to all the cross-site
replica domain controllers in the domain and to all the global catalogs in the
forest:
Console
If all the following statements are true, group membership links are rebuilt with the
restoration and the replication of the deleted user accounts. Go to step 14.
7 Note
Your forest is running at the Windows Server 2003 and later forest functional
level, or at the Windows Server 2003 and later Interim forest functional level.
Only user accounts or computer accounts were deleted, and not security
groups.
The deleted users were added to security groups in all the domains in the
forest after the forest was transitioned to Windows Server 2003 and later
forest functional level.
12. Determine which security groups the deleted users were members of, and then
add them to those groups.
7 Note
Before you can add users to groups, the users who you auth restored in step 7
and who you outbound-replicated in step 11 must have replicated to the
domain controllers in the referenced domain controller's domain and to all
the global catalog domain controllers in the forest.
a. Sign in to the recovery domain controller's console by using a user account that
is a member of the domain administrator's security group.
b. Use the Ldifde command to dump the names of the formerly deleted user
accounts and their memberOf attributes, starting at the topmost OU container
where the deletion occurred. The Ldifde command uses the following syntax:
Console
Use the following syntax if deleted computer accounts were added to security
groups:
Console
c. Run the Groupadd command to build more .ldf files that contain the names of
domains and the names of global and universal security groups that the deleted
users were a member of. The Groupadd command uses the following syntax:
Console
Console
Ldifde -i -k -f Groupadd_<fully.qualified.domain.name>.ldf
Run the .ldf file for the domain that the users were deleted from on any domain
controller except the recovery domain controller.
Console
13. To disable outbound replication, type the following text, and then press ENTER:
Console
7 Note
To re-enable outbound replication, type the following text, and then press
ENTER:
Console
14. If deleted users were added to local groups in external domains, take one of the
following actions:
Manually add the deleted users back to those groups.
Restore the system state and auth restore each of the local security groups
that contains the deleted users.
15. Verify group membership in the recovery domain controller's domain, and in
global catalogs in other domains.
16. Make a new system state backup of domain controllers in the recovery domain
controller's domain.
17. Notify all the forest administrators, delegated administrators, help desk
administrators in the forest, and users in the domain that the user restore is
complete.
Help desk administrators may have to reset the passwords of auth-restored user
accounts and computer accounts whose domain password changed after the
restored system was made.
Users who changed their passwords after the system state backup was made will
find that their most recent password no longer works. Have such users try to log
on by using their previous passwords if they know them. Otherwise, help desk
administrators must reset the password and select the user must change
password at next logon check box. Do it preferably on a domain controller in the
same Active Directory site as the user is located in.
1. Check if a global catalog in the user's domain hasn't replicated in the deletion. And
then prevent that domain controller from inbound-replicating the deletion. If there
is no latent global catalog, locate the most current system state backup of a global
catalog domain controller in the deleted user's home domain.
2. Authoritatively restore all deleted user accounts and all security groups in the
deleted user's domain.
3. Wait for the end-to-end replication of the restored users and the security groups
to all the domain controllers in the deleted user's domain, and to the forest's
global catalog domain controllers.
4. Repeat steps 2 and 3 to authoritatively restore deleted users and security groups.
(You restore the system state only one time.)
5. If the deleted users were members of security groups in other domains,
authoritatively restore all the security groups that the deleted users were members
of in those domains. Or, if system state backups are current, authoritatively restore
all the security groups in those domains. To satisfy the requirement that deleted
group members must be restored before security groups to fix up group
membership links, you restore both object types twice in this method. The first
restoration puts all the user accounts and group accounts in place. The second
restoration restores deleted groups and repairs the group membership
information, including membership information for nested groups.
1. Check whether a global catalog domain controller exists in the deleted users home
domain and hasn't replicated in any part of the deletion.
7 Note
Focus on global catalogs in the domain that has the least frequent replication
schedules. If these domain controllers exist, use the Repadmin.exe command-
line tool to immediately disable inbound replication. To do it, follow these
steps:
7 Note
If you cannot issue the Repadmin command immediately, remove all network
connectivity from the domain controller until you can use Repadmin to
disable inbound replication, and then immediately return network
connectivity.
2. Avoid making additions, deletions, and changes to the following items until all the
recovery steps have been completed. Changes include password resets by domain
users, help desk administrators, and administrators in the domain where the
deletion occurred, in addition to group membership changes in the deleted users'
groups.
a. User accounts and attributes on user accounts
c. Service accounts
d. Security groups
7 Note
e. Notify all the forest administrators, the delegated administrators, and the help
desk administrators in the forest of the temporary stand-down. This stand-down
is required in method 2 because you're authoritatively restoring all the deleted
users' security groups. Therefore, any changes that are made to groups after the
date of system state backup are lost.
3. Create a new system state backup in the domain where the deletion occurred. You
can use this backup if you have to roll back your changes.
7 Note
If your system state backups are current up to the time that the deletion
occurred, skip this step and go to step 4.
If you identified a recovery domain controller in step 1, back up its system state
now.
If all the global catalogs that are located in the domain where the deletion
occurred replicated the deletion, back up the system state of a global catalog in
the domain where the deletion occurred.
When you create a backup, you can return the recovery domain controller back to
its current state. And perform your recovery plan again if your first try isn't
successful.
4. If you can't find a latent global catalog domain controller in the domain where the
user deletion occurred, find the most recent system state backup of a global
catalog domain controller in that domain. This system state backup should contain
the deleted objects. Use this domain controller as the recovery domain controller.
Only databases of the global catalog domain controllers in the user's domain
contain group membership information for external domains in the forest. If
there's no system state backup of a global catalog domain controller in the
domain where users were deleted, you can't use the memberOf attribute on
restored user accounts to determine global or universal group membership, or to
recover membership in external domains. Go to the next step. If there is an
external record of group membership in external domains, add the restored users
to security groups in those domains after the user accounts have been restored.
5. If you know the password for the offline administrator account, start the recovery
domain controller in Disrepair mode. If you don't know the password for the
offline administrator account, reset the password while the recovery domain
controller is still in normal Active Directory mode.
You can use the setpwd command-line tool to reset the password on domain
controllers that are running Windows 2000 SP2 and later while they are in online
Active Directory mode.
7 Note
Administrators of Windows Server 2003 and later domain controllers can use the
set dsrm password command in the Ntdsutil command-line tool to reset the
For more information about how to reset the Directory Services Restore Mode
administrator account, see How To Reset the Directory Services Restore Mode
Administrator Account Password in Windows Server .
6. Press F8 during the startup process to start the recovery domain controller in
Disrepair mode. Log on to the console of the recovery domain controller with the
offline administrator account. If you reset the password in step 5, use the new
password.
If the recovery domain controller is a latent global catalog domain controller, don't
restore the system state. Go directly to step 7.
If you're creating the recovery domain controller by using a system state backup,
restore the most current system state backup that was made on the recovery
domain controller that contains the deleted objects now.
7. Auth restore the deleted user accounts, the deleted computer accounts, or the
deleted security groups.
7 Note
The terms auth restore and authoritative restore refer to the process of using
the authoritative restore command in the Ntdsutil command-line tool to
increment the version numbers of specific objects or of specific containers
and all their subordinate objects. As soon as end-to-end replication occurs,
the targeted objects in the recovery domain controller's local copy of Active
Directory become authoritative on all the domain controllers that share that
partition. An authoritative restoration is different from a system state
restoration. A system state restoration populates the restored domain
controller's local copy of Active Directory with the versions of the objects at
the time that the system state backup was made.
When you auth restore, use domain name paths that are as low in the domain tree
as they have to be. The purpose is to avoid reverting objects that aren't related to
the deletion. These objects may include objects that were modified after the
system state backup was made.
a. Auth restore the domain name (dn) path for each deleted user account,
computer account, or deleted security group.
Authoritative restorations of specific objects take longer but are less destructive
than authoritative restorations of a whole subtree. Auth restore the lowest
common parent container that holds the deleted objects.
Console
For example, to authoritatively restore the deleted user John Doe in the
Mayberry OU of the Contoso.com domain, use the following command:
Console
Console
) Important
By using this Ntdsutil format, you can also automate the authoritative
restoration of many objects in a batch file or a script.
7 Note
This syntax is available only in Windows Server 2003 and later. The only
syntax in Windows 2000 is to use: ntdsutil "authoritative restore"
"restore subtree object DN path" .
b. Auth restore only the OU or Common-Name (CN) containers that host the
deleted user accounts or groups.
Console
Console
7 Note
Repeat this step for each peer OU that hosts deleted users or groups.
) Important
When you restore a subordinate object of an OU, all the parent containers
of the deleted subordinate objects must be explicitly auth restored.
While inbound replication to the recovery domain controller remains disabled, type
the following command to push the authoritatively restored objects to all the
cross-site replica domain controllers in the domain and to global catalogs in the
forest:
Console
If all the following statements are true, group membership links are rebuilt with the
restoration of the deleted user accounts. Go to step 13.
Your forest is running at the Windows Server 2003 and later forest functional
level, or at the Windows Server 2003 and later interim forest functional level.
Only security groups were not deleted.
All the deleted users were added to all the security groups in all the domains
in the forest.
If groups were also deleted, or if you can't guarantee that all the deleted users
were added to all the security groups after the transition to the Windows Server
2003 and later interim or forest functional level, go to step 12.
10. Repeat steps 7, 8, and 9 without restoring the system state, and then go to step 11.
11. If deleted users were added to local groups in external domains, take one of the
following actions:
12. Verify group membership in the recovery domain controller's domain, and in
global catalogs in other domains.
13. Use the following command to enable inbound replication to the recovery domain
controller:
Console
14. Make a new system state backup of domain controllers in the recovery domain
controller's domain and global catalogs in other domains in the forest.
15. Notify all the forest administrators, the delegated administrators, the help desk
administrators in the forest, and the users in the domain that the user restore is
complete.
Help desk administrators may have to reset the passwords of auth restored user
accounts and computer accounts whose domain password changed after the
restored system was made.
Users who changed their passwords after the system state backup was made will
find that their most recent password no longer works. Have such users try to log
on by using their previous passwords if they know them. Otherwise, help desk
administrators must reset the password with the user must change password at
next logon check box checked. Do it preferably on a domain controller in the same
Active Directory site as the user is located in.
1. Follow the steps in the following section to reanimate deleted users, computers,
groups, or all of them:
How to manually undelete objects in a deleted objects container
2. Use Active Directory Users and Computers to change the account from disabled to
enabled. (The account appears in the original OU.)
3. Use the bulk reset features in the Windows Server 2003 and later version of Active
Directory Users and Computers to perform bulk resets on the password must
change at next logon policy setting, on the home directory, on the profile path,
and on group membership for the deleted account as required. You can also use a
programmatic equivalent of these features.
4. If Microsoft Exchange 2000 or later was used, repair the Exchange mailbox for the
deleted user.
5. If Exchange 2000 or later was used, reassociate the deleted user with the Exchange
mailbox.
6. Verify that the recovered user can log on and access local directories, shared
directories, and files.
You can automate some or all of these recovery steps by using the following methods:
Write a script that automates the manual recovery steps that are listed in step 1.
When you write such a script, consider scoping the deleted object by date, time,
and last known parent container, and then automating the reanimation of the
deleted object. To automate the reanimation, change the isDeleted attribute from
TRUE to FALSE, and change the relative distinguished name to the value that is
defined either in the lastKnownParent attribute or in a new OU or common name
(CN) container that is specified by the administrator. (The relative distinguished
name is also known as the RDN.)
Obtain a non-Microsoft program that supports the reanimation of deleted objects
on Windows Server 2003 and later domain controllers. One such utility is
AdRestore. AdRestore uses the Windows Server 2003 and later undelete primitives
to undelete objects individually. Aelita Software Corporation and Commvault
Systems also offer products that support undelete functionality on Windows Server
2003 and later-based domain controllers.
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft doesn't guarantee the
accuracy of this third-party contact information.
ldp.exe is available:
2. Use the Connection menu in Ldp to perform the connect operations and the bind
operations to a Windows Server 2003 and later domain controller.
7 Note
The 1.2.840.113556.1.4.417 control moves to the Active Controls window.
6. On the View menu, select Tree, type the distinguished name path of the deleted
objects container in the domain where the deletion occurred, and then select OK.
7 Note
The distinguished name path is also known as the DN path. For example, if
the deletion occurred in the contoso.com domain, the DN path would be the
following path:
cn=deleted Objects,dc=contoso,dc=com
7. In the left pane of the window, double-click the Deleted Object Container.
7 Note
As a search result of Idap query, only 1000 objects are returned by default. Fot
example, if more than 1000 objects exist in the Deleted Objects container, not
all objects appear in this container. If your target object doesn't appear, use
ntdsutil, and then set the maximum number by using maxpagesize to get the
search results .
9. Right-click the object that you want to reanimate, and then select Modify.
Change the value for the isDeleted attribute and the DN path in a single
Lightweight Directory Access Protocol (LDAP) modify operation. To configure the
Modify dialog, follow these steps:
a. In the Edit Entry Attribute box, type isDeleted. Leave the Value box blank.
b. Select the Delete option button, and then select Enter to make the first of two
entries in the Entry List dialog.
) Important
d. In the Values box, type the new DN path of the reanimated object.
For example, to reanimate the JohnDoe user account to the Mayberry OU, use
the following DN path: cn= JohnDoe,ou= Mayberry,dc= contoso,dc= com
7 Note
f. Select ENTER.
i. Select RUN.
10. After you reanimate the objects, select Controls on the Options menu, select the
Check Out button to remove (1.2.840.113556.1.4.417) from the Active Controls
box list.
11. Reset user account passwords, profiles, home directories, and group memberships
for the deleted users.
When the object was deleted, all the attribute values except SID , ObjectGUID ,
LastKnownParent , and SAMAccountName were stripped.
12. Enable the reanimated account in Active Directory Users and Computers.
7 Note
The reanimated object has the same primary SID as it had before the deletion,
but the object must be added again to the same security groups to have the
same level of access to resources. The first release of Windows Server 2003
and later doesn't preserve the sIDHistory attribute on reanimated user
accounts, computer accounts, and security groups. Windows Server 2003 and
later with Service Pack 1 does preserve the sIDHistory attribute on deleted
objects.
13. Remove Microsoft Exchange attributes and reconnect the user to the Exchange
mailbox.
7 Note
7 Note
2. Copy the value of the objectGUID attribute to the Windows clipboard. You can
paste this value when you enter the Repadmin command in step 4.
Console
Console
The syntax of this command must include the GUID of the deleted object or
container and the FQDN of the server that you want to source from.
4. In the Repadmin command output, find the originating date, time, and domain
controller for the isDeleted attribute. For example, information for the isDeleted
attribute appears in the fifth line of the following sample output:
ノ Expand table
Console
7 Note
The -a option is case sensitive. Use the fully qualified domain name of the
forest root domain regardless of the domain that the originating domain
controller resides in.
For example, if the originating domain controller resided in any domain in the
Contoso.com forest and had a GUID of 644eb7e7-1566-4f29-a778-4b487637564b,
Console
ping -a 644eb7e7-1566-4f29-a778-4b487637564b._msdomain
controllers.contoso.com
Console
System state changes occur every day. These changes may include:
If your hardware or software fails, or your site experiences another disaster, you'll want
to restore the backups that were made after each significant set of changes in each
Active Directory domain and site in the forest. If you don't maintain current backups,
you may lose data, or may have to roll back restored objects.
Microsoft recommends that you take the following steps to prevent bulk deletions:
1. Don't share the password for the built-in administrator accounts, or permit
common administrative user accounts to be shared. If the password for the built-in
administrator account is known, change the password, and define an internal
process that discourages its use. Audit events for shared user accounts make it
impossible to determine the identity of the user who is making changes in Active
Directory. Therefore, the use of shared user accounts must be discouraged.
2. It's rare that user accounts, computer accounts, and security groups are
intentionally deleted. It's especially true of tree deletions. Disassociate the ability of
service and delegated administrators to delete these objects from the ability to
create and manage user accounts, computer accounts, security groups, OU
containers, and their attributes. Grant only the most privileged user accounts or
security groups the right to perform tree deletes. These privileged user accounts
may include enterprise administrators.
3. Grant delegated administrators access only to the class of object that those
administrators are permitted to manage. For example, a help desk administrator's
primary job is to modify properties on user accounts. He doesn't have permissions
to create and delete computer accounts, security groups, or OU containers. This
restriction also applies to delete permissions for the administrators of other
specific object classes.
4. Experiment with audit settings to track delete operations in a lab domain. After
you're comfortable with the results, apply your best solution to the production
domain.
5. Wholesale access-control and audit changes on containers that host tens of
thousands of objects can make the Active Directory database grow significantly,
especially in Windows 2000 domains. Use a test domain that mirrors the
production domain to evaluate potential changes to free disk space. Check the
hard disk drive volumes that host the Ntds.dit files and the log files of domain
controllers in the production domain for free disk space. Avoid setting access-
control and audit changes on the domain network controller head. Making these
changes would needlessly apply to all the objects of all the classes in all the
containers in the partition. For example, avoid making changes to Domain Name
System (DNS) and distributed link tracking (DLT) record registration in the
CN=SYSTEM folder of the domain partition.
7. Test bulk deletions in a lab environment that mirrors your production domain.
Choose the recovery method that makes sense to you, and then customize it to
your organization. You may want to identify:
The names of the domain controllers in each domain that is regularly backed
up
Where backup images are stored
Ideally, these images are stored on an extra hard disk that's local to a global
catalog in each domain in the forest.
Which members of the help desk organization to contact
The best way to make that contact
8. Most of the bulk deletions of user accounts, of computer accounts, and of security
groups that Microsoft sees are accidental. Discuss this scenario with your IT staff,
and develop an internal action plan. Focus on early detection. And return
functionality to your domain users and business as quickly as possible. You can
also take steps to prevent accidental bulk deletions from occurring by editing the
access control lists (ACLs) of organizational units.
For more information about how to use Windows interface tools to prevent
accidental bulk deletions, see Guarding Against Accidental Bulk Deletions in Active
Directory.
Groupadd.exe automatically discovers the domains and security groups that deleted
users were members of and adds them back to those groups. This process is explained
in more detail in step 11 of method 1.
Console
Here, ldf_file represents the name of the .ldf file to be used with the previous
argument, after_restore represents the user file data source, and before_restore
represents the user data from the production environment. (The user file data source is
the good user data.)
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
References
For more information on how to use the AD Recycle Bin feature included in Windows
Server 2008 R2, see Active Directory Recycle Bin Step-by-Step Guide.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs after you clone a new VDC, and
try to sign in interactively.
Symptoms
You use the Virtualized Domain Controller (VDC) cloning feature introduced in Windows
Server 2012. After you clone a new VDC, you try to sign in interactively. However, you
receive the following error:
There are currently no logon servers are available to service the logon request
Cause
The cloning process failed, and the server has started in Directory Services Repair Mode
(DSRM). There's no visual indication that the domain controller has started in DSRM on
the Ctrl+Alt+Delete sign-in page of Windows Server.
Resolution
1. Select the Left Arrow key, or press the Esc key.
2. Select Other User.
3. Type the user name as follows: .\administrator
4. Provide the DSRM user password that is currently set on the source domain
controller and that was used to clone this computer. This password was specified
during the original promotion. Notice that this password might have been
changed later by using NTDSUTIL.EXE.
5. When you sign in, the server will display SAFE MODE in all four corners of the
screen. Resolve the issues that prevented cloning, remove the DSRM boot flag, and
then try to clone the domain controller again
More information
This visual behavior and the error aren't specific to cloning. This behavior and error are
specific only to DSRM. DSRM is intentionally invoked as part of the cloning process to
safeguard the network and domain from duplicated domain controllers.
Directory Services Repair Mode was called Directory Services Restore Mode in previous
Windows operating systems.
For more information about how to configure and troubleshoot VDC together with
details and step-by-step guidance, see Virtualized Domain Controller Technical
Reference (Level 300).
Feedback
Was this page helpful? Yes No
This article describes how to perform offline defragmentation of the Active Directory
database.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 232122
Summary
Active Directory automatically performs online defragmentation of the database at
certain intervals as part of the Garbage Collection process. (By default, this occurs every
12 hours.) Online defragmentation does not reduce the size of the database file
(Ntds.dit) but instead optimizes data storage in the database and reclaims space in the
directory for new objects.
5. NTDSUTIL uses the TEMP and TMP environment variables to create a temporary
database during defragmentation. If the free space on your standard volume used
is less than the size of the compacted database, you receive the following error:
0 10 20 30 40 50 60 70 80 90 100
|----|----|----|----|----|----|----|----|----|----|
In this case, set the environment variables TMP and TEMP to a volume that has
enough free space for the task. For example, use the following settings:
Console
Md d:\temp
Set tmp=d:\temp
Set temp=d:\temp
7 Note
This problem can also occur during an integrity check of the database.
6. Run NTDSUTIL.
7. Type activate instance ntds to select the Active Directory database instance. Use
the LDS instance name if you want to compact an LDS database.
10. Establish a location that has sufficient drive space for the compacted database to
be stored.
11. Type compact to <drive>:\<directory> , and then press Enter. In this command, the
placeholders <drive> and <directory> represent the path of the location that you
established in the previous step.
7 Note
You must specify a directory path. If the path contains any spaces, the whole
path must be enclosed in quotation marks. For example, type compact to
"c:\new folder".
12. A new database that is named Ntds.dit or AdamNtds.dit is created in the path that
you specified.
13. Type quit, and then press Enter. Type quit again to return to the command prompt.
Copy the new Ntds.dit or AdamNtds.dit file over the old database file in the
current database path that you noted in step 5.
7 Note
15. If you stopped Active Directory Domain Services or LDS instance, you can restart it
now.
16. If you are working in the Active Directory Restore mode, start msconfig and go to
the boot pane. Select the operating system installation that you want to configure.
Click to clear Safe Boot in the Boot options section. When you click OK, the tool
asks you to restart. Restart the computer.
Feedback
Was this page helpful? Yes No
This article describes two options for relocating the system volume (SYSVOL) tree on
your domain controller.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 842162
Summary
The SYSVOL is a collection of folders, file system reparse points, and Group Policy
settings that are replicated by the File Replication Service (FRS). Replication distributes a
consistent copy of Group Policy settings and scripts among domain controllers in a
domain. Member computers and domain controllers access the contents of the SYSVOL
tree through two shared folders, Sysvol and Netlogon.
This article describes how to move the SYSVOL tree and its shares to a different logical
or physical drive letter.
This section discusses how to move the SYSVOL tree from the C:\Winnt\Sysvol folder to
the X:\Winnt\Sysvol folder. In this example, the domain controller is named DC1, and the
domain name is CONTOSO.COM .
3. Before you repromote DC1, wait for the following events to occur:
All domain controllers in the forest must inbound replicate the removal of the
demoted domain controller's NTDS file system settings object. This object is
located in the configuration partition. The NTDS settings object is the parent
of Active Directory connection objects that are visible in the Active Directory
Sites and Services snap-in.
All global catalog domain controllers in the forest must inbound replicate the
read-only copy of DC1's domain partition.
4. Use the Active Directory Installation Wizard to specify a new drive and path on an
NTFS-formatted partition. Demotion and repromotion of a domain controller is a
simple and supported option for relocating the SYSVOL tree and its shares if the
following conditions are true:
To avoid delays when you promote replica domain controllers that are running Windows
Server 2003 or later, you can do installations from media-based promotions, where the
bulk of Active Directory is sourced from a locally restored system state backup.
To estimate the required time for a network-based promotion, compare the start and
end times for a previous promotion that was comparable in scope. These times are
available in the %Systemroot%\Debug\Dcpromo.log file.
For more information about changing the FRS staging folder to a location that is
independent of the SYSVOL tree, see How to reset the File Replication service staging
folder to a different logical drive.
To move a SYSVOL tree to a new drive, use one of the following options:
Do a network-based Active Directory Installation Wizard (Dcpromo.exe) demotion.
Specify a new drive and path for the SYSVOL tree during promotion.
Modify the registry and manually move the SYSVOL tree to a new drive.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
To manually move the SYSVOL tree, move the SYSVOL tree from its drive and path to a
new destination drive and path by modifying several registry keys and by resetting
reparse points in the file system. To do this task, follow these steps:
b. Confirm that inbound and outbound FRS replication of the SYSVOL replica set is
occurring on the domain controller.
c. Turn off antivirus programs or other services that create locks on files or on
folders that reside in the SYSVOL tree.
d. Back up the system state of the domain controller. Back up the file system part
of the SYSVOL tree on the domain controller so that you can return the
computer to its current configuration if you experience problems with the
relocation process.
For example, if the SYSVOL domain tree is located in the C:\Winnt\Sysvol folder,
click to select this folder, click Edit on the menu bar, and then click Copy.
The parent folder for the moved SYSVOL tree may be modified. However, we
recommend that you maintain the same relative path for the moved SYSVOL tree.
For example, if the SYSVOL tree was originally located in the C:\Winnt\Sysvol
folder and you want to moved the SYSVOL tree on logical drive X, create a
X:\Winn t folder, and then paste the SYSVOL tree in that folder.
4. Use the Ldp.exe or ADSIedit.msc editors to modify the value of the FRSRootPath
attribute in Active Directory. The FRSRootPath attribute must reflect the new
replica set root drive and the folder that you specified in step 3. In this example,
you would modify the FRSRootPath attribute as follows:
5. Use the Ldp.exe or ADSIedit.msc editors to modify the value for the
FRSStagingPath attribute. This attribute must reflect the new staging path,
including the new drive and folder that you selected in step 3.
6. Modify the registry to reflect the new staging drive and folder. To do this task,
follow these steps.
a. Click Start, click Run, type regedt32, and then click OK.
b. Locate and then right-click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
c. Right-click the SYSVOL value, and then click Modify. Type a new path for the
SYSVOL replica set root. For example, type X:\Winnt\sysvol\sysvol .
up/Restore\Process at Startup
b. Right-click the BurFlags value, and then select Modify. Set the value to D2
hexadecimal if there are other domain controllers in the same domain. Set the
BurFlags value to D4 hexadecimal if only one domain controller exists in the
domain.
) Important
7 Note
If the domain controller hosts any FRS-replicated DFS roots or links, you may
want to set the replica set-specific BurFlags registry key to prevent a
temporary service outage and re-replication of data in FRS-replicated DFS
roots or links.
For more information, see Use the BurFlags registry key to reinitialize File
Replication Service.
8. Apply default permissions to the new path of the SYSVOL tree. To do this task,
copy the following text, and then paste it in a Notepad file:
[Unicode]
Unicode=yes
[Version]
signature="$CHICAGO$"
Revision=1
[Profile Description]
Description=default perms for sysvol
[File Security]
;"%SystemRoot%\SYSVOL",0,"D:AR(A;OICI;FA;;;BA)"
; -------------------------------------------------------------------------------------
--------
;Sysvol. THIS ENVIRONMENT VARIABLE MUST BE SET!!!!!!!!!!!!!!!!!!!!!!!!!
; -------------------------------------------------------------------------------------
--------
"%Sysvol%",2,"D:P(A;CIOI;GRGX;;;AU)(A;CIOI;GRGX;;;SO)(A;CIOI;GA;;;BA)
(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"%Sysvol%\domain\policies",2,"D:P(A;CIOI;GRGX;;;AU)(A;CIOI;GRGX;;;SO)
(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)(A;CIOI;GRGWGXSD;;;PA)"
9. Use the following parameters to save the contents of the Notepad file that you
created in step 8:
7 Note
The SYSVOL environment variable must be set to point to the new location.
Otherwise, the Secedit command does not run successfully.
10. Import the SYSVOL security template. To do this operation, select Start, select Run,
type cmd, and then select OK. Type the following, and then press ENTER:
Console
11. Use the Linkd command to update the reparse points in the file system to reflect
the new path of the SYSVOL tree. For example, if your domain controller is in the
CONTOSO.COM domain, and the SYSVOL tree is located in the X:\Windows\Sysvol
folder, type the following commands at the command prompt on your domain
controller. Press ENTER after each command.
Console
7 Note
Make sure that the SYSVOL directory tree is created before you run the Linkd
command. The command fails if there is data in the CONTOSO.COM directory
or subdirectories.
13. Look for events in the FRS event log that indicate that the replica set is joined and
that the SYSVOL folder is changed.
14. On the domain controller, use the net logon command or the net view command
to verify that the domain controller has shared the Netlogon and Sysvol folders. If
the shared folders don't exist, follow these steps:
ysvolready registry subkey is 1, restart the Netlogon service. If this subkey value
is 0, go to step c.
b. Look for the shared folders again. If the folders are still not available, type the
nltest /dbflag:2080FFFF command at a command prompt, and then press
ENTER:
Feedback
Was this page helpful? Yes No
This article addresses an issue in which RODC replicates passwords when it's granted
incorrect permissions in Windows Server.
Symptom
Normally, Read Only Domain Controllers (RODCs) only replicate user passwords for user
accounts that are a member of the Allowed RODC Password Replication Group or are
listed in the RODC account's msDS-RevealOnDemandGroup attribute.
However, for some user accounts that are not members of Allowed RODC Password
Replication Group or are not listed in the RODC account's msDS-
RevealOnDemandGroup attribute, you may find that passwords for those accounts that
are authenticated by the RODC may be cached by the RODC.
For example, when you compare the output of the Advanced Password Replication
Policy property by using Active Directory Users and Computers and the output of
repadmin /prp view RODC_name reveal , the entries listed differ between the two.
Cause
This problem is caused by incorrect permission configuration.
By default, the Enterprise Domain Controllers group that contains only writeable DCs
has the permission Replicating Directory Changes All on the domain partition. For
example, on "DC=contoso,DC=com" in Active Directory.
However, when the issue occurs, the problem RODC also has the Replicating Directory
Changes All permission on the domain because it was granted by an administrator
either to the Enterprise Read-only Domain Controllers group or to the RODC object
directly or indirectly via some other group membership.
Normally, RODCs will only replicate user passwords if the user accounts are a member of
the Allowed RODC Password Replication Group or are listed in the RODC account's
msDS-RevealOnDemandGroup attribute.
With the Replicating Directory Changes All permission, all user attributes, including
passwords, are replicated from the source DC to the RODC as if the RODC were a
normal Read Write DC (RWDC).
Resolution
To resolve this issue, change the Replicating Directory Changes All permission that is
granted to the Enterprise Read-only Domain Controllers object to Replicating Directory
Changes.
More information
Follow these steps to help validate the permissions and determine where the wrong
permissions are coming from.
Step 1
Use LDP to view the "control access" permissions on the domain. To do this, following
these steps:
Step 2
Verify the group memberships of the RODC to determine whether Replicating Directory
Changes All is being granted through another group.
To obtain the true membership of the RODC, you can use a query for the TokenGroups
attribute to retrieve the effective group list of the user by using the LDP tool.
Make sure that you select Base scope and add the required attribute. When you are
scoping the search on an individual user, you get the list for that user. If the user is in
many groups, you must extend the amount of data that LDP prints into the window on
the right, select Options\General from the menu, and adjust the Chars per field to a
higher value:
Step 3
On Windows Server 2008 R2, Windows 7, Windows Server 2008, or Windows Vista,
check whether you encounter the issue that is outlined in the following article:
The "Active Directory Users and Computers" MMC snap-in does not list all the accounts
that have passwords cached on the RODC in Windows
Step 4
Confirm the consistency of the RODC's computer account properties on all domain
controllers in the domain.
One method is to use repadmin to export the replication metadata of the RODC's
computer account from all domain controllers. To do this, use the following command:
Console
Step 5
Similarly to step 4, confirm the consistency of the Allowed RODC Password Replication
Group and any other group configured on the msDS-RevealOnDemandGroup attribute
to see if the incorrectly cached user passwords can be explained by inconsistent group
membership on different DCs that may be caused by a replication problem.
Step 6
Verify that users who have their passwords cached by the RODC aren't accidentally a
member of a group that is configured to have their passwords cached.
7 Note
The MMC will gather the password replication policy information from any domain
controller (even the RODC itself), while the repadmin /prp command will always
interrogate a read-write domain controller.
If there are any replication inconsistencies between the RODC and an RW DC, this may
explain the difference in output of these two utilities/methods.
Feedback
Was this page helpful? Yes No
Windows 10, version 1709, Windows Server, version 2004 and later versions of Windows
no longer support the syskey.exe utility.
Applies to: Windows 10 - all editions, Windows Server 2019, Windows Server 2016
Original KB number: 4025993
Changes detail
The following changes are made:
If an operating system (OS) was externally encrypted by the syskey.exe utility, you can't
upgrade it to Windows 10 version 1709, Windows Server version 2004, or a later version
of Windows.
Workaround
If you want to use boot-time OS security, we recommend that you use BitLocker or
similar technologies instead of the syskey.exe utility.
If you use Active Directory IFM media to install replica Active Directory domain
controllers, we recommend that you use BitLocker or other file encryption utilities to
protect all IFM media.
Unfortunately, the syskey encryption key and the use of syskey.exe are no longer
considered secure. Syskey is based on weak cryptography that can easily be broken in
modern times. The data that's protected by syskey is limited and doesn't cover all files
or data on the OS volume. The syskey.exe utility has also been known to be used by
hackers as part of ransomware scams.
Active Directory previously supported the use of an externally encrypted syskey for IFM
media. When a domain controller is installed by using IFM media, the external syskey
password had to be provided as well. Unfortunately, this protection suffers from the
same security flaws.
Reference
The syskey.exe utility and its underlying support in the Windows OS was first introduced
in Windows 2000 and backported to Windows NT 4.0. For more information, see How to
use the SysKey utility to help secure the Windows Security Accounts Manager
database .
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which the SYSVOL folder isn't replicated between
domain controllers that are running Windows Server 2012 R2, Windows Server 2012,
Windows Server 2008 R2, Windows Server 2008, or Windows Server 2003.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2986364
Symptoms
This issue can occur in one of the following conditions on a domain controller that is
running Windows Server:
You change the configuration of system devices or, the configuration of system
devices fails.
Corruption occurs in File Replication Service (FRS) database.
Event information
Event 13555:
File Replication Service is in an error state
Event 13552:
The File Replication Service is unable to add this computer to the following replica
set: "DOMAIN SYSTEM VOLUME (SYSVOL SHARE)"
These event logs indicate that the SYSVOL folder isn't replicated between domain
controllers. Therefore, this issue causes inconsistent Group Policy settings and the
incorrect policy result is set on each client computer.
Cause
This issue occurs because NTFS detects a firmware update as a configuration change in
disks and then changes the journal ID. Therefore, a file ID for data in the FRS database
doesn't match the file ID for the data in the update sequence number (USN) journal
database.
Workaround
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
To work around this issue, on domain controllers that the events are logged follow these
steps:
2. Stop the FRS. To do this, at the command prompt on each domain controller, type
the following command, and then press ENTER: net stop ntfrs
7 Note
3. Delete files in the following three folders to initialize the FRS on the reference
domain controller.
Don't delete the three folders. Delete subfolders and files in these three folders:
%systemroot%\ntfrs\jet
%systemroot%\sysvol\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory
%systemroot%\sysvol\staging\domainIf these folders and files aren't shown,
perform the additional steps to show the hidden files or folders.
p/Restore\Process at Startup
b. Right-click the BurFlags entry, and then click Modify.
c. In the Value data box, type D4, and then click OK.
d. Exit Registry Editor.
5. At the command prompt on the reference domain controller, run the following
command to restart the FRS: net start ntfrs
7 Note
6. Download and install the PsTools tool on other domain controllers. This tool
contains the PsExec command-line tools that can be used to delete folders under
the SYSVOL folder.
7. Delete files in the three folders below to initialize the FRS on other domain
controllers.
Don't delete the three folders. Delete subfolders and files in the following three
folders:
%systemroot%\ntfrs\jet
%systemroot%\sysvol\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory
%systemroot%\sysvol\staging\domainIf these folders and files aren't shown,
perform the additional steps to show the hidden files or folders.
%systemroot%\sysvol\domain\policies
%systemroot%\sysvol\domain\scripts
%systemroot%\sysvol\domain\policies_NTFRS_ xxxxxxx
%systemroot%\sysvol\domain\scripts_NTFRS_ xxxxxxx
%systemroot%\sysvol\domain\NtFrs_PreExisting__See_Evntlog
7 Note
Additionally, if the folders and files can't be deleted, follow these steps to delete
them by using the PsExec tool.
%systemroot%\sysvol\domain\policies
%systemroot%\sysvol\domain\scripts
%systemroot%\sysvol\domain\policies_NTFRS_ xxxxxxx
%systemroot%\sysvol\domain\scripts_NTFRS_ xxxxxxx
%systemroot%\sysvol\domain\NtFrs_PreExisting__See_Evntlog
7 Note
p/Restore\Process at Startup
10. At command prompt, run the following command to restart FRS on other domain
controllers: net start ntfrs
"Error" or "Warning" log entries will now not be recorded in event log. If
replication succeeded, event ID 13516 is recorded.
Check consistency by comparing files and folders in the SYSVOL folders
between all domain controllers.
12. Restart the FRS on the reference domain controller by running the following
command: net stop ntfrs && net start ntfrs
7 Note
After you complete all steps, check the FRS event log. Event IDs 13553, 13554 and 13516
are recorded within few minutes. These logs indicate SYSVOL replication finishes
correctly.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
More information
Show hidden files and folders in Windows Explorer:
2. From the Display tab, enable the Show hidden files and folders option.
7 Note
In Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008
R2, enable the Show hidden files, folders, and drives option in the View tab.
Feedback
Was this page helpful? Yes No
This article helps to fix the error "access is denied" on a domain controller when you try
to replicate the Active Directory directory service.
) Important
This article contains information about modifying the registry. Before you modify
the registry, make sure to back it up and make sure that you understand how to
restore the registry if a problem occurs. For information about how to back up,
restore, and edit the registry, click the following article number to view the article in
the Microsoft Knowledge Base: 256986 Description of the Microsoft Windows
Registry
Symptoms
When you try to replicate the Active Directory directory service to a domain controller
that is running Microsoft Windows Server 2003 with Service Pack 1 (SP1) or an x64-
based version of Microsoft Windows Server 2003, you receive the following error
message on the destination domain controller:
access is denied
Cause
This problem occurs when the value of the RestrictRemoteClients registry entry is 2.
Windows Server 2003 SP1 and x64-based versions of Windows Server 2003 read remote
procedure call (RPC) settings from this entry. If the entry has a value of 2, RPC traffic
must be authenticated. Therefore, Active Directory replication does not succeed. Other
RPC services on the domain controller may also be affected.
Resolution
2 Warning
If you use Registry Editor incorrectly, you may cause serious problems that may
require you to reinstall your operating system. Microsoft cannot guarantee that you
can solve problems that result from using Registry Editor incorrectly. Use Registry
Editor at your own risk.
To resolve this problem, enable port 135 on Windows Firewall, and then use one of the
following methods:
7 Note
By default, port 135 is blocked in Windows Server 2003 SP1 and in x64-based
versions of Windows Server 2003.
1. Click Start, click Run, type firewall.cpl, and then click OK.
6. Click to select the check box next to the new port, and then click OK.
7. Click Start, click Run, type regedit, and then click OK.
8. Use one of the following methods:
7 Note
Use Group Policy Object Editor to disable the Restrictions for Unauthenticated RPC
Clients Group Policy object. To do this, follow these steps:
1. Click Start, click Run, type gpedit.msc, and then click OK.
2. In the console tree, double-click Computer Configuration, double-click
Administrative Templates, double-click System, and then click Remote
Procedure Call.
3. Double-click Restrictions for Unauthenticated RPC clients, click Disable, and
then click OK.
4. Quit Group Policy Object Editor.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
More information
For additional information about the RestrictRemoteClients registry entry, visit the
following Microsoft Web site: RestrictRemoteClients registry key is enabled
Technical support for Windows x64 editions
Your hardware manufacturer provides technical support and assistance for Microsoft
Windows x64 editions. Your hardware manufacturer provides support because a
Windows x64 edition was included with your hardware. Your hardware manufacturer
might have customized the Windows x64 edition installation with unique components.
Unique components might include specific device drivers or might include optional
settings to maximize the performance of the hardware. Microsoft will provide
reasonable-effort assistance if you need technical help with your Windows x64 edition.
However, you might have to contact your manufacturer directly. Your manufacturer is
best qualified to support the software that your manufacturer installed on the hardware.
Feedback
Was this page helpful? Yes No
Symptoms
In a Windows 2000 domain that has multihomed domain controllers, Active Directory
communication, including replication, may fail intermittently.
Cause
This issue can occur if one of the network adapters is attached to an external network
(such as the Internet) on the multihomed domain controller, and if Lightweight Directory
Access Protocol (LDAP) and Kerberos traffic between the internal and external networks
is partially or completely restricted because of a Proxy, ISA Server, NAT Server, or
another firewall device.
In this scenario, network adapters on the multihomed domain controllers are registering
both the inside and outside Internet Protocol (IP) addresses with the DNS server. DNS
name resolution lookup requests return records in a "round robin" fashion, alternating
the internal and external IP addresses. Replication operations require multiple lookup
requests of SRV records. In this case, half of the DNS lookup requests return an IP
address that can't be contacted, and the replication operation fails.
Resolution
To resolve this issue:
4. Start the DNS Management Console, right-click the server name, and then click
Properties.
5. Click the Interfaces tab, and then remove the external IP address so that DNS does
not listen on it.
6. Open a command prompt, type ipconfig /flushdns, press ENTER, type ipconfig
/registerdns, and then press ENTER.
7. Change the binding order of your network adapters so that the Internal adapter is
the first bound adapter. To do this, follow these steps:
a. Click Start, click Settings, and then click Network and Dial-Up Connections.
b. On the Advanced menu, click Advanced.
c. Verify that the internal network adapter is listed first in the Connections box.
Status
This behavior is by design.
More information
For more information, click the following article numbers to view the articles in the
Microsoft Knowledge Base:
246804 How to enable or disable DNS updates in Windows 2000 and in Windows
Server 2003
Feedback
Was this page helpful? Yes No
This article provides a resolution to an issue where Active Directory Web Services
(ADWS) service crashes after you upgrade.
Symptoms
After you perform an in-place upgrade of a Microsoft Windows Server 2008 R2 domain
controller to Windows Server 2012 R2, the Active Directory Web Services (ADWS) service
crashes upon start.
Cause
This is a known issue concerning the product.
Resolution
To resolve this issue, reinstall the Microsoft .NET Framework 4.5.2 package .
Feedback
Was this page helpful? Yes No
This article describes the Active Directory database garbage collection process and
calculation of allowed intervals.
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019
Original KB number: 198793
Summary
The Active Directory database incorporates a garbage collection process that runs
independently on each domain controller in the enterprise.
More information
Garbage collection is a housekeeping process that is designed to free space within the
Active Directory database. This process runs on every domain controller in the enterprise
with a default lifetime interval of 12 hours. You can change this interval by modifying the
garbageCollPeriod attribute in the enterprise-wide DS configuration object (NTDS).
The path of the object in the Contoso.com domain would resemble the following:
CN=Directory Service,CN=Windows
NT,CN=Services,CN=Configuration,DC=CONTOSO,DC=COM
Use an Active Directory editing tool to set the garbageCollPeriod attribute. Supported
tools include Adsiedit.msc, Ldp.exe, and Active Directory Service Interfaces (ADSI)
scripts.
When an object is deleted, it is not removed from the Active Directory database. Instead,
the object is instead marked for deletion at a later date. This mark is then replicated to
other domain controllers. Therefore, the garbage collection process starts by removing
the remains of previously deleted objects from the database. These objects are known
as tombstones. Next, the garbage collection process deletes unnecessary log files.
Finally, the process starts a defragmentation thread to claim additional free space.
In addition, there are two methods to defragment the Active Directory database. One
method is an online defragmentation operation that runs as part of the garbage
collection process. The advantage of this method is that the server does not have to be
taken offline for the operation to run. However, this method does not reduce the size of
the Active Directory database file (Ntds.dit). The other method takes the server offline
and defragments the database by using the Ntdsutil.exe utility. This approach requires
that the database to start in repair mode. The advantage of this method is that the
database is resized and unused space is removed. Therefore, and the size of the Ntds.dit
file is reduced. To use this method, the domain controller must be taken offline.
The AD database layer enforces an additional metric. TSL days must not be smaller than
three times the garbage collector interval. Based on the Default of 12 hours, TSL is a
minimum of 2 days. If GC interval is 20 hours, the TSL minimum is 3 days (must be
bigger than 60 hours). If the GC interval is 25 hours, you get beyond three days (with 75
hours) and the TSL minimum is 4 days.
The catch with the checks both DB layer and KCC perform is that if TSL is lower than the
allowed minimum, it does not revert to the minimum value of 2 or more days, but to the
default of 60 or 180 days.
) Important
In case TSL is corrected to the default because of a mismatch, the value for the
garbage collection interval is also set to the default of 12 hours.
History
The default tombstone lifetime (TSL) in Windows Server 2003 was 60 days and was
proven to be too short. For example, a prestaged domain controller may be in transit for
longer than 60 days. An administrator may not resolve a replication failure or bring an
offline domain controller into operation until the TSL is exceeded. Windows Server 2003
Service Pack 1 (SP1) increased the TSL from 60 to 180 days in the following scenarios:
Windows Server 2003 SP1 does not modify the value of TSL when either of the following
conditions is true:
Increasing the TSL for a domain to 180 days has the following benefits:
Backups that are used in data recovery scenarios have a longer useful life.
System state backups that are used for installation from media promotions have a
longer useful life.
Domain controllers can be offline longer. Prestaged computers approach TSL
expiration less frequently.
A domain controller can successfully return to the domain after a longer time
offline.
Knowledge of deleted objects is retained longer on the originating domain
controller.
The default setting in your forest will depend on the OS at the 'birth' of the forest and
the upgrade methods from there as above.
If you are unsure about the value of TSL used in your forest, we recommend to explicitly
set it, and also msDS-deletedObjectLifetime as needed.
Reference: The AD Recycle Bin: Understanding, Implementing, Best Practices, and
Troubleshooting
Feedback
Was this page helpful? Yes No
This article explains how to recover from a corrupted Active Directory database or from
a similar problem that prevents your computer from starting in normal mode.
Summary
This article leads you through a series of steps that may help you diagnose the cause of
the Directory Services cannot start system error. These steps may include:
This article also tells you how to use Ntdsutil or Esentutl to perform a lossy repair of the
Active Directory database. Because a lossy repair deletes data and may introduce new
problems, only perform a lossy repair if it's the only available option.
Symptoms
When you start your domain controller, the screen may go blank, and you may receive
the following error message:
Please click OK to shutdown this system and reboot into directory services restore
mode, check the event log for more detailed information.
Additionally, the following event ID messages may appear in the event log:
Event ID: 700
Description: "NTDS (260) Online defragmentation is beginning a pass on database
NTDS.DIT."
Event ID: 701
Description: "NTDS (268) Online defragmentation has completed a full pass on
database 'C:\WINNT\NTDS\ntds.dit'."
Event ID: 101
Description: "NTDS (260) the database engine stopped."
Event ID: 1004
Description: "The directory was shut down successfully."
Event ID: 1168
Description: "Error: 1032 (fffffbf8) has occurred. (internal ID 4042b). Please contact
Microsoft product support services for assistance."
Event ID: 1103
Description: "The windows directory services database could not be initialized and
returned error 1032. Unrecoverable error, the directory can't continue."
Cause
This problem occurs because one or more of the following conditions are true:
The NTFS file system permissions on the root of the drive are too restrictive.
The NTFS file system permissions on the NTDS folder are too restrictive.
The drive letter of the volume that contains the Active Directory database has
changed.
The Active Directory database (Ntds.dit) is corrupted.
The NTDS folder is compressed.
Resolution
To resolve this problem, follow these steps:
5. Click Start, select Run, type cmd in the Open box, and then click OK.
6. At the command prompt, type ntdsutil files info.
Drive Information:
DS Path Information:
7 Note
The file locations that are included in this output are also found in the
following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
7. Verify that the files that are listed in the output in step 6 exist.
8. Verify that the folders in the Ntdsutil output have the correct permissions. The
correct permissions are specified in the following tables.
ノ Expand table
Local Service Create Folders / Append Data This folder and subfolders
Windows 2000
ノ Expand table
7 Note
9. Check the integrity of the Active Directory database. To do this, type ntdsutil files
integrity at the command prompt.
If the integrity check indicates no errors, restart the domain controller in normal
mode. If the integrity check doesn't finish without errors, continue to the following
steps.
10. Perform a semantic database analysis. To do this, type the following command at
the command prompt, including the quotation marks:
Console
11. If the semantic database analysis indicates no errors, continue to the following
steps. If the analysis reports any errors, type the following command at the
command prompt, including the quotation marks:
Console
13. If the problem still exists after the offline defragmentation, and there are other
functional domain controllers in the same domain, remove Active Directory from
the server, and then reinstall Active Directory. To do this, follow the steps in the
"Workaround" section in the following Microsoft Knowledge Base article:
332199 Domain controllers do not demote gracefully when you use the Active
Directory Installation Wizard to force demotion in Windows Server 2003 and in
Windows 2000 Server
7 Note
14. If no system state backup is available, and there are no other healthy domain
controllers in the domain, we recommend that you rebuild the domain by
removing Active Directory and then reinstalling Active Directory on the server,
creating a new domain. You can use the old domain name again or use a new
domain name. You can also rebuild the domain by reformatting and reinstalling
Windows on the server. However, removing Active Directory is quicker, and
effectively removes the corrupted Active Directory database.
7 Note
Although the domain controller may start and may appear to function correctly
after the repair, its state is unsupported because the data that is deleted from the
database can cause any number of problems that may not surface until later.
There's no way to determine what data was deleted when the database was
repaired. As soon as possible after the repair, you must rebuild the domain to
return Active Directory to a supported configuration. If you only use the offline
defragmentation or semantic database analysis methods that are referenced in this
article, you don't have to rebuild the domain controller afterward.
15. Before you perform a lossy repair, contact Microsoft Product Support Services to
confirm that you've reviewed all possible recovery options and to verify that the
database truly is in an unrecoverable state. For a complete list of Microsoft Product
Support Services phone numbers and information about support costs, visit the
following Microsoft Web site:
16. After the repair operation is complete, rename the .log files in the NTDS folder by
using a different extension such as .bak, and try to start the domain controller in
normal mode.
17. If you can start the domain controller in normal mode after the repair, migrate
relevant Active Directory objects to a new forest as soon as possible. Because this
lossy repair method fixes corruption by deleting data, it can cause later problems
that are extremely difficult to troubleshoot. At the first opportunity after the repair,
you must rebuild the domain to bring Active Directory back to a supported
configuration.
You can migrate users, computers, and groups by using the Active Directory
Migration Tool (ADMT), Ldifde, or a non-Microsoft migration tool. ADMT can
migrate user accounts, computer accounts, and security groups with or without the
security identifier (SID) history. ADMT also migrates user profiles. To use ADMT in a
Small Business Server environment, review the "Migrating from Small Business
Server 2000 or Windows 2000 Server" white paper. To obtain this white paper, visit
the following Microsoft Web site:
Migrating from Small Business Server 2000 or Windows 2000 Server to Windows
Small Business Server 2003
You can use Ldifde to export and import many types of objects from the damaged
domain to the new domain. These objects include user accounts, computer
accounts, security groups, organization units, Active Directory sites, subnets, and
site links. Ldifde can't migrate the SID history. Ldifde is part of Windows 2000
Server and Windows Server 2003.
For more information about how to use Ldifde, click the following article number
to view the article in the Microsoft Knowledge Base:
237677 Using Ldifde to import and export directory objects to Active Directory
You can use the Group Policy Management Console (GPMC) to export the file
system and the Active Directory part of the group policy object from the damaged
domain to the new domain.
For information about how to migrate group policy objects by using the GPMC,
review the "Migrate GPOs across domains with GPMC" white paper. To obtain this
white paper, visit the following Microsoft Web site:
18. After the recovery, evaluate your current backup plan to make sure that you have
scheduled system state backups frequently enough. Schedule system state
backups at least every day, or after every significant change. System state backups
must contain the required level of fault tolerance. For example, don't store backups
on the same drive as the computer that you're backing up. Whenever possible, use
more than one domain controller to avoid a single point of failure. Store backups
in an off-site location so that site disaster (fire, theft, flood, computer theft) doesn't
affect your ability to recover. The following Microsoft Web sites can help you
develop a backup plan.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where ESENT event IDs 1000, 1202, 412, and
454 are logged repeatedly in the Application log.
Symptoms
The following event IDs are logged every five minutes in the Application log:
1000
1202
412
454
Cause
This issue occurs if the local Group Policy database file is corrupt.
Resolution
To resolve this issue, use the procedure described in this section to re-create the local
Group Policy file.
) Important
When you use the following procedure, your computer is returned to the original
installation state where the Local Security Policy is not defined. You may have to
start your computer in Safe mode to rename or move files. For more information
about how to do this, see Windows 2000 Help.
1. Open the %SystemRoot%\Security folder, create a new folder, and then name it
"OldSecurity".
2. Move all of the files ending in .log from the %SystemRoot%\Security folder to the
OldSecurity folder.
3. Find the Secedit.sdb file in the %SystemRoot%\Security\Database folder, and then
rename this file to "Secedit.old".
4. Click Start, click Run, type mmc, and then click OK.
5. Click Console, click Add/Remove Snap-in, and then add the Security and
Configuration snap-in.
6. Right-click Security and Configuration and Analysis, and then click Open
Database.
7. Browse to the %TEMP% folder, type Secedit.sdb in the File name box, and then
click Open.
8. When you are prompted to import a template, click Setup Security.inf, and then
click Open.
9. Copy %TEMP%\Secedit.sdb %SystemRoot%\Security\Database.
Feedback
Was this page helpful? Yes No
This article provides solutions to an issue where event ID 5788 and event ID 5789 are
logged when the DNS domain name and the Active Directory domain name differ on a
Windows-based computer.
Symptoms
You may experience one of the following problems:
On Windows Vista and later versions, you receive the following error message
during interactive logon:
The security database on the server does not have a computer account for this
workstation trust relationship.
Interactive logons with domain-based accounts don't work. Only logons with local
accounts are functioning.
7 Note
Detailed error messages for these events are listed in the "Cause" section.
Cause
This behavior occurs when a computer tries but does not write to the dNSHostName
and servicePrincipalName attributes for its computer account in an Active Directory
Domain Services (AD DS) domain.
A computer tries to update these attributes if the following conditions are true:
The computer does not have sufficient permission to complete an LDAP modify
request of the dNSHostName or servicePrincipalName attributes for its computer
account.
In this case, the error messages that correspond to the events that are described in
the "Symptoms" section are as follows:
Event 5788
Access is denied.
Event 5789
The primary DNS suffix of the computer does not match the DNS name of the AD
DS domain of which the computer is a member. This configuration is known as a
"Disjoint namespace."
the primary DNS suffix does not match the Active Directory domain name.
In this case, the error messages that correspond to the events that are described in
the "Symptoms" section are as follows:
Event 5788
Event 5789
Resolution
To resolve this problem, find the most likely cause as described in the "Cause" section.
Then, use the resolution that is appropriate for the cause.
In the ACL Editor, make sure that there is an access control entry (ACE) for the trustee
account "SELF" and that it has "Allow" access for the following extended rights:
Then, verify any Deny permissions that may apply. Excluding the group memberships of
the computer, the following trustees also apply to the computer:
Everyone
Authenticated Users
SELF
The ACEs that apply to these trustees may also deny access to write to attributes, or
they may deny the "Validated write to DNS host name" or "Validated write to service
principal name" extended rights.
For more information about how to verify that the disjoint namespace is working
correctly on Windows Server 2003 R2, Windows Server 2003, Windows Server 2003 with
Service Pack 1 (SP1), and Windows Server 2003 with Service Pack 2 (SP2), see the
following Microsoft TechNet article: Create a Disjoint Namespace
For more information about how to verify that the disjoint namespace is working
correctly on Windows Server 2008 R2 and Windows Server 2008, see the following
Microsoft TechNet article: Create a Disjoint Namespace
By extending the example that is mentioned in the last major bullet point in the "Cause"
section, you would add nyc.contoso.com as an allowed suffix to the attribute.
More information
Older versions of this article mentioned changing the permissions on the computer
objects to enable general write access to resolve this problem. This was the only
approach that existed in Windows 2000. However, it is less secure than using msDS-
AllowedDNSSuffixes.
msDS-AllowedDNSSuffixes restrict the client from writing arbitrary SPNs into Active
Directory. The "Windows 2000 method" enables the client to write SPNs that block
Kerberos from working with other important servers (create duplicates). When you use
msDS-AllowedDNSSuffixes, SPN collisions such as those can occur only when the other
server has the same host name as the local computer.
A network trace of the response to the LDAP modify request displays the following
information:
win: 17368, src: 389 dst: 1044
LDAP: MessageID
LDAP: Error Message = 0000200B: AtrErr: DSID-03151E6D In this network trace, 200B
hexadecimal is equal to 8203 decimal.
The net helpmsg 8203 command returns the following information: The attribute syntax
specified to the directory service is invalid." Network Monitor 5.00.943 displays the
following result code: "Constraint Violation." Winldap.h maps error 13 to
"LDAP_CONSTRAINT_VIOLATION.
The DNS domain name and the Active Directory domain name can differ if one or more
of the following conditions are true:
The TCP/IP DNS configuration contains a DNS domain that differs from the Active
Directory domain of which the computer is a member, and the Change primary
DNS suffix when domain membership changes option is disabled. To view this
option, right-click My Computer, click Properties, and then click the Network
Identification tab.
Windows Server 2003-based or Windows XP Professional-based computers may
apply a Group Policy setting that sets the primary suffix to a value that differs from
the Active Directory domain. The Group Policy setting is as follows: Computer
Configuration\Administrative Templates\Network\DNS Client: Primary DNS Suffix
The domain controller is located in a domain that was renamed by the Rendom.exe
utility. However, the administrator did yet change the DNS suffix from the previous
DNS domain name. The domain rename process does not update the primary DNS
suffix to match the current DNS domain name following renames of DNS domain
names. Domains in an Active Directory forest that do not have the same
hierarchical domain name are in a different domain tree. When different domain
trees are in a forest, the root domains are not contiguous. However, this
configuration does not create a disjoint DNS namespace. You have multiple DNS
or even Active Directory DNS root domains. A disjoint namespace is characterized
by a difference between the primary DNS suffix and the Active Directory domain
name of which the computer is a member.
Disjoint namespace can be used with caution in some scenarios. However, it is not
supported in all scenarios.
Feedback
Was this page helpful? Yes No
This article describes the steps to complete a semantic database analysis for the Active
Directory database by using Ntdsutil.exe
Summary
This step-by-step article describes how to run the semantic checker on the Active
Directory database. Unlike the file management commands, which test the integrity of
the database with respect to the ESENT database semantics, the semantic analysis
analyzes the data with respect to Active Directory semantics. You can use this process to
generate reports on the number of records present, including deleted and phantom
records.
The Windows 2000 Directory service opens its files in Exclusive mode. This means that
the files can't be managed while the computer is operating as a domain controller. The
first procedure is to boot your server into Directory Services Restore mode.
Starting Ntdsutil.exe
1. Click Start, and then click Run.
2. In the Open box, type ntdsutil, and then press ENTER. Note that you can view
Ntdsutil.exe Help by typing ? at the command prompt, and then pressing ENTER.
1. At the Ntdsutil.exe command prompt, type Semantic database analysis, and then
press ENTER.
2. At the Semantic Checker command prompt, type Go, and then press ENTER.
3. Verification is displayed. To exit, type q, press ENTER, type q, and then press ENTER.
1. At the Ntdsutil.exe command prompt, type Semantic database analysis, and then
press ENTER.
2. At the Semantic Checker command prompt, type Go, and then press ENTER.
3. At the Semantic Checker command prompt, type Get DNT record number, and then
press ENTER.
4. Verification is displayed. To exit, type q, press ENTER, type q, and then press ENTER.
Feedback
Was this page helpful? Yes No
This article describes how to manage the Active Directory (AD) database file, Ntds.dit,
from the command line.
To start the server in Directory Services Restore mode, follow these steps:
1. Insert the Windows Server 2003 installation CD in the CD-ROM or DVD-ROM drive.
2. Select Start, select Run, type drive_letter :\Support\Tools\suptools.msi , and
then press ENTER.
To start Ntdsutil, select Start, select Run, type ntdsutil in the Open box, and then press
ENTER.
7 Note
To access the list of available commands, type ?, and then press ENTER.
1. Select Start, select Run, type ntdsutil in the Open box, and then press ENTER.
2. At the Ntdsutil command prompt, type files, and then press ENTER.
3. At the file maintenance command prompt, type move DB to new location (where
new location is an existing folder that you've created for this purpose), and then
press ENTER.
4. To quit Ntdsutil, type quit, and then press ENTER.
5. Restart the computer.
1. Select Start, select Run, type ntdsutil in the Open box, and then press ENTER.
2. At the Ntdsutil command prompt, type files, and then press ENTER.
3. At the file maintenance command prompt, type move logs to new location (where
new location is an existing folder that you've created for this purpose), and then
press ENTER.
4. Type quit, and then press ENTER.
5. Restart the computer.
1. Select Start, select Run, type ntdsutil in the Open box, and then press ENTER.
2. At the Ntdsutil command prompt, type files, and then press ENTER.
3. At the file maintenance command prompt, type recover, and then press ENTER.
4. Type quit, and then press ENTER.
5. Restart the computer.
7 Note
You can also use Esentutl.exe to perform database recovery when the procedure
described earlier in this article fails (for example, the procedure may fail when the
database is inconsistent). To use Esentutl.exe to perform database recovery, follow
these steps:
1. Select Start, select Run, type cmd in the Open box, and then press ENTER.
2. Type esentutl /r path \ntds.dit, and then press ENTER. path refers to the current
location of the Ntds.dit file.
3. Delete the database log files (.log) from the WINDOWS\Ntds folder.
4. Restart the computer.
For additional information about the esentutl.exe utility, at the command prompt, type
esentutl /?, and then press ENTER.
7 Note
This procedure involves transaction logs to recover data. Transaction logs are used
to make sure that committed transactions are not lost if your computer fails or if it
experiences unexpected power loss. Transaction data is written first to a log file,
and then it is written to the data file. After you restart the computer after it fails,
you can rerun the log to reproduce the transactions that were committed but that
were not recorded to the data file.
Backup: Use this parameter with the set path command to set the disk-to-disk
backup target to the folder that is specified by the location variable. You can
configure Directory Service to do an online disk-to-disk backup at scheduled
intervals.
Database: Use this parameter with the set path command to update the part of the
registry that identifies the location and file name of the data file. Use this
command only to rebuild a domain controller that has lost its data file and that
isn't being restored by means of typical restoration procedures.
Logs: Use this parameter with the set path command to update the part of the
registry that identifies the location of the log files. Use this command only if you're
rebuilding a domain controller that has lost its log files and isn't being restored by
means of typical restoration procedures.
Working Directory: Use this parameter with the set path command to set the part
of the registry that identifies Directory Service's working folder to the folder that is
specified by the location variable. To run the set path command, follow these steps:
1. Select Start, select Run, type ntdsutil in the Open box, and then press ENTER.
2. At the Ntdsutil command prompt, type files, and then press ENTER.
3. At the file maintenance command prompt, type set path object location, and then
press ENTER. object refers to one of the following items:
Backup
Database
Logs
Working Directory
location refers to the location (folder) to which you want to set the object
identified in the command.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where the IsmServ service doesn't start
correctly when a domain controller starts.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4530043
Symptoms
When you start a Windows Server domain controller (DC), it does not start correctly.
When you check the System log in Event Viewer, you find the following entry for Event
ID 7023:
The param1 parameter value, IsmServ: This represents the Intersite Messaging
service (ISMserv.exe).
The param2 parameter value, 58: This maps to the ERROR_BAD_NET_RESP
message ("The specified server cannot perform the requestedoperation").
To collect more information about this problem, you can configure LDAP Event Tracing
for Windows (ETW) to run at system startup. (For details about how to do this, see More
information.) After you restart the DC, you should see the following lines in the log:
In this event, the value of the error parameter (0x5b or 91) maps to the
LDAP_CONNECT_ERROR message.
Cause
ISMServ depends on Active Directory Domain Services (AD DS). However, during system
startup, ISMServ may try to create an LDAP connection to AD DS before AD DS finishes
coming online. When this happens, the LDAP port (TCP port 389) is not available when
ISMServ tries to connect. Because the port is not listening, ISMServ determines that the
connection has failed without waiting for the connection time-out period (45 seconds).
Therefore, ISMServ does not start.
Workaround
To immediately work around this problem, manually restart ISMServ.
To avoid this problem in the future, use the Services and Applications MMC snap-in to
change the Startup Type of ISMServ from Automatic to Automatic (Delayed Start).
More information
To configure LDAP ETW, follow these steps:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ldap\Tracing\ISMSERV.EXE
2. Open an elevated Command Prompt window, and run the following commands:
Console
4. After the computer starts, run the following command at an elevated command
prompt:
Console
5. When you finish collecting data, run the following command at an elevated
command prompt to stop tracing:
Console
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
at the beginning of this article.
References
How to turn on debug logging of the LDAP client (Wldap32.dll)
Feedback
Was this page helpful? Yes No
This article solves a problem that the Adprep /rodcprep command isn't completed
successfully because the infrastructure master for one or more active directory NDNCs
isn't reachable.
Symptoms
When you run the Adprep /rodcprep command on Windows Server 2008, you receive
the following error message:
Adprep encountered an LDAP error. Error code: 0x0. Server extended error code:
0x0, Server error message: (null).
The partition or the partitions that are referenced in the error message no longer
exist.
The infrastructure master for the referenced partition or partitions has been
forcefully demoted or is offline.
Resolution
To resolve this problem if the partition no longer exists, do a metadata cleanup for the
orphaned partition using the "remove nc" parameter of the Dsmgmt tool. For more
information, visit the following Microsoft Web site:
partition management
If the specified partition exists, specify an infrastructure role owner that is online for the
partition. You can do it by manually modifying the fSMORoleOwner attribute on the
object, as described in the "More information" section.
More information
The following script sample modifies the fSMORoleOwner attribute on the
infrastructure object of the specified Non-Domain Naming Context (NDNC) to an active,
or contactable, server. The NDNC in this sample is the
DomainDnsZones,DC=contoso,DC=com NDNC naming context. The script uses the
following command:
VB
VB
'-------fixfsmo.vbs------------------
const ADS_NAME_INITTYPE_GC = 3
const ADS_NAME_TYPE_1779 = 1
const ADS_NAME_TYPE_CANONICAL = 2
if (inArgs.Count = 1) then
' Assume the command line argument is the NDNC (in DN form) to use.
NdncDN = inArgs(0)
Else
Wscript.StdOut.Write "usage: cscript fixfsmo.vbs NdncDN"
End if
' Convert the DN form of the NDNC into DNS dotted form.
Set objTranslator = CreateObject("NameTranslate")
objTranslator.Init ADS_NAME_INITTYPE_GC, ""
objTranslator.Set ADS_NAME_TYPE_1779, NdncDN
strDomainDNS = objTranslator.Get(ADS_NAME_TYPE_CANONICAL)
strDomainDNS = Left(strDomainDNS, len(strDomainDNS)-1)
' Find a domain controller that hosts this NDNC and that is online.
set objRootDSE = GetObject("LDAP://" & strDomainDNS & "/RootDSE")
strDnsHostName = objRootDSE.Get("dnsHostName")
strDsServiceName = objRootDSE.Get("dsServiceName")
Wscript.Echo "Using DC " & strDnsHostName
' If the current fsmo holder is deleted, set the fsmo holder to this
domain controller.
End if
End if
You can use tools such as the LDP tool, the Active Directory Service Interfaces (ADSI) Edit
tool, and the ldifde tool to do these queries. For example, the following query uses the
Idifde tool:
ldifde -f Infra_DomainDNSZones.ldf -d
"CN=Infrastructure,DC=DomainDnsZones,DC=contoso,DC=com" -l fSMORoleOwner
This query returns the infrastructure master role owner for the
DC=DomainDnsZones,DC=contoso,DC=com partition to the
Infra_DomainDNSZones.ldf file.
7 Note
You can run the Adprep /rodcprep command multiple times without harming the
forest. Operations that were completed in earlier executions of the rodcprep
command aren't repeated.
If you try to run the rodcprep command in an isolated environment, the infrastructure
master for each domain and for each application directory partition must be available
within the environment for the operation to succeed.
Feedback
Was this page helpful? Yes No
The article provides step-by-step instructions to implement Service for User to Proxy
(S4U2Proxy) or Kerberos Only Constrained Delegation on a custom service account for
Web Enrollment proxy pages.
Applies to: Window Server 2016, Window Server 2019, Windows Server 2012 R2
Original KB number: 4494313
Summary
This article provides step-by-step instructions to implement Service for User to Proxy
(S4U2Proxy) or Kerberos-only constrained delegation for Web Enrollment proxy pages.
This article describes the following configuration scenarios:
7 Note
The workflows that are described in this article are specific to a particular
environment. The same workflows may not work for a different situation. However,
the principles remain the same. The following figure summarizes this environment.
1. In Active Directory Users and Computers, connect to the domain, and then select
PKI > PKI Users.
2. Right-click the service account (for example, web_svc), and then select Properties.
4. Type the new SPN string, select Add (as shown in the following figure), and then
select OK.
You can also use Windows PowerShell to configure the SPN. To do this, open an
elevated PowerShell window, and then run setspn -s SPN Accountname . For
example, run the following command:
Console
3. In the console tree, select Computers, and then select the computer account of the
Web Enrollment front-end server.
7 Note
2. In the console tree, select <HostName>, and then select Server Certificates.
7 Note
<HostName> is the name of the front-end web server.
4. After the certificate is created, select Default Web Site in the console tree, and
then select Bindings.
5. Make sure that Port is set to 443. Then under SSL certificate, select the certificate
that you created in step 3.
) Important
Make sure that the service account is part of either the local administrators or
IIS_Users group on the web server.
2. Select Process Model > Identity, select Custom account, and then select Set.
Specify the name and password of the service account.
3. Select OK in the Set Credentials and Application Pool Identity dialog boxes.
4. In Advanced Settings, locate Load User Profile, and make sure that it's set to True.
For example, suppose the computer name of your Web Enrollment server is
WEBENROLLMAC (in the Contoso domain). You want incoming connections to use the
name ContosoWebEnroll instead. In this case, the connection URL would be the
following:
https://contosowebenroll.contoso.com/certsrv
https://WEBENROLLMAC.contoso.com/certsrv
1. In the DNS zone file for the domain, create an alias record or a host name record
that maps the new connection name to the Web Enrollment role IP address. Use
the Ping tool to test the routing configuration.
In the example that was previously discussed, the Contoso.com zone file has an
alias record that maps ContosoWebEnroll to the IP address of the Web Enrollment
role.
2. Configure the new name as an SPN for the Web Enrollment front-end server. To do
this, follow these steps:
a. In Active Directory Users and Computers, connect to the domain, and then
select Computers.
b. Right-click the computer account of the Web Enrollment front-end server, and
then select Properties.
7 Note
In this string, <ConnectionName> is the new name that you have defined,
and <DomainName> is the name of the domain. In the example, the string
is HTTP/ContosoWebEnroll.contoso.com.
2. Right-click the computer account of the Web Enrollment front-end server, and
then select Properties.
7 Note
3. Select Delegation, and then select Trust this computer for delegation to specified
services only.
7 Note
If you can guarantee that clients will always use Kerberos authentication when
they connect to this server, select Use Kerberos only. If some clients will use
other authentication methods, such as NTLM or forms-based authentication,
select Use any authentication protocol.
2. Create and bind the SSL certificate for web enrollment
To enable the web enrollment pages, create a domain certificate for the website, and
then bind it to the default first site. To do this, follow these steps:
2. In the console tree, select <HostName>, and then select Server Certificates in the
actions pane.
7 Note
<HostName> is the name of the front-end web server.
4. After the certificate is created, select Default Web Site, and then select Bindings.
5. Make sure that Port is set to 443. Then, under SSL certificate, select the certificate
that you created in step 3. Select OK to bind the certificate to port 443.
3. In Advanced Properties, locate Load User Profile, and then make sure that it's set
to True.
4. Restart the IIS service.
Related topics
For more information about these processes, see Authenticating Web Application Users.
For more information about the S4U2self and S4U2proxy protocol extensions, see the
following articles:
Feedback
Was this page helpful? Yes No
Provide product feedback
Domain controller promotion process
shows the Windows Server Technical
Preview option in the Domain and
Forest functional level list
Article • 02/19/2024
Symptoms
Consider the following scenario:
However, on the second page of the DC promotion Wizard, you notice that both the
Forest and Domain functional levels show an incorrect version of Windows, as in the
following screenshot:
You expect the DC Promotion Wizard to show Windows Server 2016 instead of
Windows Server Technical Preview.
7 Note
The Windows Server 2016 Domain and Forest functional levels are not affected
functionally.
Cause
This issue occurs because the display string was not updated in the Forest and Domain
functional levels before the release of Windows Server 2016.
Resolution
To resolve this issue, apply the latest cumulative update for Windows Server 2016 from
Windows Update before you promote a computer to a domain controller.
Feedback
Was this page helpful? Yes No
This article describes how to configure a firewall for Active Directory domains and trusts.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Standard, Windows Server 2012 Standard
Original KB number: 179442
7 Note
Not all the ports that are listed in the tables here are required in all scenarios. For
example, if the firewall separates members and DCs, you don't have to open the
FRS or DFSR ports. Also, if you know that no clients use LDAP with SSL/TLS, you
don't have to open ports 636 and 3269.
More information
7 Note
The two domain controllers are both in the same forest, or the two domain
controllers are both in a separate forest. Also, the trusts in the forest are Windows
Server 2003 trusts or later version trusts.
ノ Expand table
NetBIOS ports as listed for Windows NT are also required for Windows 2000 and
Windows Server 2003 when trusts to domains are configured that support only
NetBIOS-based communication. Examples are Windows NT-based operating systems or
third-party Domain Controllers that are based on Samba.
For more information about how to define RPC server ports that are used by the LSA
RPC services, see:
For more information about the dynamic port range change in Windows Server 2012
and Windows Server 2012 R2, see:
ノ Expand table
NetBIOS ports as listed for Windows NT are also required for Windows 2000 and Server
2003 when trusts to domains are configured that support only NetBIOS-based
communication. Examples are Windows NT-based operating systems or third-party
Domain Controllers that are based on Samba.
(*) For information about how to define RPC server ports that are used by the LSA RPC
services, see:
(**) For the operation of the trust this port is not required, it is used for trust creation
only.
7 Note
External trust 123/UDP is only needed if you have manually configured the
Windows Time Service to Sync with a server across the external trust.
Active Directory
The Microsoft LDAP client uses ICMP ping when a LDAP request is pending for extended
time and it waits for a response. It sends ping requests to verify the server is still on the
network. If it does not receive ping responses, it fails the LDAP request with
LDAP_TIMEOUT.
The Windows Redirector also uses ICMP Ping messages to verify that a server IP is
resolved by the DNS service before a connection is made, and when a server is located
by using DFS. If you want to minimize ICMP traffic, you can use the following sample
firewall rule:
Unlike the TCP protocol layer and the UDP protocol layer, ICMP does not have a port
number. This is because ICMP is directly hosted by the IP layer.
By default, Windows Server 2003 and Windows 2000 Server DNS servers use ephemeral
client-side ports when they query other DNS servers. However, this behavior may be
changed by a specific registry setting. Or, you can establish a trust through the Point-to-
Point Tunneling Protocol (PPTP) compulsory tunnel. This limits the number of ports that
the firewall has to open. For PPTP, the following ports must be enabled.
ノ Expand table
7 Note
When you add permissions to a resource on a trusting domain for users in a trusted
domain, there are some differences between the Windows 2000 and Windows NT
4.0 behavior. If the computer cannot display a list of the remote domain's users,
consider the following behavior:
Windows NT 4.0 tries to resolve manually typed names by contacting the PDC
for the remote user's domain (UDP 138). If that communication fails, a
Windows NT 4.0-based computer contacts its own PDC, and then asks for
resolution of the name.
Windows 2000 and Windows Server 2003 also try to contact the remote user's
PDC for resolution over UDP 138. However, they do not rely on using their
own PDC. Make sure that all Windows 2000-based member servers and
Windows Server 2003-based member servers that will be granting access to
resources have UDP 138 connectivity to the remote PDC.
Reference
Service overview and network port requirements for Windows is a valuable resource
outlining the required network ports, protocols, and services that are used by Microsoft
client and server operating systems, server-based programs, and their subcomponents
in the Microsoft Windows Server system. Administrators and support professionals may
use the article as a roadmap to determine which ports and protocols Microsoft
operating systems and programs require for network connectivity in a segmented
network.
You should not use the port information in Service overview and network port
requirements for Windows to configure Windows Firewall. For information about how
to configure Windows Firewall, see Windows Firewall with Advanced Security.
Feedback
Was this page helpful? Yes No
This article describes how to raise Active Directory domain and forest functional levels.
Summary
For information about Windows Server 2016 and new features in Active Directory
Domain Services (AD DS), see What's new in Active Directory Domain Services for
Windows Server 2016.
This article discusses raising the domain and forest functional levels that are supported
by Microsoft Windows Server 2003-based or newer domain controllers. There are four
releases of Active Directory, and only the levels that have changed from Windows NT
Server 4.0 require special consideration. Therefore, the other level changes are
mentioned by using the newer, current, or older versions of the domain controller
operating system, of the domain, or of the forest functional level.
Functional levels are an extension of the mixed mode and the native mode concepts
that were introduced in Microsoft Windows 2000 Server to activate new Active Directory
features. Some additional Active Directory features are available when all the domain
controllers are running the newest Windows Server version in a domain or in a forest,
and when the administrator activates the corresponding functional level in the domain
or in the forest.
To activate the newest domain features, all the domain controllers must be running the
newest Windows Server operating system version in the domain. If this requirement is
met, the administrator can raise the domain functional level.
To activate the newest forest-wide features, all the domain controllers in the forest must
be running the Windows Server operating system version that corresponds to the
desired forest functional level. Additionally, the current domain functional level must
already be at the newest level. If these requirements are met, the administrator can raise
the forest functional level.
Generally, the changes to the domain and forest functional levels are irreversible. If the
change can be undone, a forest recovery must be used. With the Windows Server 2008
R2 operating system, the changes to domain functional levels and to forest functional
levels can be rolled back. However, the rollback can be performed in only the specific
scenarios that are described in the Technet article about the Active Directory functional
levels.
7 Note
The newest domain functional levels and the newest forest functional levels affect
only the way that the domain controllers operate together as a group. The clients
that interact with the domain or with the forest are unaffected. Additionally,
applications are unaffected by changes to the domain functional levels or to the
forest functional levels. However, applications can take advantage of the newest
domain features and of the newest forest features.
For more information, view the TechNet article about the features associated with
the various functional levels.
U Caution
Do not raise the functional level if the domain has or will have a domain controller
that is of an earlier version than the version that is cited for that level. For example,
a Windows Server 2008 functional level requires that all domain controllers have
Windows Server 2008 or a later operating system installed in the domain or in the
forest. After the domain functional level is raised to a higher level, it can only be
changed back to an older level by using a forest recovery. This restriction exists
because the features often change the communication between the domain
controllers, or because the features change the storage of the Active Directory data
in the database.
The most common method to enable the domain and forest functional levels is to use
the graphical user interface (GUI) administration tools that are documented in the
TechNet article about Windows Server 2003 Active Directory functional levels. This
article discusses Windows Server 2003. However, the steps are the same in the newer
the operating system versions. Additionally, the functional level can be manually
configured or can be configured by using Windows PowerShell scripts. For more
information about how to manually configure the functional level, see the "View and set
the functional level" section.
For more information about how to use Windows PowerShell script to configure the
functional level, view Raise the Forest Functional Level.
7 Note
After you use the Lightweight Directory Access Protocol (LDAP) tools to edit the
functional level, click OK to continue. The attributes on the partitions container and on
the domain head are correctly increased. If an error message is report by the Ldp.exe
file, you can safely ignore the error message. To verify that the level increase was
successful, refresh the attribute list, and then check the current setting. This error
message may also occur after you have performed the level increase on the
authoritative FSMO if the change has not yet replicated to the local domain controller.
After you connect to a domain controller, the RootDSE information for the domain
controller appears. This information includes information on the forest, domain, and
domain controllers. The following is an example of a Windows Server 2003-based
domain controller. In the following example, assume that the domain mode is Windows
Server 2003 and that the forest mode is Windows 2000 Server.
7 Note
The domain controller functionality represents the highest possible functional level
for this domain controller.
1> domainFunctionality: 2=(DS_BEHAVIOR_WIN2003)
1> forestFunctionality: 0=(DS_BEHAVIOR_WIN2000)
1> domainControllerFunctionality: 2=(DS_BEHAVIOR_WIN2003)
If you do not change the domain mode to native mode before you raise the
domain level, the operation is not completed successfully, and you receive the
following error messages:
SV_PROBLEM_WILL_NOT_PERFORM
ERROR_DS_ILLEGAL_MOD_OPERATION
Output
Active Directory could not update the functional level of the following
domain because the domain is in mixed mode.
In this scenario, you can change the domain mode to native mode by using the
Active Directory Users & Computers snap-in, by using the Active Directory
Domains & Trusts UI MMC snap-in, or by programmatically changing the value of
the ntMixedDomain attribute to 0 on the domainDNS object. When this process is
used to raise the domain functional level to 2 (Windows Server 2003), the domain
mode is automatically changed to native mode.
The transition from mixed mode to native mode changes the scope of the Schema
Administrators security group and the Enterprise Administrators security group to
universal groups. When these groups have been changed to universal groups, the
following message is logged in the System log:
Output
When the Windows Server 2003 administrative tools are used to invoke the
domain functional level, both the ntmixedmode attribute and the
msdsBehaviorVersion attribute are modified in the correct order. However, this
does not always occur. In the following scenario, the native mode is implicitly set
to a value of 0 without changing the scope for the Schema Administrators security
group and the Enterprise Administrators security group to universal:
The msdsBehaviorVersion attribute that controls the domain functional mode is
manually or programmatically set to the value of 2.
The forest functional level is set to 2 by using any method. In this scenario, the
Domain controllers block the transition to the forest functional level until all of
the domains that are in the local area network are configured to native mode
and the required attribute change is made in the security group scopes.
There are many considerations when raising the operating system level of the domain
controller. These considerations are caused by the storage and replication limitations of
the linked attributes in Windows 2000 Server modes.
Domains that are upgraded from Windows NT 4.0 or created by the promotion of a
Windows Server 2003-based computer operate at the Windows 2000 mixed functional
level. Windows 2000 Server domains maintain their current domain functional level
when Windows 2000 Server domain controllers are upgraded to the Windows Server
2003 operating system. You can raise the domain functional level to either Windows
2000 Server native or Windows Server 2003.
Windows Server 2003 interim provides two important enhancements while still
permitting replication to Windows NT 4.0 BDCs:
1. Efficient replication of security groups, and support for more than 5000 members
per group.
2. Improved KCC inter-site topology generator algorithms.
Because of the efficiencies in group replication that is activated in the interim level, the
interim level is the recommended level for all Windows NT 4.0 upgrades. See the "Best
Practices" section of this article for more details.
Windows Server 2003 interim can be activated in three different ways. The first two
methods are highly recommended. This is because security groups use linked value
replication (LVR) after the Windows NT 4.0 domain's primary domain controller (PDC)
has been upgraded to a Windows Server 2003 domain controller. The third option is less
highly recommended because membership in security groups uses a single multi-valued
attribute, which may result in replication issues. The ways in which Windows Server 2003
interim can be activated are:
The option is presented in the Dcpromo installation wizard when you upgrade the
PDC of a Windows NT 4.0 domain that serves as the first domain controller in the
root domain of a new forest.
2. Before you upgrade the Windows NT 4.0 PDC of a Windows NT 4.0 as the first
domain controller of a new domain in an existing forest by manually configuring
the forest functional level by using Lightweight Directory Access Protocol (LDAP)
tools.
Child domains inherit the forest-wide functionality settings from the forest they are
promoted into. Upgrading the PDC of a Windows NT 4.0 domain as a child domain
in an existing Windows Server 2003 forest where interim forest functional levels
had been configured by using the Ldp.exe file or the Adsiedit.msc file permits
security groups to use linked value replication after the operating system version
upgrade.
3. After the upgrade by using LDAP tools.
Use the last two options when you join an existing Windows Server 2003 forest
during an upgrade. This is a common scenario when an "empty root" domain is in
position. The upgraded domain is joined as a child of the empty root and inherits
the domain setting from the forest.
Best practices
The following section discusses the best practices for increasing functional levels. The
section is broken into two parts. "Preparation Tasks" discusses the work that you must
do before the increase and "Optimal Paths Increase" discusses the motivations and
methods for different level increase scenarios.
1. From any Windows Server 2003-based domain controller, open Active Directory
Users and Computers.
5. Click the domain for which you want to change the functional level.
7. In the Enter LDAP query box, type the following and leave no spaces between any
characters: (&(objectCategory=computer)(operatingSystem Version=4*)
(userAccountControl:1.2.840.113556.1.4.803:=8192))
7 Note
A domain controller may appear in the list for any of the following reasons:
Before you can change the domain functional level to Windows Server 2003, you must
physically locate any domain controller in the list, determine the current status of the
domain controller, and then either upgrade or remove the domain controller as
appropriate.
7 Note
Unlike the Windows Server 2000 domain controllers, the Windows NT 4.0 domain
controllers do not block a level increase. When you change the domain functional
level, replication to the Windows NT 4.0 domain controllers will stop. However,
when you try to increase to Windows Server 2003 forest level with domains in
Windows Server 2000, the mixed level is blocked. The lack of Windows NT 4.0 BDCs
is implied by meeting the forest level requirement of all domains at Windows
Server 2000 native level or later.
For more information, click the following article number to view the article in the
Microsoft Knowledge Base:
216498 How to remove data in active directory after an unsuccessful domain
controller demotion
To verify that End to End replication is working in the forest, use the Windows Server
2003 or newer version of Repadmin against the Windows Server 2000 or the Windows
Server 2003 domain controllers:
Verify the compatibility of all programs or services with the newer Windows Server
domain controllers and with the higher Windows Server domain and forest mode. Use a
lab environment to thoroughly test production programs and services for compatibility
issues. Contact vendors for confirmation of capability.
Disconnect at least two domain controllers from each domain in the forest.
Create a system state backup of at least two domain controllers from each domain
in the forest.
Before the back-out plan can be used, all domain controllers in the forest must be
decommissioned before the recovery process.
7 Note
Level increases cannot be authoritatively restored. This means that all domain
controllers that have replicated the level increase must be decommissioned.
After all the previous domain controllers are decommissioned, bring up the
disconnected domain controllers or restore the domain controllers from the backup.
Remove the metadata from all the other domain controllers, and then repromote them.
This is a difficult process and must be avoided.
The forest-wide level increase is only performed one time. You do not have to
manually increase each domain in the forest to the Windows Server 2003 domain
functional level.
A check for Windows Server 2000 domain controllers is performed before the level
increase (see preparation steps). The increase is blocked until problem domain
controllers are removed or upgraded. A detailed report can be generated by listing
the blocking domain controllers and providing actionable data.
A check for domains in Windows Server 2000 mixed or Windows Server 2003
interim level is performed. The increase is blocked until the domain levels are
increased to at least Windows Server 2000 native. Interim level domains must be
increased to Windows Server 2003 domain level. A detailed report can be
generated by listing the blocking domains.
A reason to avoid using interim mode is if there are plans to implement Windows Server
2000 domain controllers after the upgrade, or at any time in the future.
In mature Windows NT 4.0 domains, security groups that contain far more than 5000
members may exist. In Windows NT 4.0, when a member of a security group changes,
only the membership single change is replicated to the backup domain controllers. In
Windows Server 2000, group memberships are linked attributes stored in a single multi-
valued attribute of the group object. When a single change is made to the membership
of a group, the whole group is replicated as a single unit. Because the group
membership is replicated as a single unit, there is a potential for updates to group
membership to be "lost" when different members are added or removed at the same
time at different domain controllers. Additionally, the size of this single object may be
more than the buffer used to commit an entry into the database. For more information,
see the "Version Store Issues with Large Groups" section of this article. For these
reasons, the recommended limit for group members is 5000.
The exception to the 5000 member rule is the primary group (by default this is the
"Domain Users" group). The primary group uses a "computed" mechanism based on the
"primarygroupID" of the user to determine membership. The primary group does not
store members as multi-valued linked attributes. If the primary group of the user is
changed to a custom group, their membership in the Domain Users group is written to
the linked attribute for the group and is no longer calculated. The new primary group
Rid is written to "primarygroupID" and the user is removed from the member attribute
of the group.
If the administrator does not select the interim level for the upgrade domain, you must
follow these steps before the upgrade:
1. Inventory all large groups and identify any groups over 5000, except the domain
users group.
2. All groups that have more than 5000 members must be broken into smaller groups
of less than 5000 members.
3. Locate all Access Control Lists where the large groups were entered and add the
small groups that you created in step 2.Windows Server 2003 interim forest level
relieves administrators from having to discover and reallocate global security
groups with more than 5000 members.
As updates to the database are continually occurring locally and from replication
partners, Active Directory provides a static state by queuing up all incoming changes
until the long-running operation is finished. As soon as the operation is finished, the
queued changes are applied to the database.
The storage location for these queued changes is referred to as the "version store," and
is approximately 100 megabytes. The size of version store varies and is based on the
physical memory. If a long-running operation does not finish before the version store is
exhausted, the domain controller will stop accepting updates until the long-running
operation and the queued changes are committed. Groups that reach large numbers
(more than 5000 members) put the domain controller at risk of exhausting the version
store as long as the large group is committed.
Windows Server 2003 introduces a new replication mechanism for linked multi-valued
attributes that is called link value replication (LVR). Instead of replicating the whole
group in a single replication operation, LVR addresses this issue by replicating each
group member as a separate replication operation. LVR becomes available when the
forest functional level is raised to Windows Server 2003 interim forest level or to
Windows Server 2003 forest level. In this functional level, LVR is used to replicate groups
among Windows Server 2003 domain controllers.
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016
Try our Virtual Agent - It can help you quickly identify and fix common Active
Introduction to troubleshooting
ノ Expand table
Phase Log
- %systemroot%\debug\adprep\<datetime>\csv.log
- %systemroot%\debug\adprep\<datetime>\dspecup.log
- %systemroot%\debug\adprep\<datetime>\ldif.log*
- %systemroot%\servicing\sessions\sessions.xml
- %systemroot%\winsxs\poqexec.log
- %systemroot%\winsxs\pending.xml
Dcdiag.exe
Repadmin.exe
AutoRuns.exe, Task Manager, and MSInfo32.exe
Network Monitor 3.4 (or a third party network capture and analysis tool)
a. Examine the results carefully: many errors have explanations such as bad
passwords, network name resolution, or critical offline domain controllers.
b. Examine the Dcpromoui.log and dcpromo.log for the errors shown in the output,
then work backwards from them to see indications of why the failure occurred.
i. Always compare to a working sample log
ii. Examine the ADPrep logs for errors only if the results indicate a problem
extending the schema or preparing the forest or domain.
iii. Examine the DirectoryServices-Deployment event log for errors only if the
Dcpromoui.log lacks detail or ends arbitrarily due to an unhandled exception
in the configuration process.
c. Examine the Directory Services, System, and Application event logs for other
indicators of a configuration issue. Often, the domain controller promotion is
just a symptom of other network misconfiguration that would affect all
distributed systems.
d. Use dcdiag.exe and repadmin.exe to validate the overall forest health and
indicate subtle misconfigurations that may prevent further domain controller
promotion.
e. Use AutoRuns.exe, Task Manager, or MSinfo32.exe to examine the computer for
third party software that may be interfering.
Remove third party software (don't disable the software; that doesn't prevent
drivers loading).
f. Install NetMon 3.4 on the computer that fails to promote as well the replication
partner domain controller and analyze the promotion process with double-sided
network captures.
i. Compare this to your working lab environment to understand what a healthy
promotion looks like and where it's failing.
ii. At this point, the errors are likely with the forest objects, nondefault security
changes, or the network, and this new domain controller is a victim of
misconfigurations in DNS, firewalls, host intrusion protection software, or
other outside factors.
1. When using Server Manager, examine the promotion results in the 10 seconds prior
to automatic reboot.
PowerShell
7 Note
Some of the errors listed below are no longer possible due to operating
system and domain controller configuration changes in later operating
systems. The new ADDSDeployment Windows PowerShell codes also prevents
certain errors, but the dcpromo.exe /unattend does not; this is another
compelling reason to switch all of your current automation from the
deprecated DCPromo to ADDSDeployment Windows PowerShell.
ノ Expand table
1 Exit, success You still must reboot, this just notes that the automatic
restart flag was removed.
3 Exit, success, with a Typically seen when returning the DNS Delegation
noncritical failure warning. If not configuring DNS delegation, use:
Error Explanation Note
code
-creatednsdelegation:$false .
4 Exit, success, with a Typically seen when returning the DNS Delegation
noncritical failure, need to warning. If not configuring DNS delegation, use:
reboot -creatednsdelegation:$false .
ノ Expand table
11 Domain controller promotion is Don't run more than one instance of domain controller
already running promotion at the same time for the same target
computer.
13 Certification Authority is You can't demote this domain controller, as it's also a
installed Certification Authority. Don't remove the CA before you
carefully inventory its usage. If it's issuing certificates,
removing the role will cause an outage. Running CAs
on domain controllers is discouraged.
15 Role change is in progress or You must restart the server (due to prior configuration
needs reboot changes) before promotion.
17 No NTFS 5 drives exist This error isn't possible in Windows Server 2012, which
requires at least the %systemdrive% be formatted with
NTFS.
18 Not enough space in windir Free up space on the %systemdrive% volume using
cleanmgr.exe.
22 TCP/IP needs to be installed or Verify computer has TCP/IP configured, bound, and
isn't functioning working correctly.
23 DNS client needs to be Set a primary DNS server when adding a new domain
configured first controller to a domain.
24 Supplied credentials are invalid Verify your user name and password is correct.
or missing required elements
25 Domain controller for the Validate DNS client settings, firewall rules.
specified domain couldn't be
located
26 List of domains couldn't be Validate DNS client settings, LDAP functionality, firewall
read from the forest rules.
28 Bad domain name Choose a different, valid DNS domain name when
promoting.
29 Parent domain doesn't exist Verify the parent domain specified when creating a new
child domain or tree domain.
33 Path to the IFM files is invalid Validate your path to the Install From Media folder.
34 The IFM database is bad Use the correct Install From Media for this operating
system and role (same operating system version, same
type of domain controller - RODC versus RWDC).
35 Missing SYSKEY The Install from Media is encrypted and you must
provide a valid SYSKEY to use it.
37 Path for NTDS Database or its Change path of Database and Logs to a fixed NTFS
logs is invalid volume, not a mapped drive or UNC path.
Error Explanation Suggested resolution
code
38 Volume doesn't have enough Free up space using cleanmgr.exe, add more disk space,
space for NTDS database or manually clear space by moving unnecessary data
logs elsewhere.
39 Path for SYSVOL is invalid Change path of SYSVOL folder to a fixed NTFS volume,
not a mapped drive or UNC path.
41 Need to specify a password for Provide a password for the DSRM account, it can't be
safe-mode blank no matter how the password policy is configured.
42 Safe-mode password doesn't Provide a password for the DSRM account that meets
meet criteria (promotion only) the password policy's configured rules.
43 Admin password doesn't meet Provide a password for the local administrator account
criteria (demotion only) that meets the password policy's configured rules.
44 The specified name for the Specify a valid forest root DNS domain name.
forest is invalid
45 A forest with the specified Choose a different forest root DNS domain name.
name already exists
46 The specified name for the tree Specify a valid tree DNS domain name.
is invalid
47 A tree with the specified name Choose a different tree DNS domain name.
already exists
48 The tree name doesn't fit into Choose a different tree DNS domain name.
the forest structure
50 During demote, last domain Don't specify Last Domain Controller in the Domain ( -
controller was detected even lastdomaincontrollerindomain ) unless it's true. Use -
though it isn't, or last domain ignorelastdcindomainmismatch to override if this is truly
controller was specified, but it the last domain controller and there's phantom domain
isn't controller metadata.
58 A site name must be specified You must specify a site for an RODC, it will not
during RODC promotion automatically detect one like an RWDC.
59 During demote, this domain Specify that this is the Last DNS Server in the Domain
controller is the last DNS server or use -ignorelastdnsserverfordomain .
for one of its zones
60 A domain controller running Promote at least one Windows Server 2008 or later
Windows Server 2008 or later model writable domain controller.
must be present in the domain
in order to promote RODC
61 You can't install Active Directory Not possible to get this error.
Domain Services with DNS in an
existing domain that doesn't
already host DNS
62 Answer file doesn't have a Only seen with dcpromo /unattend , which is deprecated.
[DCInstall] section See older documentation.
63 Forest functional level is below Raise the forest functional level to at least Windows
windows server 2003 Server 2003 Native. Windows 2000 and Windows NT
4.0 are no longer supported operating systems.
66 Promo failed because operating Examine the extended error and logs; the server is
system detection failed failing to return its operating system version. It's likely
Error Explanation Suggested resolution
code
69 Required Port is already in use Use netstat.exe -anob to locate processes that are
by some other application incorrectly assigned to reserved AD DS ports.
70 The forest root domain Only seen with dcpromo /unattend , which is deprecated.
controller must be a GC See older documentation.
71 DNS server is already installed Don't specify to install DNS ( -installDNS ) if the DNS
service is already installed.
72 Computer is running Remote You can't promote this domain controller, as it's also a
Desktop Services in nonadmin RDS server configured for more than two admin users.
mode Don't remove RDS before you carefully inventory its
usage. If it's being used by applications or end-users,
removal will cause an outage.
75 Unable to determine the Validate that the RODC password replication policy
default password replication exists and is accessible.
policy.
76 Specified replicated/non- Validate that you have typed in valid domain and user
replicated security groups are accounts when specifying a password replication policy.
invalid
79 RODC can't be promoted Use Windows Server 2012 to prepare the forest or use
because rodcprep has not been adprep.exe /rodcprep .
performed
80 Domainprep has not been Use Windows Server 2012 to prepare the domain or
performed use adprep.exe /domainprep .
Error Explanation Suggested resolution
code
81 Forestprep has not been Use Windows Server 2012 to prepare the forest or use
performed adprep.exe /forestprep .
82 Forest schema mismatch Use Windows Server 2012 to prepare the forest or use
adprep.exe /forestprep .
84 Unable to detect a domain Validate that existing domain controllers have correct
controller account user account control attribute set.
85 Unable to select a domain Returned if you specify "Use Existing Account" but
controller account for stage 2 either no account found or there's an error during
account lookup. Ensure you provided the correct RODC
staged account.
87 A domain controller account of Rename the computer before promoting, if not trying
conflicting type exists to attach to an unoccupied domain controller. You must
attach to the unoccupied domain controller account
using -useexistingaccount and the correct read-only or
writable argument, depending on account type.
88 The specified server admin isn't You specified an invalid account for RODC admin
valid delegation. Verify that the account specified is a valid
user or group.
89 RID master for the specified Use netdom.exe query fsmo to detect the RID master.
domain is offline. Bring it online and make it accessible to the domain
controller you're promoting.
90 Domain naming master is Use netdom.exe query fsmo to detect the domain
offline. naming master. Bring it online and make it accessible to
the domain controller you're promoting.
91 Failed to detect if the process is Not possible to get this error anymore, the operating
wow64 system is 64-bit.
92 Wow64 process isn't supported Not possible to get this error anymore, the operating
system is 64-bit.
94 Local admin password doesn't Provide a nonblank password and ensure that the local
meet requirement: either blank password policy requires a password.
or not required
95 Can't demote last Windows You must first demote all RODCs before you can
Server 2008 or later domain demote all Windows Server 2008 or later writable
controller in the domain where domain controllers.
live RODCs exist
96 Unable to uninstall DS binaries Only seen with dcpromo /unattend , which is deprecated.
See older documentation.
97 Forest functional level version Provide a child domain functional the same or higher
higher than that of the child than the forest functional level.
domain operating system
99 Forest functional level is too Raise the forest functional level to at least Windows
low (error is Windows Server Server 2003 native. Windows 2000 and Windows NT 4.0
2012 only) are no longer supported operating systems.
100 Domain functional level is too Raise the domain functional level to at least Windows
low (error is Windows Server Server 2003 native. Windows 2000 and Windows NT 4.0
2012 only) are no longer supported operating systems.
ノ Expand table
Symptoms Server still responds to DNS requests but has no zone information
Resolution When removing the AD DS role, also remove the DNS Server role or set the DNS
and Notes Server service to disabled. Remember to point the DNS client to another server
than itself. If using Windows PowerShell, run the following after you demote the
server:
Issue Demoting a domain controller leaves DNS running with no zones
or
ノ Expand table
Resolution Set these values using the Netlogon and DNS group policies. Microsoft began
and Notes blocking single-label domain creation in Windows Server 2008; you can use ADMT
or the Domain Rename Tool to change to an approved DNS domain structure.
ノ Expand table
Issue Demotion of last domain controller in a domain fails if there are pre-created,
unoccupied RODC accounts
Active Directory Domain Services couldn't find another Active Directory Domain
Controller to transfer the remaining data in directory partition
CN=Schema,CN=Configuration,DC=corp,DC=contoso,DC=com.
Resolution Remove any remaining pre-created RODC accounts before demoting a domain,
and Notes using Dsa.msc or Ntdsutil.exe metadata cleanup.
ノ Expand table
Symptoms Cross-domain planning functionality for Group Policy, Resultant Set of Policy (RSOP)
Planning Mode, requires updated file system and Active Directory permissions for
existing GP. Without Gpprep, you can't use RSOP Planning across domains.
Resolution Run adprep.exe /gpprep manually for all domains that weren't previously prepared
and Notes for Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2.
Administrators should run GPPrep only once in the history of a domain, not with
every upgrade. It isn't run by automatic adprep because if you have already set
Issue Automated forest and domain preparation doesn't run GPPREP
ノ Expand table
Issue Install from media fails to verify when pointing to a UNC path
Resolution and You must store IFM files on a local disk, not a remote UNC path. This intentional
Notes block prevents partial server promotion due to a network interruption.
ノ Expand table
Issue DNS delegation warning shown twice during domain controller promotion
Resolution Ignore. ADDSDeployment Windows PowerShell shows the warning first during
and Notes prerequisite checking, then again during configuration of the domain controller. If
you don't wish to configure DNS delegation, use argument:
Code - -creatednsdelegation:$false
ノ Expand table
Code - Verification of user permissions failed. You must supply the name
of the domain to which this user account belongs.
Issue Specifying UPN or nondomain credentials during configuration returns
misleading errors
Resolution and Ensure you're providing valid domain credentials in the form of <domain>\
Notes <user>.
ノ Expand table
Symptoms If using Dism.exe to remove the AD DS role before demoting a domain controller
gracefully, the server no longer boots normally and shows error:
Resolution Boot into Directory Services Repair Mode using Shift + F8 . Add the AD DS role
and Notes back, and then forcibly demote the domain controller. Alternatively, restore the
System State from backup. Don't use Dism.exe for AD DS role removal; the utility
has no knowledge of domain controllers.
ノ Expand table
Resolution Don't specify a forest functional mode of Win2012 without also specifying a
and Notes domain functional mode of Win2012. Here's an example that will work without
errors:
Code - -forestmode Win2012 -domainmode Win2012
ノ Expand table
Issue Selecting Verify in the Install from Media selection area appears to do
nothing
Symptoms When you specify a path to an IFM folder, selecting the Verify button never
returns a message or appears to do anything.
Resolution The Verify button only returns errors if there are issues. Otherwise, it makes the
and Notes Next button selectable if you have provided an IFM path. You must select Verify
to proceed if you have selected IFM.
ノ Expand table
Issue Demoting with Server Manager doesn't provide feedback until completed.
Symptoms When using Server Manager to remove the AD DS role and demote a domain
controller, there's no ongoing feedback given until the demotion completes or
fails.
Resolution and This is a limitation of Server Manager. For feedback, use ADDSDeployment
Notes Windows PowerShell cmdlet:
Code - Uninstall-addsdomaincontroller
ノ Expand table
Issue Install from Media Verify doesn't detect that RODC media provided for
writable domain controller, or vice versa.
Symptoms When promoting a new domain controller using IFM and providing incorrect
media to IFM - such as RODC media for a writable domain controller, or RWDC
media for an RODC - the Verify button doesn't return an error. Later, promotion
fails with error:
Resolution Verify only validates the overall integrity of IFM. Don't provide the wrong IFM type
and Notes to a server. Restart the server before you attempt promotion again with the
correct media.
ノ Expand table
Symptoms When using ADDSDeployment Windows PowerShell to promote a new RODC with a staged
computer account, receive error:
Code - Parameter set can't be resolved using the specified named parameters.
InvalidArgument: ParameterBindingException
+ FullyQualifiedErrorId :
AmbiguousParameterSet,Microsoft.DirectoryServices.Deployment.PowerShell.Commands.Install
Resolution Don't provide parameters already defined already on a precreated RODC account. These
and Notes include:
Code -
-readonlyreplica
-installdns
-donotconfigureglobalcatalog
Issue Promoting an RODC into a precreated computer account fails
-sitename
-installdns
ノ Expand table
Symptoms If selecting (or not selecting) the Server Manager option Restart each destination
server automatically if required when demoting a domain controller through role
removal, the server always restarts, regardless of choice.
Resolution This is intentional. The demotion process restarts the server regardless of this
and Notes setting.
ノ Expand table
Issue Dcpromo.log shows "[error] setting security on server files failed with 2"
ノ Expand table
Issue Prerequisite adprep check fails with error "Unable to perform Exchange
schema conflict check"
Symptoms When attempting to promote a Windows Server 2012 domain controller into an
existing Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2
forest, prerequisite check fails with error:
Code - Verification of prerequisites for AD prep failed. Unable to perform
Exchange schema conflict check for domain <domain name> (Exception: the RPC
server is unavailable)
Code - Adprep couldn't retrieve data from the server <domain controller>
Resolution The new domain controller can't access WMI through DCOM/RPC protocols
and Notes against the existing domain controllers. To date, there have been three causes for
this:
Issue Prerequisite adprep check fails with error "Unable to perform Exchange
schema conflict check"
ノ Expand table
Symptoms When creating a new AD DS forest and creating the DNS zone on the new
domain controller for itself, you always receive warning message:
Code - An error was detected in the DNS configuration.
None of the DNS servers used by this computer responded within the timeout
interval.
(error code 0x000005B4 "ERROR_TIMEOUT")
Resolution and Ignore. This warning is intentional on the first domain controller in the root
Notes domain of a new forest, in case you intended to point to an existing DNS server
and zone.
ノ Expand table
Symptoms If you use the -whatif argument when configuring a domain controller with
implicit or explicit -installdns:$true , the resulting output shows:
ノ Expand table
Issue After promotion, logon fails with "Not enough storage is available to process
this command"
Symptoms After you promote a new domain controller and then log off and attempt to log
on interactively, you receive error:
Code - Not enough storage is available to process this command
Resolution The domain controller wasn't rebooted after promotion, either due to an error or
and Notes because you specified the ADDSDeployment Windows PowerShell argument -
Issue After promotion, logon fails with "Not enough storage is available to process
this command"
ノ Expand table
Issue The Next button isn't available on the Domain Controller Options page
Symptoms Even though you have set a password, the Next button on the Domain Controller
Options page in Server Manager isn't available. There's no site listed in the Site
name menu.
Resolution You have multiple AD DS sites and at least one is missing subnets; this future
and Notes domain controller belongs to one of those subnets. You must manually select the
subnet from the Site name dropdown menu. You should also review all AD sites
using DSSITE.MSC or use the following Windows PowerShell command to find all
sites missing subnets:
ノ Expand table
Issue Promotion or demotion fails with message "the service can't be started"
Symptoms If you attempt promotion, demotion, or cloning of a domain controller you receive
error:
Code - The service can't be started, either because it's disabled or it has no
enabled devices associated with it" (0x80070422)
Resolution The DS Role Server service (DsRoleSvc) is disabled. By default, this service is
and Notes installed during AD DS role installation and set to a Manual start type. Don't
disable this service. Set it back to Manual and allow the DS role operations to start
and stop it on demand. This behavior is by design.
ノ Expand table
Symptoms If you promote a domain controller using the deprecated dcpromo.exe /unattend
or upgrade an existing Windows Server 2008 R2 domain controller in place to
Windows Server 2012, Server Manager still shows the post-deployment
configuration task Promote this server to a domain controller.
Issue Server Manager still warns that you need to promote DC
Resolution select the post-deployment warning link and the message will disappear for good.
and Notes This behavior is cosmetic and expected.
ノ Expand table
Symptoms If you promote a domain controller using Server Manager and save the Windows
PowerShell deployment script, it doesn't include the role installation cmdlet and
arguments ( install-windowsfeature -name ad-domain-services -
includemanagementtools ). Without the role, the DC can't be configured.
Resolution Manually add that cmdlet and arguments to any scripts. This behavior is expected
and Notes and by design.
ノ Expand table
Symptoms If you promote a domain controller using Server Manager and save the Windows
PowerShell deployment script, the file is named with a random temporary name
and not as a PS1 file.
Resolution and Manually rename the file. This behavior is expected and by design.
Notes
ノ Expand table
Symptoms If you promote a domain controller using dcpromo /unattend with the following
sample answer file:
Code -
[DCInstall]
NewDomain=Forest
ReplicaOrNewDomain=Domain
NewDomainDNSName=corp.contoso.com
SafeModeAdminPassword=Safepassword@6
DomainNetbiosName=corp
DNSOnNetwork=Yes
Issue Dcpromo /unattend allows unsupported functional levels
AutoConfigDNS=Yes
RebootOnSuccess=NoAndNoPromptEither
RebootOnCompletion=No
DomainLevel=0
ForestLevel=0
Resolution Don't use the deprecated dcpromo /unattend and understand that it allows you to
and Notes specify invalid settings that later fail. This behavior is expected and by design.
ノ Expand table
Symptoms If you promote a replica DC or RODC, the promotion reaches "creating NTDS
settings object" and never proceeds or completes. The logs stop updating as well.
Resolution This is a known issue caused by providing credentials of the built-in local
and Notes Administrator account with a matching password to the built-in domain
Administrator account. This causes a failure down in the core setup engine that
doesn't error, but instead waits indefinitely (quasi-loop). This is expected - albeit
undesirable - behavior.
To fix the server:
1. Reboot it.
1. In AD, delete that server's member computer account (it will not yet be a DC
account)
4. Reboot
5. Readd the AD DS role and reattempt promotion, ensuring that you always
provide the <domain>\<admin> formatted credentials to DC promotion and not
just the built-in local administrator account.
Feedback
Was this page helpful? Yes No
This article helps to fix ADFS 2.0 certificate error during an attempt to build the
certificate chain.
Summary
Most Active Directory Federated Services (AD FS) 2.0 problems belong to one of the
following main categories. This article contains step-by-step instructions to troubleshoot
certificate problems.
Symptoms
This issue starts after an AD FS certificate is changed or replaced.
Resolution
To resolve this problem, follow these steps in the order given. These steps will help you
to determine the cause of the problem. Make sure that you check whether the problem
is resolved after every step.
1. On the AD FS server, click Start, click Run, type MMC.exe, and then press
Enter.
If the CA template is using any of the listed cryptographic service providers, the
certificate that is issued by this CA is not supported by the AD FS server.
2. Click the server name, and then expand the Sites folder.
3. Locate your website (typically, it is known as "Default Web Site"), and then select it.
4. On the Actions menu on the right side, click Bindings. Make sure that the https
biding type is bound to port 443. Otherwise, click Edit to change the port.
How to check
3. In the details pane, click Copy to file, and save the file as Filename.cer.
Console
7. If the file indicates that the revocation checks failed or that the revocation server
was offline, check the log to determine which certificate in the certificate chain
could not be verified.
Check whether any AIA or CDP path failed. In a scenario in which multiple paths
are specified under one type of file, both paths should be marked as verified.
Collecting a network trace may help if any of the AIA or CDP or OCSP path is
unavailable.
8. If the log entry indicates that the certificate is revoked, you must request another
certificate that is valid and is not revoked.
Step 5: Make sure that the ADFS service accounts has the
Read permission for the private key of the ADFS
certificates
3. In the Console Root window, click Certificates (Local Computer) to view the
computer certificate stores.
4. Right-click the AD FS service, point to All Tasks, and then click Manage private
keys.
For more information about the AD FS AutoCertificateRollover feature, see the following
TechNet topics:
7 Note
In this container name, the parameters in brackets represent the actual values.
An example of a GUID is "62b8a5cb-5d16-4b13-b616-06caea706ada."
4. Right-click the GUID, and then click Properties. If there is more than one GUID,
follow these steps:
PowerShell
Add-PSSnapin microsoft.adfs.powershellGet-ADFSProperties
5. Make sure that the ADFS service account has the Read, Write, and "Create All child
objects" permissions granted to this object and to all descendent object.
After the change is made, share the Federationmetadata.xml with the claims
provider and the relying party.
The claims provider and the relying party might require only that the new token-
signing and token-decrypting certificates (without a private key) are updated in the
federation trust on their end.
Scenarios
AD FS 2.0 receives a signed SAML-P request that is sent by a relying party.
7 Note
AD FS 2.0 receives a signed SAML sign-out request from the relying party. In this
scenario, the signout request must be signed.
AD FS 2.0 receives a sign-out request from a claims provider, and encrypts a sign-
out request for the relying party. In this scenario, the claims provider initiates the
sign-out.
AD FS 2.0 receives a signed SAML sign-out request from a claims provider. In this
scenario, the signout request must be signed.
Make sure that the claims provider trust's signing certificate is valid and has not
been revoked.
Make sure that AD FS 2.0 can access the certificate revocation list if the revocation
setting doesn't specify "none" or a "cache only" setting.
7 Note
You can use Windows PowerShell cmdlets for AD FS 2.0 to configure the
following revocation settings:
SigningCertificateRevocationCheck parameter of the Set-
ADFSClaimsProviderTrust or Set-ADFSRelyingPartyTrust cmdlet
EncryptionCertificateRevocationCheck parameter of the Set-
ADFSRelyingPartyTrust or Set-ADFSClaimsProviderTrust cmdlet
This article discusses an issue where you're prompted for credentials and event 111 is
logged when you authenticate an account in Active Directory Federation Services (AD
FS) 2.0.
Summary
Most Active Directory Federated Services (AD FS) 2.0 problems belong to one of the
following main categories. This article contains step-by-step instructions to troubleshoot
authentication problems.
Symptoms
When you try to authenticate an account in Active Directory Federation Services (AD FS)
2.0, the following errors occur:
On a form-based login screen, the server returns the following error message:
Resolution
To resolve this problem, follow these steps, in the order given. These steps will help you
determine the cause of the problem.
b. Right-click ADFS 2.0, and then select Edit Federation Service Properties.
c. On the General tab, locate the Federation Service name field to see the name.
2. Check whether HOST/<Federation Service Name> name is registered under the
AD FS service account:
a. Open the Management snap-in. To do this, click Start, click All Programs, click
Administrative Tools, and then click Services.
c. On the Log On tab, note the service account that's displayed in the This
account field.
d. Click Start, click All Programs, click Accessories, right-click Command Prompt,
and then click Run as administrator.
Console
If the Federation Service name doesn't already exist, run the following command to add
the service principal name (SPN) to the AD FS account:
Console
1. Click Start, click All Programs, click Accessories, right-click Command Prompt, and
then click Run as administrator.
2. Run the following command to make sure that there are no duplicate SPNs for the
AD FS account name:
Console
SETSPN -X -F
For more information about the Local Authentication Type, see the following TechNet
topic:
In the Default Web Site/adfs node, open the Authentication setting, and then
make sure the Anonymous Authentication is enabled.
In the Default Web Site/adfs/ls node, open the Authentication setting, and then
make sure that both Anonymous and Windows Authentication are enabled.
The Proxy server automatically renews trust with AD FS Federation Service. If this
process fails, event 394 is logged in Event Viewer and you receive the following error
message:
The federation server proxy could not renew its trust with the Federation Service.
To resolve this problem, try to run the AD FS proxy configuration wizard again. As the
wizard runs, make sure that valid domain user name and passwords are used. These
credentials aren't stored on the AD FS Proxy server. When entering credentials for the
proxy trust configuration wizard, you have two choices.
Use domain credentials that have local administrative rights on the AD FS servers.
Use the AD FS service account credentials
You would also see Extended protection not allowing Windows Authentication when SSL
proxy is being done by tools like Fiddler or some intelligent load balancers.
For example: You may see repeated authentication prompts if you have Fiddler Web
Debugger running on the client.
1. Open IIS Manager, and then locate the level that you want to manage.
For more information about how to open IIS Manager, see Open IIS Manager (IIS
7) .
5. When the Advanced Settings dialog box appears, click Off on the Extended
Protection menu.
2. To load the Windows PowerShell for AD FS snap-in, run the following command:
PowerShell
Add-PsSnapIn Microsoft.Adfs.Powershell
PowerShell
Console
Nltest /dsgetdc:domainname
If the response is anything other than "success," you must troubleshoot the netlogon
secure channel. To do this, make sure that the following conditions are true:
The Proxy server automatically renews trust with AD FS Federation Service. If this
process fails, event 394 is logged in Event Viewer and you receive the following error
message:
The federation server proxy could not renew its trust with the Federation Service.
To resolve this problem, try to run the AD FS proxy configuration wizard again. As the
wizard runs, make sure that valid domain user name and passwords are used. These
credentials aren't stored on the AD FS Proxy server.
Feedback
Was this page helpful? Yes No
This article describes a problem in which Active Directory Federation Services (AD FS)
features such as Device Authentication and OAuth Discovery do not work.
Symptoms
You may experience any of the following symptoms:
Event ID 180 is logged every five minutes in the AD FS/Admin event log, as follows:
Output
PowerShell
Get-AdfsGlobalAuthenticationPolicy
AdditionalAuthenticationProvider : {AzureMfaAuthentication}
DeviceAuthenticationEnabled : True
DeviceAuthenticationMethod : All
TreatDomainJoinedDevicesAsCompliant : False
PrimaryIntranetAuthenticationProvider : {FormsAuthentication,
WindowsAuthentication, AzurePrimaryAuthentication,
MicrosoftPassportAuthentication}
PrimaryExtranetAuthenticationProvider : {FormsAuthentication,
AzurePrimaryAuthentication, MicrosoftPassportAuthentication}
WindowsIntegratedFallbackEnabled : True
ClientAuthenticationMethods : None
This problem occurs in an AD FS farm that the following conditions apply to:
One or more Windows Server 2016 (WS2016) AD FS servers have been added to a
Windows Server 2012 R2 (WS2012R2) AD FS server farm that has KB 4041685 (or
later Monthly or Preview releases) installed.
The server farm was upgraded to the WS2016 Farm Behavior Level.
The KB 4088787 update was installed on the WS2016 AD FS farm.
Cause
Installing the March 13, 2018, KB 4088787 update on a primary node in an AD FS farm
whose FBL was raised from 1 (WS2012R2) to 3 (WS2016) can cause AD FS regression
and a reordering of rows in the AD FS database. This problem leaves the database in a
state in which some data elements have duplicate occurrences. This state causes AD FS
server start failures and other errors.
Resolution
To resolve this problem, follow these steps.
PowerShell
If the endpoint is not found, you see the following output that indicates that the
problem likely exists:
Output
This script is found at the end of this article. Save the script as "KB4088787_Fix.ps1" and
copy it to the primary node in your AD FS farm.
If you are using WID to store AD FS configuration, you can use the ADFS Rapid Restore
Tool (available from the Microsoft Download Center ) to back up the configuration
data. If you are using SQL Server to store the AD FS configuration database, you should
create an additional SQL Server backup before you run the script. The database state
can be restored from one of these backups, if it is necessary.
The script first verifies that the current AD FS server database has been corrupted by the
upgrade problem that is described. If so, the script will locate the broken properties and
fix them. The KB4088787_Fix.ps1 script will ask you to confirm any database changes,
and the script will then restart AD FS if needed.
7 Note
Every time that the script is run, a copy of the service settings XML is saved. The
data is saved in the working directory in the following name format:
serviceSettingsXml_<yyyy>-<MM>-<dd>-<hh>-<mm>-<ss>.xml
For example, if the script is run on April 14, 2021 at 10:14:53 AM, it is saved as the
following:
serviceSettingsXml_2021-04-14-10-14-53.xml
After the script is finished, and an AD FS restart occurs, all device authentication and
endpoint failures should be fixed.
More information
If applying the script fix and restarting the system does not correct the problem, go to
the Microsoft Support website .
#
# Version 2.0.0
#
$serializer = New-Object
System.Runtime.Serialization.DataContractSerializer($object.GetType())
$serializedData = $null
try
{
# No simple write to string option, so we have to write to a memory
stream
# then read back the bytes...
$stream = New-Object System.IO.MemoryStream
$writer = New-Object System.Xml.XmlTextWriter($stream,
[System.Text.Encoding]::UTF8)
return $serializedData
}
function Write-XmlIndent
{
param
(
$xmlData
)
$xmlData.WriteContentTo($xmlWriter)
$xmlWriter.Flush()
$strWriter.Flush()
$strWriter.ToString()
}
function Get-ADFSXMLServiceSettings
{
param
(
$saveData
)
$doc.Load("$env:windir\ADFS\Microsoft.IdentityServer.Servicehost.exe.config"
)
$connString =
$doc.configuration.'microsoft.identityServer.service'.policystore.connection
String
$cli = new-object System.Data.SqlClient.SqlConnection
$cli.ConnectionString = $connString
$cli.Open()
try
{
$cmd = new-object System.Data.SqlClient.SqlCommand
$cmd.CommandText = "Select ServiceSettingsData from
[IdentityServerPolicy].[ServiceSettings]"
$cmd.Connection = $cli
$configString = $cmd.ExecuteScalar()
$configXml = new-object XML
$configXml.LoadXml($configString)
if($saveData)
{
$script:originalPath = "original_serviceSettingsXml_$(get-date -
f yyyy-MM-dd-hh-mm-ss).xml"
Write-XmlIndent($configXml) | Out-File $script:originalPath
Write-Host "Original XML saved to: $script:originalPath"
}
write-output $configXml
}
finally
{
$cli.CLose()
}
}
return $internalSettings
}
function Set-AdfsInternalSettings()
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory = $true, HelpMessage="Settings object fetched
from Get-AdfsInternalSettings")]
[ValidateNotNull()]
$InternalSettings
)
$doc.Load("$env:windir\ADFS\Microsoft.IdentityServer.Servicehost.exe.config"
)
$connString =
$doc.configuration.'microsoft.identityServer.service'.policystore.connection
String
$cli = new-object System.Data.SqlClient.SqlConnection
$cli.ConnectionString = $connString
$cli.Open()
try
{
$cmd = new-object System.Data.SqlClient.SqlCommand
$cmd.CommandText = "update [IdentityServerPolicy].[ServiceSettings]
SET ServiceSettingsData=@content,[ServiceSettingsVersion] =
[ServiceSettingsVersion] + 1,[LastUpdateTime] = GETDATE()"
$cmd.Parameters.AddWithValue("@content", $settingsData) | out-null
$cmd.Connection = $cli
$rowsAffected = $cmd.ExecuteNonQuery()
$cmd.Connection = $cli
$widRowsAffected = $cmd.ExecuteNonQuery()
}
}
finally
{
$cli.CLose()
}
}
function Create-EndpointConfiguration()
{
Param
(
[ValidateNotNull()]
$xmlData
)
# EndpointConfiguration
$enabled = Create-BoolFromString($xmlData.Enabled)
$proxy = Create-BoolFromString($xmlData.Proxy)
$canProxy = Create-BoolFromString($xmlData.CanProxy)
return $endpointConfig
}
function Create-ClientSecretSettings()
{
Param
(
[ValidateNotNull()]
$xmlData
)
# ClientSecretSettings
$clientSecretSettings = New-Object -TypeName
Microsoft.IdentityServer.PolicyModel.Client.ClientSecretSettings
$clientSecretSettings.ClientSecretRolloverTimeMinutes =
$xmlData.ClientSecretRolloverTimeMinutes
$clientSecretSettings.ClientSecretLockoutThreshold =
$xmlData.ClientSecretLockoutThreshold;
$clientSecretSettings.SaltedHashAlgorithm = $xmlData.SaltedHashAlgorithm
$clientSecretSettings.SaltSize = $xmlData.SaltSize
$clientSecretSettings.SecretSize = $xmlData.SecretSize
return $clientSecretSettings
}
function Create-IdTokenIssuer()
{
Param
(
[ValidateNotNull()]
$xmlData
)
#IdTokenIssuer
$idTokenIssuerConfig = New-Object -TypeName
Microsoft.IdentityServer.PolicyModel.Configuration.IdTokenIssuerConfiguratio
n
$idTokenIssuerConfig.Address = $xmlData.Address
return $idTokenIssuerConfig
}
function Create-CertificateAuthorityConfiguration()
{
Param
(
[ValidateNotNull()]
$xmlData
)
# CertificateAuthorityConfiguration
$certAuthorityConfig = New-Object -TypeName
Microsoft.IdentityServer.PolicyModel.Configuration.CertificateAuthorityConfi
guration
$certAuthorityConfig.Mode.Value =
[Microsoft.IdentityServer.PolicyModel.Configuration.CertificateAuthorityMode
] $xmlData.ModeValue
$certAuthorityConfig.GenerationThresholdInMinutes =
$xmlData.GenerationThresholdInMinutes
$certAuthorityConfig.PromotionThresholdInMinutes =
$xmlData.PromotionThresholdInMinutes
$certAuthorityConfig.CertificateLifetimeInMinutes =
$xmlData.CertificateLifetimeInMinutes
$certAuthorityConfig.RolloverIntervalInMinutes =
$xmlData.RolloverIntervalInMinutes
$certAuthorityConfig.CriticalThresholdInMinutes =
$xmlData.CriticalThresholdInMinutes
$certAuthorityConfig.CriticalThresholdInMinutes =
$xmlData.CriticalThresholdInMinutes
return $certAuthorityConfig
}
function Create-OAuthClientAuthenticationMethods()
{
Param
(
[ValidateNotNull()]
$xmlData
)
# OAuthClientAuthenticationMethods
return 15
}
function Create-BoolFromString()
{
Param
(
[ValidateNotNull()]
$xmlData
)
function Get-ObjectFromElement()
{
Param
(
[Parameter(Mandatory = $true, HelpMessage="Settings object fetched from
Get-AdfsInternalSettings")]
[ValidateNotNull()]
$xmlData,
[Parameter(Mandatory = $true, HelpMessage="Settings object fetched
from Get-AdfsInternalSettings")]
[ValidateNotNull()]
$elementName
)
$clientSecretSettings = "ClientSecretSettings"
# Microsoft.IdentityServer.PolicyModel.Client.ClientSecretSettings
$oauthClientAuthMethod = "OAuthClientAuthenticationMethods"
#
Microsoft.IdentityServer.PolicyModel.Configuration.ClientAuthenticationMetho
d
$certAuthorityConfig = "CertificateAuthorityConfiguration"
#
Microsoft.IdentityServer.PolicyModel.Configuration.CertificateAuthorityConfi
guration
$idTokenIssuer = "IdTokenIssuer"
#
Microsoft.IdentityServer.PolicyModel.Configuration.IdTokenIssuerConfiguratio
n
if ($endpointConfigs.Contains($elementName))
{
return Create-EndpointConfiguration($xmlData)
}elseif ($clientSecretSettings.Contains($elementName))
{
return Create-ClientSecretSettings($xmlData)
}elseif ($oauthClientAuthMethod.Contains($elementName))
{
return Create-OAuthClientAuthenticationMethods($xmlData)
}elseif ($certAuthorityConfig.Contains($elementName))
{
return Create-CertificateAuthorityConfiguration($xmlData)
}elseif ($idTokenIssuer.Contains($elementName))
{
return Create-IdTokenIssuer($xmlData)
}elseif ($boolObjs.Contains($elementName))
{
return Create-BoolFromString($xmlData)
}else{
return $xmlData
}
}
$role = (Get-AdfsSyncProperties).Role
if($role -ne "PrimaryComputer")
{
Write-Host "This script must execute on the primary node in the AD FS
farm. Cannot continue."
exit
}
# Get the XML of the Service Settings blob, and look for duplicate elements
$xmlData = Get-ADFSXMLServiceSettings($true)
$dataObj = Get-AdfsInternalSettings
if($dataObj.SecurityTokenService.DeviceRegistrationEndpoint.Length -ne 1)
{
if(($xmlData.ServiceSettingsData.SecurityTokenService | Select-Object
"DeviceRegistrationEndpoint").DeviceRegistrationEndpoint.IsEmpty[0] -ne
$True)
{
# In this case, the service settings object is showing an issue, but
the XML data is not.
# This is possible in the case that the sequence of KB applications
has occurred, but no Service Settings write oparation
# has occured.
# To handle this, we will prompt the user to allow us to throttle a
Service Setting to force a write operation
$choices = New-Object
Collections.ObjectModel.Collection[Management.Automation.Host.ChoiceDescript
ion]
$choices.Add((New-Object
Management.Automation.Host.ChoiceDescription -ArgumentList '&Yes'))
$choices.Add((New-Object
Management.Automation.Host.ChoiceDescription -ArgumentList '&No'))
if ($decision -eq 0) {
$prop = Get-AdfsProperties
$original = $prop.ProxyTrustTokenLifetime
Set-AdfsProperties -ProxyTrustTokenLifetime ($original + 1)
Set-AdfsProperties -ProxyTrustTokenLifetime $original
if(($xmlData.ServiceSettingsData.SecurityTokenService | Select-Object
"DeviceRegistrationEndpoint").DeviceRegistrationEndpoint.IsEmpty[0] -eq
$True)
{
$possibleDuplicateElements = "DeviceRegistrationEndpoint",
"DeviceUsageWindowInSeconds", "OAuthClientAuthenticationMethods",
"MaxLdapUserNameLength", "EnableIdPInitiatedSignonPage",
"ClientSecretSettings", "OAuthDiscoveryEndpoint", "OAuthJwksEndpoint",
"IdTokenIssuer", "CertificateAuthorityConfiguration", "WebFingerEndpoint",
"CertificateAuthorityCrlEndpoint", "UserInfoEndpoint",
"IgnoreTokenBinding", "FarmBehaviorMinorVersion", "EnableOauthLogout",
"PromptLoginFederation", "PromptLoginFallbackAuthenticationType"
$existingDups = @()
foreach( $dup in $possibleDuplicateElements )
{
$object = $xmlData.ServiceSettingsData.SecurityTokenService |
Select-Object $dup
$existingDups += $dup
$dataObj.SecurityTokenService.$dup = $savableObj
}
}
# Write the modified Service Settings data object back to the database
if($existingDups.Count -gt 0)
{
$filename = "modified_serviceSettingsXml_$(get-date -f yyyy-MM-dd-
hh-mm-ss).xml"
$modifiedData = Get-DataContractSerializedString -object $dataObj
Write-XmlIndent([xml]$modifiedData) | Out-File $filename
Write-Host "Modifed XML saved to: $filename"
$choices = New-Object
Collections.ObjectModel.Collection[Management.Automation.Host.ChoiceDescript
ion]
$choices.Add((New-Object
Management.Automation.Host.ChoiceDescription -ArgumentList '&Yes'))
$choices.Add((New-Object
Management.Automation.Host.ChoiceDescription -ArgumentList '&No'))
$choices = New-Object
Collections.ObjectModel.Collection[Management.Automation.Host.ChoiceDescript
ion]
$choices.Add((New-Object
Management.Automation.Host.ChoiceDescription -ArgumentList '&Yes'))
$choices.Add((New-Object
Management.Automation.Host.ChoiceDescription -ArgumentList '&No'))
}else
{
Write-Host "No issues detected. Terminating script."
}
Feedback
Was this page helpful? Yes No
This article provides a solution to an error when you try to access an application on a
website that uses AD FS 2.0.
Summary
Most Active Directory Federated Services (AD FS) 2.0 problems belong to one of the
following main categories. This article contains step-by-step instructions to troubleshoot
connectivity problems.
Symptoms
Symptom 1
When you try to access a web application on a website that uses Active Directory
Federation Services (AD FS) 2.0, you receive the following error message:
Symptom 2
You can't access the following IDP-initiated sign-on page and AD FS metadata:
https://ADFSServiceName/federationmetadata/2007-06/federationmetadata.xml
https://ADFSServiceName/adfs/ls/idpinitiatedsignon.aspx
Resolution
To resolve this problem, follow these steps in the order. These steps will help you to
determine the cause of the problem. Make sure that you check whether the problem is
resolved after every step.
In the following screenshot, the first URL is for the web application, and the second
URL is for the AD FS service.
How to fix
On a client computer and AD FS proxy server (if you've this), use a ping or
nslookup command to determine whether the AD FS service name is resolved to
the correct IP address. Use the following guidelines:
Intranet: The name should resolve to the Internal AD FS server IP or the load
balanced IP of the AD FS server (Internal).
) Important
On all AD FS servers, make sure that the AD FS proxy servers can resolve
the name of the AD FS service to the internal AD FS server IP or to the
internal AD FS server's load-balanced IP. The best way to do this is to add
an entry in the HOST file on the AD FS proxy server or to use a split DNS
configuration in a perimeter network (also known as "DMZ," "demilitarized
zone," and "screened subnet").
Console
Nslookup sts.contoso.com
How to fix
Check the record for AD FS service name through the DNS server or Internet
service provider (ISP). Make sure that the IP address is correct.
How to fix
Start Internet Explorer, and then browse to the following web address. If you
receive a certificate warning when you try to open this page, select Continue.
http://<YourADFSServiceName>/adfs/ls/idpinitiatedsignon.aspx
7 Note
In this URL, <YourADFSServiceName> represents the actual AD FS service
name.
Typically, you access a sign-in screen, and then you can sign in by using your
credentials.
How to fix
If you can successfully do Step 1 through Step 3 but you still can't access the web
application, follow these steps:
1. Use another client computer and browser to do the tests. There may an issue
that affects the client.
2. Do the following advanced troubleshooting steps:
3. Collect Fiddler Web Debugger trace and network capture information while
you're accessing the IDPInitiatedsignon page. For more information, see AD
FS 2.0: How to Use Fiddler Web Debugger to Analyze a WS-Federation
Passive Sign-In .
4. Collect network traces from the client computer to check whether the SSL
handshake completed successfully, whether there's an encrypted message,
whether you're accessing the correct IP address, and so on. For more
information, see How to enable Schannel event logging in Windows and
Windows Server .
Third-party information disclaimer
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article provides troubleshooting steps for ADFS service configuration and startup
problems.
Summary
Most of ADFS 2.0 problems belong to one of the following main categories. This article
contains the step-by-step instructions to troubleshoot ADFS service problems.
Connectivity problems
ADFS service problems (KB 3044973)
Certificate problems
Authentication problems
Claim rules problems
Symptoms
The AD FS service does not start.
The AD FS service starts, but the following errors are logged in the AD FS Admin
log after a restart:
Event ID: 220
The Federation Service configuration could not be loaded correctly from the AD
FS configuration database.
Event ID: 352
A SQL Server operation in the AD FS configuration database with connection
string %1 failed.
Event ID: 102
There was an error in enabling endpoints of the Federation Service.
Resolution
To resolve this problem, follow these steps, in the order given. These steps will help you
determine the cause of the problem. Make sure that you check whether the problem is
resolved after every step.
Step 1: Check whether the AD FS service times out during
startup
If the AD FS service times out when it tries to start, you receive the following error
message:
The service did not respond to the start or control request in a timely fashion.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
4. Right-click the ServicesPipeTimeout DWORD value, and then click Modify. If there
is no ServicesPipeTimeout value, create it.
5. Click Decimal.
6. Type 60000, and then click OK. For more information about this time-out error, see
AD FS 2.0: The Service Fails to Start: "The service did not respond to the start or
control request in a timely fashion" .
If you are using the SQL Server service as an AD FS configuration database, open
services.msc. Check whether the SQL Server service is running. You can also create
a Test.udl file and populate the connection string to test connectivity to Microsoft
SQL Server.
How to fix
Open Services.msc, and then start the Windows Internal Database service or SQL Server
service.
For an AD FS server that uses SQL Server as configuration database, you must also check
two security settings, as follows:
1. Connect to the server that is running SQL Server by using SQL Management
Studio.
2. Check whether the AD FS 2.0 Windows service identity exists on the SQL Server
console on the Security > Logins node. If it doesn't, add it.
3. Check whether the AD FS 2.0 Windows service identity exists under Databases >
AdfsConfiguration > Security > Users, and that it owns the IdentityServerPolicy
schema. If it doesn't, add it.
If you are using SQL Server as configuration server, follow these steps to reset the
permission for service account:
Console
3. Check whether the service account has read and modify permissions on the (CN=
<GUID>,CN=ADFS,CN=Microsoft,CN=Program Data,DC=<Domain>,DC=
<COM>) Certificate Sharing container.
d. Right-click the GUID, and then click Properties. If there is more than one GUID,
follow these steps to find the GUID for the server that is running the AD FS
service.
PowerShell
Add-PSSnapin microsoft.adfs.powershell
Get-ADFSProperties
4. Check whether the new service account has the Read permission on the AD FS
service communication certificate's private key.
a. Create a Microsoft Management Console (MMC) by using the Certificates snap-
in that targets the Local Machine certificate store.
b. Expand the MMC, and then select Manage Private Keys.
c. On the Security tab, add the AD FS service account, and grant the Read
permission to this account.
To add or remove the SPN from the account, follow these steps:
d. Locate the service account. Right-click the service account, and then click
Properties.
HOST/newadfs.contoso.com
6. If you change the password of the service account, make sure that the new
password is updated in the AD FS service and in IIS AD FS AppPool.
7. Check whether the AD FS service account is in the local Admin group. To avoid any
potential issues, grant the AD FS service account local administrator rights.
If the problem did start after security update 2894844 was applied, you may be
experiencing the problem that is described in the Cause 1: The web application is
running in a farm (multi-server environment) section in Resolving view state message
authentication code (MAC) errors .
To fix this problem, set the same static machine key on all the AD FS servers and the AD
FS proxy:
Feedback
Was this page helpful? Yes No
This article provides availability and description of Active Directory Federation Services
2.0.
Introduction
Active Directory Federation Services (AD FS) 2.0 helps IT enable users to collaborate
across organizational boundaries and easily access applications on-premises and in the
cloud. And, AD FS helps maintain application security. Through a claims-based
infrastructure, IT can enable a single sign-on experience for end-users to applications.
Such a claims-based infrastructure does not require a separate account or password,
whether applications are located in partner organizations or hosted in the cloud.
System requirements
To implement AD FS 2.0, the computer must run one of the following Windows
operating systems:
To install AD FS 2.0, the following software and hotfixes must be installed. If they are not
installed when AD FS 2.0 is installed, the AD FS 2.0 Setup program installs them
automatically.
7 Note
Windows PowerShell
The following hotfix must be installed on computers that are running Windows
Server 2008 R2:
981002 A hotfix rollup is available for Windows Communication Foundation in
the .NET Framework 3.5 Service Pack 1 for Windows 7 and Windows Server 2008
R2
Supported languages
AD FS 2.0 is supported in the following languages:
Chinese (Simplified)
Chinese (Traditional)
Czech
Dutch
English
French
German
Hungarian
Italian
Japanese
Korean
Polish
Portuguese (Brazil)
Portuguese (Iberian)
Russian
Spanish
Swedish
Turkish
Download information
The following files are available for download from the Microsoft Download Center:
ノ Expand table
Package name Supported Windows operating system Platform Download file size
For more information about how to download Microsoft support files, see How to
obtain Microsoft support files from online services .
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection
software that was available on the date that the file was posted. The file is stored on
security-enhanced servers that help prevent any unauthorized changes to the file.
If you want to preserve the previous configuration data on the federation server and
restore the data after you reinstall AD FS 2.0, follow the steps in the Before you upgrade
Windows and After you upgrade Windows sections.
3. Click Start, click Run, type services.msc, and then click OK.
5. On the Log On tab, note the service account that is used for the AD FS 2.0
Windows Service.
7 Note
After you finish these steps, the previous installation of AD FS 2.0 that was present
on this federation server before the upgrade is restored.
1. Reinstall AD FS 2.0.
2. Copy the following configuration file that you saved in step 2 of the Before you
upgrade Windows section:
Microsoft.IdentityServer.Servicehost.exe.config
3. Locate the following AD FS 2.0 installation folder, and then copy the file that is
mentioned in step 2 to this location:
%system drive%\Program Files\Active Directory Federation Service 2.0
4. Click Start, click Run, type regedit, and then click OK.
6. On the Edit menu, point to New, and then click String Value.
9. In the Value data box, type TRUE, and then click OK.
12. If you use Windows Internal Database as the AD FS 2.0 configuration database,
follow these steps. Otherwise, bypass step 12, and go to step 13.
a. Right-click Windows Internal Database (MICROSOFT##SSEE), and then click
Properties.
b. On the General tab, if the Service status field does not display Started, click
Start to start the Windows Internal Database service.
c. Click OK.
14. On the Log On tab, provide the original backed-up service account name and the
password that is used for the AD FS 2.0 Windows Service.
15. On the General tab, select Automatic in the Startup type box.
16. If the Service status field doesn’t display Started, click Start to start the AD FS 2.0
Windows Service.
Technical revisions
The following table lists significant technical revisions to this article. The revision number
and the last review date in this article might indicate minor editorial revisions or
structural revisions to this article that are not included in the table.
ノ Expand table
Date Revision
Feedback
Was this page helpful? Yes No
This article provides the steps to change the Active Directory Federation Services 2.0
service communications certificate.
Symptoms
A user wants to know how to change the Active Directory Federation Services (AD FS)
2.0 service communications certificate after it expires or for other reasons.
Resolution
Replacing an existing AD FS 2.0 server service certificate is a multistep process.
Step 1
Install the new certificate into the local computer certificate store. To do it, follow these
steps:
1. With the local computer certificate store still open, select the certificate that was
imported.
2. Right-click the certificate, select All Tasks, and then select Manage Private Keys.
3. Add the account that is running the ADFS Service, and then give the account at
least read permissions.
7 Note
If you do not have the option to manage private keys, you may have to run
the following command:
Console
certutil -repairstore my *
Step 3
Bind the new certificate to the AD FS website by using IIS Manager. To do it, follow these
steps:
Step 4
Configure the AD FS Server service to use the new certificate. To do it, follow these
steps:
5. Select OK.
7 Note
You may see a dialog box that contains the following message:
The certificate key length is less than 2048 bits. Certificates with key sizes less
than 2048 bits might present a security risk and are not recommended. Do
you want to continue?
After you read the message, select Yes. Another dialog box appears. It contains the
following message:
Ensure that the private key for the chosen certificate is accessible to the service
account for this Federation Service on each server in the farm.
Feedback
Was this page helpful? Yes No
This article describes the Extranet Smart Lockout feature in Windows Server 2016.
Overview
As of the March 2018 update for Windows Server 2016, Active Directory Federation
Services (AD FS) has a new feature that is namedExtranet Smart Lockout (ESL). In an era
of increased attacks on authentication services, ESL enables AD FS to differentiate
between sign-in attempts from a valid user and sign-ins from what may be an attacker.
As a result, AD FS can lock out attackers while letting valid users continue to use their
accounts. This prevents denial of service for users and protects against targeted attacks
against known user accounts.
PowerShell
$cred= Get-Credential
Update-AdfsArtifactDatabasePermission -Credential$cred
7 Note
The commands above may fail due to lack of sufficient permission because your AD FS
farm is using SQL Server, and the credential provided above does not have admin
permission on your SQL server. In this case, you can configure database permissions
manually in SQL Server Database by running the following command when you're
connected to the AdfsArtifactStore database.
SQL
Configure ESL
A new parameter that is named ExtranetLockoutMode is added to support ESL. It
contains the following values:
We recommend that you first set the lockout provider to log-only for a short period of
time (1 to 3 days) by running the following cmdlet. Review audits (see below for details)
during this period to determine the number of accounts that may potentially be
impacted as well as the frequency of these events. After successful evaluation of the
audits, set the setting to "ADFSSmartLockoutEnforce" mode:
PowerShell
In this mode, AD FS performs the analysis but does not block any requests because of
lockout counters. This mode is used to validate that smart lockout is running
successfully before it enables "enforce" mode.
For the new mode to take effect, restart the AD FS service on all nodes in the farm by
running the following command:
PowerShell
Restart-service adfssrv
If password-based authentication fails and the credentials do not come from a familiar
location, the failed authentication count is incremented.
After the number of failed password attempts from unfamiliar locations reaches the
lockout threshold, if password-based authentication from an unfamiliar location fails,
the account is locked out.
7 Note
Lockout continues to apply to familiar locations separately from this new unfamiliar
lockout counter.
Example:
PowerShell
Set-AdfsProperties -ExtranetLockoutThreshold 10
The observation window setting allows an account to automatically unlock after some
time. After the account unlocks, one authentication attempt is allowed. If the
authentication succeeds, the failed authentication count is reset to 0. If it fails, the
system waits for another observation window before the user can try again.
PowerShell
Enable lockout
Extranet lockout can be enabled or disabled by using the EnableExtranetLockout
parameter as in the following examples.
PowerShell
PowerShell
PowerShell
For the new mode to take effect, restart the AD FS service on all nodes in the farm by
using the following command:
PowerShell
Restart-service adfssrv
Managing ESL
7 Note
Get-ADFSAccountActivity
Read the current account activity for a user account. The cmdlet always
automatically connects to the farm master by using the Account Activity REST
endpoint. Therefore, all data should always be consistent.
PowerShell
Get-ADFSAccountActivity [email protected]
Set-ADFSAccountActivity
Update the account activity for a user account. This can be used to add new
familiar locations or erase state for any account.
PowerShell
Reset-ADFSAccountLockout
PowerShell
Troubleshooting
Updating database permissions
If any errors are returned from the Update-AdfsArtifactDatabasePermission cmdlet,
verify the following:
Verification will fail if nodes are on the farm list but are no longer members of the
farm. This can be fixed by running remove-adfsnode <node name> .
Verify that the update is deployed on all nodes in the farm.
Verify that the credentials that are passed to the cmdlet have permission to modify
the owner of the AD FS artifact database schema.
Logging/auditing
When an authentication request is rejected because the account exceeds the lockout
threshold, AD FS will write an ExtranetLockoutEvent to the security audit stream.
An extranet lockout event has occurred. See XML for failure details.
Activity ID: 172332e1-1301-4e56-0e00-0080000000db
Additional Data
XML: <?xml version="1.0" encoding="utf-16"?> <AuditBase
xmlns:xsd=" http://www.w3.org/2001/XMLSchema "
xmlns:xsi=" http://www.w3.org/2001/XMLSchema-instance "
xsi:type="ExtranetLockoutAudit"> <AuditType>ExtranetLockout</AuditType>
<AuditResult>Failure</AuditResult>
<FailureType>ExtranetLockoutError</FailureType>
<ErrorCode>AccountRestrictedAudit</ErrorCode>
<ContextComponents>
<Component xsi:type="ResourceAuditComponent">
<RelyingParty> http://contoso.com /adfs/services/trust</RelyingParty>
<ClaimsProvider>N/A</ClaimsProvider>
<UserId>TQDFTD\Administrator</UserId>
</Component>
<Component xsi:type="RequestAuditComponent">
<Server>N/A</Server>
<AuthProtocol>WSFederation</AuthProtocol>
<NetworkLocation>Intranet</NetworkLocation>
<IpAddress>4.4.4.4</IpAddress>
<ForwardedIpAddress />
<ProxyIpAddress>1.2.3.4</ProxyIpAddress>
<NetworkIpAddress>1.2.3.4</NetworkIpAddress>
<ProxyServer>N/A</ProxyServer>
<UserAgentString>Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36</UserAgentString>
<Endpoint>/adfs/ls</Endpoint>
</Component>
<Component xsi:type="LockoutConfigAuditComponent">
<CurrentBadPasswordCount>5</CurrentBadPasswordCount>
<ConfigBadPasswordCount>5</ConfigBadPasswordCount>
<LastBadAttempt>02/07/2018 21:47:44</LastBadAttempt>
<LockoutWindowConfig>00:30:00</LockoutWindowConfig>
</Component>
</ContextComponents>
</AuditBase>
Uninstall
SQL Server database farms can uninstall the update by using the Settings application
without issue.
WID database farms must follow these steps because of the updated WID database
verification binary:
1. Run the Uninstall psh script that stops the service and drops the account activity
table.
PowerShell
Feedback
Was this page helpful? Yes No
This article provides guidance and considerations for disabling and replacing TLS 1.0 in
Active Directory Federation Services (AD FS).
Summary
Many customers are considering the option to disable TLS 1.0 and RC4 protocol in AD
FS, and replace it with TLS 1.1 or a later version. This article discusses problems that can
occur if you disable TLS 1.0, and provides guidance to help you complete the process.
After you disable TLS 1.0 on AD FS or AD FS proxy (WAP) servers, those servers might
experience some of the following symptoms:
Connectivity between an AD FS proxy and an AD FS server fails. This may cause any
of the following conditions:
Proxies cannot forward traffic to AD FS servers, and the following error message
is generated:
AD FS cannot update the federation metadata of the Relying Party Trusts or Claims
Provider Trusts that are configured.
The service is unavailable. HTTP 503 accessing to Office 365 services for
federated domains.
You receive an RDP error message:
Cause
This problem occurs if customers disable old protocols by using SChannel registry keys.
For an example of this practice, see the Disable old protocols in the registry section.
Resolution
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
ADFS is developed by using Microsoft .NET Framework. For .NET applications to support
strong cryptography (that is, TLS 1.1 and above), you must first install the updates that
are described in the following security advisory: Microsoft Security Advisory 2960358.
) Important
7 Note
Systems that are running the .NET Framework 4.6 only are protected by
default and do not have to be updated.
The additional steps from the security advisory require that you create the
SchUseStrongCrypto registry key, as described in the advisory article.
To apply the change, you must restart the following services and applications:
ADFS Service (adfssrv)
Device Registration Service (drs)
Any other .NET application that might be running in the server
The Internet Information Services (IIS) application pool for ADFS (applies
only to ADFS 2.0 and ADFS 2.1)
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\SSL 3.0" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\SSL 3.0\Client" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\SSL 3.0\Server" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\SSL 3.0\Client" /v Enabled /t REG_DWORD /d 00000000
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\SSL 3.0\Server" /v Enabled /t REG_DWORD /d 00000000
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\TLS 1.0" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\TLS 1.0\Client" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\TLS 1.0\Server" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\TLS 1.0\Client" /v Enabled /t REG_DWORD /d 00000000
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
\TLS 1.0\Server" /v Enabled /t REG_DWORD /d 00000000
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\R
C4 40/128" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\R
C4 40/128" /v Enabled /t REG_DWORD /d 00000000
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\R
C4 56/128" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\R
C4 56/128" /v Enabled /t REG_DWORD /d 00000000
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\R
C4 128/128" /f
reg add
"HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\R
C4 128/128" /v Enabled /t REG_DWORD /d 00000000
7 Note
You must restart the computer after you change these values.
To verify that a server that's connected to the Internet has successfully disabled old
protocols, you can use any online SSL Test verifier such as Qualys SSL Labs. For more
information, see SSL Server Test .
Alternative solution
As an alternative to using the SchUseStrongCrypto registry key, you can use the
SystemDefaultTlsVersions registry key when you use the .NET Framework 3.5.1.
After the registry keys are set, the ADFS service honors SChannel defaults and work.
This is true, for example, of Android mobile 4.1.1 when you use the Intune Company
Portal application to enroll that device. The Intune application cannot show the ADFS
sign-in page.
This is expected in this Android version because TLS 1.1 is disabled by default.
You can get more details about these potential problems by collecting network traces
on the ADFS server or proxies while you reproduce the connection failure. In this
scenario, you can work with the client OS vendor or application vendor to verify that
newer TLS versions are supported. ADFS cannot update federation metadata.
Scenario 1
ADFS cannot automatically retrieve the Federationmetadata.xml from the Relying
Party Trusts or Claims Provider Trusts.
When you try to update the XML file manually, you receive the following error
message:
Or, you receive the following error message when you use Windows PowerShell:
By analyzing the underlying exception more closely, we can see the following
information:
PS C:> $error[0] | fl * -f
writeErrorStream : True
PSMessageDetails :
Exception : System.Net.WebException: The underlying connection was closed: An
unexpected error occurred on a receive. --->
System.ComponentModel.Win32Exception: The client and server cannot
communicate, because they do not possess a common algorithm
at System.Net.SSPIWrapper.AcquireCredentialsHandle(SSPIInterface SecModule,
String package, CredentialUse intent, SecureCredential scc)
at System.Net.Security.SecureChannel.AcquireCredentialsHandle(CredentialUse
credUsage, SecureCredential& secureCredential)
at System.Net.Security.SecureChannel.AcquireClientCredentials(Byte[]& thumbPrint)
at System.Net.Security.SecureChannel.GenerateToken(Byte[] input, Int32 offset, Int32
count, Byte[]& output)
at System.Net.Security.SecureChannel.NextMessage(Byte[] incoming, Int32 offset,
Int32 count)
at System.Net.Security.SslState.StartSendBlob(Byte[] incoming, Int32 count,
AsyncProtocolRequest asyncRequest)
at System.Net.Security.SslState.ForceAuthentication(Boolean receiveFirst, Byte[]
buffer, AsyncProtocolRequest asyncRequest)
at System.Net.Security.SslState.ProcessAuthentication(LazyAsyncResult lazyResult)
at System.Threading.ExecutionContext.RunInternal(ExecutionContext
executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext,
ContextCallback callback, Object state, Boolean preserveSyncCtx)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext,
ContextCallback callback, Object state)
at System.Net.TlsStream.ProcessAuthentication(LazyAsyncResult result)
at System.Net.TlsStream.Write(Byte[] buffer, Int32 offset, Int32 size)
at System.Net.ConnectStream.WriteHeaders(Boolean async)
--- End of inner exception stack trace ---
at System.Net.HttpWebRequest.GetResponse()
at
Microsoft.IdentityServer.Management.Resources.Managers.RelyingPartyTrustManage
r.ApplyMeta dataFromUrl(RelyingPartyTrust party, Uri metadataUrl, String&
warnings)
at
Microsoft.IdentityServer.Management.Commands.UpdateRelyingPartyTrustComman
d.OperateOnRely ingPartyTrust(RelyingPartyTrust party)
at
Microsoft.IdentityServer.Management.Commands.RemoveRelyingPartyTrustComman
d.ProcessRecord()
TargetObject : Microsoft.IdentityServer.Management.Resources.RelyingPartyTrust
CategoryInfo : NotSpecified: (Microsoft.Ident...lyingPartyTrust:RelyingPartyTrust)
[Update-AdfsRelyingPartyTrust], WebException
FullyQualifiedErrorId : The underlying connection was closed: An unexpected error
occurred on a
receive.,Microsoft.IdentityServer.Management.Commands.UpdateRelyingPartyTrustC
ommand
ErrorDetails : The underlying connection was closed: An unexpected error occurred
on a receive. InvocationInfo : System.Management.Automation.InvocationInfo
ScriptStackTrace : at <ScriptBlock>, <No file>: line 1
PipelineIterationInfo : {0, 1}
When we analyze the network traces, we don't see any ClientHello. Also, the client itself
(ADFS) is closing the connection (TCP FIN) when we would expect it to send the
ClientHello:
The reason for this is that the SChannel registry keys were created. These remove
support for SSL 3.0 or TLS 1.0 as a client.
However, the SchUseStrongCrypto key wasn't created. So after we establish the TCP/IP
session, the ClientHello should be sent by having these conditions:
.NET by using weak cryptography (only TLS 1.0 and earlier versions)
SChannel configured to use only TLS 1.1 or later versions
Scenario 2
Only TLS 1.1 and later versions are supported in the ADFS serviceOffice.
You have a O365 federated domain.
The client is accessing some O365 service that is using proxiedauthentication:
Client application sent the credential using HTTP Basic, and the O365 service is
using those credentials in a new connection to ADFS to authenticate the user.
The cloud service sends a TLS 1.0 to ADFS, and ADFS closes the connection.
The client receives a response HTTP 503.
For example, this is true when you access Autodiscover. In this scenario, Outlook clients
are affected. This can be easily reproduced by opening a web browser and going to
https://autodiscover-s.outlook.com/Autodiscover/Autodiscover .
xmlRequest sent:
Analyzing network traces in the WAP server, we can see several connections coming
from our cloud, as follows. WAP terminates (TCP RST) these connections soon after it
receives the Client Hello.
In this scenario, it's expected that ADFS proxy is rejecting the connection. This problem
has been reported to Exchange Online team and is under investigation.
Workarounds:
7 Note
This has not been tested. However, conceptually, the connection to ADFS is
directly from the client application. Therefore, it should work if it supports TLS
1.1.
References
Payment Card Industry (PCI) Data Security Standard (DSS)
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error 0x80072EE7 that occurs when users perform a
Workplace Join.
7 Note
Home users: This article is intended for use by support agents and IT professionals,
not by home users. For best search results, change your search keywords to include
the product that's triggering the error and the error code.
Symptoms
When users try to perform a Workplace Join, they receive the following error message:
Confirm you are using the current sign-in info, and that your workplace uses this
feature. Also, the connection to your workplace might not be working right now.
Wait and try again.
Additionally, an administrator may see the following event details in Event Viewer:
The server name or address could not be resolved. Could not connect to
https://EnterpriseRegistration.domainTEST.com:443/EnrollmentServer/contract?
api-version=1.0 .
Cause
This problem occurs if one of the following conditions is true:
The currently signed-in user is from a domain that does not contain a DNS record
for the DRS Service.
A user who has a user principal name (UPN) suffix that uses the initial domain (for
example, [email protected]) and who is not yet enabled as the mobile
device management authority through Microsoft Intune for mobile device
management in Office 365 tries to perform a Workplace Join.
Resolution
Verify DNS
To resolve this problem, follow these steps:
1. Verify the EnterpriseRegistration CNAME record for the UPN suffix of the user
account. This is the part after the "@" character, such as in [email protected].
2. Open a Command Prompt window, and then run the following command:
Console
Nslookup enterpriseregistration.domain.com
References
For more troubleshooting information, see the following article in the Microsoft
Knowledge Base:
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows Server 2012
Original KB number: 2587730
Symptoms
When you run the Set-MsolADFSContext -Computer command in the Microsoft Azure
Active Directory module for Windows PowerShell, you receive the following error:
7 Note
Azure AD Powershell is planned for deprecation on March 30, 2024. To learn more,
read the deprecation update .
Cause
This error occurs if Remote PowerShell isn't enabled on the Active Directory Federation
Services (AD FS) federation server that the -computer parameter references.
When a domain is added correctly and verified in the portal, you can use the Azure
Active Directory module for Windows PowerShell to set up single sign-on (SSO) from a
management workstation by using Remote PowerShell.
However, the Azure Active Directory module for Windows PowerShell can only be
installed on Windows 7 and on Windows Server 2008 SR2. The Azure Active Directory
module for Windows PowerShell can't be installed on Windows Server 2008 Service Pack
2 (SP2). Therefore, this problem is especially relevant where AD FS is installed on a
Windows Server 2008 SP2 platform. In this case, the Azure Active Directory module for
Windows PowerShell command that's related to AD FS must be issued from a remote
computer.
Resolution
To enable Remote PowerShell on the AD FS federation server, follow these steps:
2. To set up Windows PowerShell for remoting, type the following command, and
then press Enter:
PowerShell
Enable-PSRemoting -force
More information
For more information about Remote PowerShell requirements, see
About_Remote_Requirements.
For more information about Remote PowerShell functionality, see Windows PowerShell:
Dive Deep into Remoting.
Still need help? Go to Microsoft Community or the Microsoft Entra Forums website.
Feedback
Was this page helpful? Yes No
This article provides a resolution to resolve an issue where you receive "Failed to
connect to Active Directory Federation Services 2.0 on the local machine" error when
converting a domain from federated to managed using Convert-MsolDomainToStandard
cmdlet.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows Server 2012
Original KB number: 3018485
7 Note
Azure AD Powershell is planned for deprecation on March 30, 2024. To learn more,
read the deprecation update .
Symptoms
When you run the Convert-MsolDomainToStandard cmdlet to convert a domain from
Federated to Managed, you receive the following error message:
Failed to connect to Active Directory Federation Services 2.0 on the local machine.
Please try running Set-MsolADFSContect before running this command again.
Cause
This problem occurs if the server on which you're running the Convert-
MsolDomainToStandard cmdlet is not running Active Directory Federation Services (AD
FS).
Resolution
Do one of the following, as appropriate for your situation:
For example:
PowerShell
For example:
PowerShell
More information
Still need help? Go to Microsoft Community or Microsoft Entra Forums website.
Feedback
Was this page helpful? Yes No
Provide product feedback
How to restore IIS and clean up Active
Directory when you uninstall Active
Directory Federation Services 2.0
Article • 02/19/2024
This article describes how to restore Internet Information Services (IIS) and clean up
Active Directory when you uninstall Active Directory Federation Services 2.0.
Introduction
The Active Directory Federation Services 2.0(AD FS 2.0) uninstallation wizard uninstalls
AD FS 2.0 from your computer. However, you may still have to manually restore or
cleanup settings in either of the following situations:
When you uninstall AD FS 2.0 from a federation server or federation server proxy
computer, the uninstall wizard doesn't restore IIS to its original state.
When you uninstall AD FS 2.0 from the last added federation server in a federation
server farm, the uninstall process does not delete the certificate sharing container
that was created in Active Directory.
If you run the AD FS 2.0 Federation Server Configuration Wizard after reinstalling AD FS
2.0 but you have not cleaned up the previous AD FS 2.0 configuration from IIS, you may
see one of the following symptoms:
The Configuration Results page may show the component Deploy browser sign-in
Web site listed with status Configuration finished with warnings. When you click
the status you may see the following warning:
Existing Web site detected. Therefore, the Web site was not reinstalled. If you
are trying to redeploy the default AD FS 2.0 Web sites, see
http://go.microsoft.com/fwlink/?LinkId=181110 for details.
The Configuration Results page may show the component Deploy browser sign-in
Web site listed with status Configuring components... when the following error
message is displayed:
Cannot copy the Web site files to C:\inetpub\adfs\ls because the directory
already exists. Either remove the directory and rerun the configuration wizard,
or update the existing Web site manually.
You can use the following methods to clean up or restore the original configuration:
1. Click Start, select Administrative Tools, and then select IIS Manager.
2. Expand the server name node, expand Sites, and then select Default Web Site.
7 Note
You should see the following two virtual directories associated with AD FS 2.0:
/adfs
/adfs/ls
4. Right-click the AD FS 2.0 application that is in each virtual directory, and then click
Remove.
7 Note
The next two steps show how to remove the \adfs directory from the
"inetpub" directory. If you have made custom changes to the content within
this directory, we recommend that you back up this content to another
location before removing the directory.
1. Before you remove AD FS 2.0 from the last federation server in the farm, run the
following PowerShell commands on the AD FS 2.0 STS to determine the location of
the certificate sharing container in Active Directory:
PowerShell
Add-PsSnapin Microsoft.Adfs.Powershell
Get-AdfsProperties
4. Click Start, click Run, type ADSIEdit.msc, and then press ENTER.
5. In the ADSIEdit tool, connect to the Default naming context by following these
steps:
a. Right-click ADSI Edit, and then click Connect to.
b. Under Connection Point, click Select a well-known Naming Context, and then
select Default naming context.
c. Click OK.
7 Note
Under CN=ADFS, you see a container named CN={GUID} for each AD FS 2.0
farm that you have deployed, where {GUID} matches the
CertificateSharingContainer property that you captured by using the Get-
AdfsProperties PowerShell command in step 1.
Feedback
Was this page helpful? Yes No
This article provides a solution to fix the Active Directory Federated Services (AD FS) 2.0
error.
Summary
Most AD FS 2.0 problems belong to one of the following main categories. This article
contains step-by-step instructions to troubleshoot claims rules problems.
Symptoms
The token that is issued by the AD FS service does not have the appropriate claims
to authorize user access to the application.
Access is Denied
Event ID 325
The Federation Service could not authorize token issuance for the caller.
Resolution
To resolve this problem, follow these steps in the order given. These steps will help you
to determine the cause of the problem. Make sure that you check whether the problem
is resolved after every step.
Step 1: Obtain details about required claims
Determine which claim types are required in the SAML token from the relying party
owner.
Determine which claims provider was used to authenticate the user.
For example:
A relying party provider may indicate that it wants the Email, Name, and Role
values of the user to be provided.
If the claim provider in this situation is "Active Directory," you should configure an
Acceptance claim rule at the "Active Directory" level.
7 Note
If the claim provider is another Security Token Service (STS), we must create a
Pass Through or Transform claim rule to accept the claim values store in
locally defined claims types that are to be passed to the relying party.
Create a Pass Through claim for these claims at the relying party level.
For more information about this process, see AD FS 2.0: How to Use Fiddler Web
Debugger to Analyze a WS-Federation Passive Sign-In .
1. Click Start, point to Administrative Tools, and then click Local Security Policy.
2. Double-click Local Policies, and then click Audit Policy.
3. In the details pane, double-click Audit object access.
4. On the Audit object access Properties page, select either Success or Failure or
both, and then click OK.
5. Close the Local Security Settings snap-in.
6. At a command prompt, type gpupdate /force, and then press Enter to immediately
refresh the local policy.
You can also use the following GPO to configure the Windows Security Log:
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article discusses workflow troubleshooting for authentication issues for federated
users in Microsoft Entra ID or Office 365.
Symptoms
Federated users can't sign in to Office 365 or Microsoft Azure even though
managed cloud-only users who have a domainxx.onmicrosoft.com UPN suffix can
sign in without a problem.
Redirection to Active Directory Federation Services (AD FS) or STS doesn't occur for
a federated user. Or, a "Page cannot be displayed" error is triggered.
You receive a certificate-related warning on a browser when you try to authenticate
with AD FS. Which states that certificate validation fails or that the certificate isn't
trusted.
"Unknown Auth method" error or errors stating that AuthnContext isn't supported.
Also, errors at the AD FS or STS level when you're redirected from Office 365.
AD FS throws an "Access is Denied" error.
AD FS throws an error stating that there's a problem accessing the site; which
includes a reference ID number.
The user is repeatedly prompted for credentials at the AD FS level.
Federated users can't authenticate from an external network or when they use an
application that takes the external network route (Outlook, for example).
Federated users can't sign in after a token-signing certificate is changed on AD FS.
A "Sorry, but we're having trouble signing you in" error is triggered when a
federated user signs in to Office 365 in Microsoft Azure. This error includes error
codes such as 8004786C, 80041034, 80041317, 80043431, 80048163, 80045C06,
8004789A, or BAD request.
Troubleshooting workflow
1. Access Microsoft Office Home , and then enter the federated user's sign-in name
([email protected]). After you press Tab to remove the focus from the login
box, check whether the status of the page changes to Redirecting and then you're
redirected to your Active Directory Federation Service (AD FS) for sign-in.
7 Note
b. If redirection occurs but you aren't redirected to your AD FS server for sign-in,
check whether the AD FS service name resolves to the correct IP and whether it
can connect to that IP on TCP port 443.
If the domain is displayed as Federated, obtain information about the
federation trust by running the following commands:
PowerShell
Check the URI, URL, and certificate of the federation partner that's configured
by Office 365 or Microsoft Entra ID.
2. After you're redirected to AD FS, the browser may throw a certificate trust-related
error, and for some clients and devices it may not let you establish an SSL (Secure
Sockets Layer) session with AD FS. To resolve this issue, follow these steps:
In AD FS 2.0:
In AD FS 2012 R2:
3. You may meet an "Unknown Auth method" error or errors stating that
AuthnContext isn't supported at the AD FS or STS level when you're redirected
from Office 365. It's most common when redirect to the AD FS or STS by using a
parameter that enforces an authentication method. To enforce an authentication
method, use one of the following methods:
XML
<saml:AuthnContext>
<saml:AuthnContextClassRef>
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
</saml:AuthnContextClassRef>
</saml:AuthnContext>
When the enforced authentication method is sent with an incorrect value, or if that
authentication method isn't supported on AD FS or STS, you receive an error
message before you're authenticated.
The following table shows the authentication type URIs that are recognized by AD
FS for WS-Federation passive authentication.
ノ Expand table
Kerberos urn:oasis:names:tc:SAML:2.0:ac:classes:Kerberos
AD FS 2.0
Under /adfs/ls/web.config, make sure that the entry for the authentication type is
present.
XML
<microsoft.identityServer.web>
<localAuthenticationTypes>
< add name="Forms" page="FormsSignIn.aspx" />
<add name="Integrated" page="auth/integrated/" />
<add name="TlsClient" page="auth/sslclient/" />
<add name="Basic" page="auth/basic/" />
</localAuthenticationTypes>
AD FS 2012 R2
b. In the Primary Authentication section, select Edit next to Global Settings. You
can also right-click Authentication Policies and then select Edit Global Primary
Authentication. Or, in the Actions pane, select Edit Global Primary
Authentication.
c. In the Edit Global Authentication Policy window, on the Primary tab, you can
configure settings as part of the global authentication policy. For example, for
primary authentication, you can select available authentication methods under
Extranet and Intranet.
Make sure that the required authentication method check box is selected.
4. If you get to your AD FS and enter you credentials but you cannot be
authenticated, check for the following issues.
You can also collect an AD replication summary to make sure that AD changes
are being replicated correctly across all domain controllers. The repadmin
/showrepl * /csv > showrepl.csv output is helpful for checking the replication
i. Use local or domain policy to enable success and failure for the following
policies:
iii. In the Federation Service Properties dialog box, select the Events tab.
iv. Select the Success audits and Failure audits check boxes.
v. Run GPupdate /force on the server.
When UPN is used for authentication in this scenario, the user is authenticated
against the duplicate user. So the credentials that are provided aren't validated.
You can use queries like the following to check whether there are multiple
objects in AD that have the same values for an attribute:
PowerShell
Make sure that the UPN on the duplicate user is renamed, so that the
authentication request with the UPN is validated against the correct objects.
e. In a scenario, where you're using your email address as the login ID in Office
365, and you enter the same email address when you're redirected to AD FS for
authentication, authentication may fail with a "NO_SUCH_USER" error in the
Audit logs. To enable AD FS to find a user for authentication by using an
attribute other than UPN or SAMaccountname, you must configure AD FS to
support an alternate login ID. For more information, see Configuring Alternate
Login ID.
On AD FS 2012 R2
PowerShell
7 Note
AlternateLoginID is the LDAP name of the attribute that you want to use
for login. And LookupForests is the list of forests DNS entries that your
users belong to.
To enable the alternate login ID feature, you must configure both the
AlternateLoginID and LookupForests parameters with a non-null, valid value.
Ensure that the private key for the chosen certificate is accessible to the
service account for this Federation Service on each server in the farm.
ii. Select Start, select Run, type mmc.exe, and then press Enter.
vii. Expand Certificates (Local Computer), expand Persona l, and then select
Certificates.
viii. Right-click your new token-signing certificate, select All Tasks, and then
select Manage Private Keys.
ix. Add Read access for your AD FS 2.0 service account, and then select OK.
g. The Extended Protection option for Windows Authentication is enabled for the
AD FS or LS virtual directory. It may cause issues with specific browsers.
Sometimes you may see AD FS repeatedly prompting for credentials, and it
might be related to the Extended protection setting that's enabled for Windows
Authentication for the AD FS or LS application in IIS.
When Extended Protection for authentication is enabled, authentication
requests are bound to both the Service Principal Names (SPNs) of the server to
which the client tries to connect and to the outer Transport Layer Security (TLS)
channel over which Integrated Windows Authentication occurs. Extended
protection enhances the existing Windows Authentication functionality to
mitigate authentication relays or "man in the middle" attacks. However, certain
browsers don't work with the Extended protection setting; instead they
repeatedly prompt for credentials and then deny access. Disabling Extended
protection helps in this scenario.
For AD FS 2012 R2
PowerShell
h. Issuance Authorization rules in the Relying Party (RP) trust may deny access to
users. On the AD FS Relying Party trust, you can configure the Issuance
Authorization rules that control whether an authenticated user should be issued
a token for a Relying Party. Administrators can use the claims that are issued to
decide whether to deny access to a user who's a member of a group that's
pulled up as a claim.
If certain federated users can't authenticate through AD FS, you may want to
check the Issuance Authorization rules for the Office 365 RP and see whether
the Permit Access to All Users rule is configured.
If this rule isn't configured, peruse the custom authorization rules to check
whether the condition in that rule evaluates "true" for the affected user. For
more information, see the following resources:
If you can authenticate from an intranet when you access the AD FS server
directly, but you can't authenticate when you access AD FS through an AD FS
proxy, check for the following issues:
Make sure that the time on the AD FS server and the time on the proxy are
in sync. When the time on the AD FS server is off by more than five
minutes from the time on the domain controllers, authentication failures
occur. When the time on AD FS proxy isn't synced with AD FS, the proxy
trust is affected and broken. So a request that comes through the AD FS
proxy fails.
Check whether the AD FS proxy Trust with the AD FS service is working
correctly. Rerun the proxy configuration if you suspect that the proxy trust
is broken.
5. After your AD FS issues a token, Microsoft Entra ID or Office 365 throws an error. In
this situation, check for the following issues:
The claims that are issued by AD FS in token should match the respective
attributes of the user in Microsoft Entra ID. In the token for Microsoft Entra ID
or Office 365, the following claims are required.
WSFED:
UPN: The value of this claim should match the UPN of the users in Microsoft
Entra ID.
ImmutableID: The value of this claim should match the sourceAnchor or
ImmutableID of the user in Microsoft Entra ID.
To get the User attribute value in Microsoft Entra ID, run the following
command line:
PowerShell
SAML 2.0:
IDPEmail: The value of this claim should match the user principal name of the
users in Microsoft Entra ID.
NAMEID: The value of this claim should match the sourceAnchor or
ImmutableID of the user in Microsoft Entra ID.
For more information, see Use a SAML 2.0 identity provider to implement
single sign-on.
Examples:
This issue can occur when the UPN of a synced user is changed in AD but
without updating the online directory. In this scenario, you can either correct
the user's UPN in AD (to match the related user's logon name) or run the
following cmdlet to change the logon name of the related user in the Online
directory:
PowerShell
It might also be that you're using AADsync to sync MAIL as UPN and EMPID
as SourceAnchor, but the Relying Party claim rules at the AD FS level haven't
been updated to send MAIL as UPN and EMPID as ImmutableID.
It's one of the most common issues. AD FS uses the token-signing certificate
to sign the token that's sent to the user or application. The trust between the
AD FS and Office 365 is a federated trust that's based on this token-signing
certificate (for example, Office 365 verifies that the token received is signed
by using a token-signing certificate of the claim provider [the AD FS service]
that it trusts).
Office 365 or Microsoft Entra ID will try to reach out to the AD FS service,
assuming the service is reachable over the public network. We try to poll the
AD FS federation metadata at regular intervals, to pull any configuration
changes on AD FS, mainly the token-signing certificate info. If this process is
not working, the global admin should receive a warning on the Office 365
portal about the token-signing certificate expiry and about the actions that
are required to update it.
PowerShell
You can also run the following tool to schedule a task on the AD FS server
that will monitor for the Auto-certificate rollover of the token-signing
certificate and update the Office 365 tenant automatically.
Issuance Transform claim rules for the Office 365 RP aren't configured
correctly.
In a scenario where you have multiple TLDs (top-level domains), you might
have logon issues if the Supportmultipledomain switch wasn't used when the
RP trust was created and updated. For more information, see
SupportMultipleDomain switch, when managing SSO to Office 365.
Make sure that token encryption isn't being used by AD FS or STS when a
token is issued to Microsoft Entra ID or to Office 365.
Sometimes during login in from a workstation to the portal (or when using
Outlook), when the user is prompted for credentials, the credentials may be saved
for the target (Office 365 or AD FS service) in the Windows Credentials Manager
( Control Panel\User Accounts\Credential Manager ). This helps prevent a
credentials prompt for some time, but it may cause a problem after the user
password has changed and the credentials manager isn't updated. In that scenario,
stale credentials are sent to the AD FS service, and that's why authentication fails.
Removing or updating the cached credentials, in Windows Credential Manager
may help.
7. Make sure that Secure Hash Algorithm that's configured on the Relying Party Trust
for Office 365 is set to SHA1.
When the trust between the STS / AD FS and Microsoft Entra ID / Office 365 is
using SAML 2.0 protocol, the Secure Hash Algorithm configured for digital
signature should be SHA1.
8. If none of the preceding causes apply to your situation, create a support case with
Microsoft and ask them to check whether the User account appears consistently
under the Office 365 tenant. For more information, see A federated user is
repeatedly prompted for credentials during sign-in to Office 365, Azure or Intune.
9. Depending on which cloud service (integrated with Microsoft Entra ID) you are
accessing, the authentication request that's sent to AD FS may vary. For example:
certain requests may include additional parameters such as Wauth or Wfresh, and
these parameters may cause different behavior at the AD FS level.
We recommend that AD FS binaries always be kept updated to include the fixes for
known issues. For more information about the latest updates, see the following
table.
ノ Expand table
AD FS 2.0 AD FS 2012 R2
Description of Update Rollup 3 for Active December 2014 update rollup for
Directory Federation Services (AD FS) Windows RT 8.1, Windows 8.1, and
2.0 Windows Server 2012 R2
Update is available to fix several issues
after you install security update 2843638
on an AD FS server
Feedback
Was this page helpful? Yes No
This article helps you resolve single sign-on (SSO) issues with Active Directory
Federation Services (AD FS).
Select one of the following section according to the type of issue that you encounter.
On the Advanced tab, make sure that the Enable Integrated Windows
Authentication setting is enabled.
Following Security > Local intranet > Sites > Advanced, make sure that the AD FS
URL is in the list of websites.
Following Security > Local intranet > Custom level, make sure that the Automatic
logon only in Intranet Zone setting is selected.
If you use Firefox, Chrome or Safari, make sure the equivalent settings in these browsers
are enabled.
PowerShell
Get-ADFSGlobalAuthenticationPolicy | fl
WindowsIntegratedFallbackEnabled
If the value is True, forms-based authentication is expected. This means that the
authentication request comes from a browser that doesn't support Windows Integrated
Authentication. See the next section about how to get your browser supported.
1. Get the list of supported user agents by running the following command:
PowerShell
2. Examine the list of user agent strings that the command returns.
Verify if the user agent string of your browser is in the list. If not, add the user agent
string by following the steps below:
2. Get the list of supported user agents by running the following command:
PowerShell
3. Add the user agent string of your browser by running the following command:
PowerShell
$wiaStrings = $wiaStrings+"NewUAString"
Example:
PowerShell
PowerShell
If the application that you want to access is not Microsoft Online Services, what you
experience is expected and controlled by the incoming authentication request. Work
with the application owner to change the behavior.
7 Note
Azure AD Powershell is planned for deprecation on March 30, 2024. To learn more,
read the deprecation update .
If the application is Microsoft Online Services, what you experience may be controlled by
the PromptLoginBehavior setting from the trusted realm object. This setting controls
whether Microsoft Entra tenants send prompt=login to AD FS. To set the
PromptLoginBehavior setting, follow these steps:
2. Get the existing domain federation setting by running the following command:
PowerShell
PowerShell
PowerShell
After you run this command, Office 365 applications won't include the prompt=login
parameter in each authentication request.
For more information about multi-factor authentication in AD FS, see the following
articles:
PowerShell
Get-ADFSAdditionalAuthenticationRule
To check the configuration on the relying party, run the following command:
PowerShell
7 Note
If the commands return nothing, the additional authentication rules are not
configured. Skip this section.
Value = "http://schemas.microsoft.com/claims/multipleauthn"
Here are examples that require multi-factor authentication to be used for non-
workplace joined devices and for extranet access respectively:
c:[Type ==
"http://schemas.microsoft.com/2012/01/devicecontext/claims/isregistereduser",
c:[Type == "http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork",
Value == "false"] => issue(Type =
"http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod"
, Value = "http://schemas.microsoft.com/claims/multipleauthn")
PowerShell
The rule set should include the following issuance rule to pass through the multi-factor
authentication claims:
C:
[Type==http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod
, Value==" http://schemas.microsoft.com/claims/multipleauthn"]=>issue(claim = c)
1. Get the current SupportsMFA domain federation setting by running the following
command:
PowerShell
PowerShell
If the issue occurs at the AD FS sign-in page, you receive an "An error occurred", "HTTP
503 Service is unavailable" or some other error message. The URL of the error page
shows the AD FS service name such as fs.contoso.com .
If the issue occurs at the application side, the URL of the error page shows the IP
address or the site name of the target service.
Follow the steps in the following section according where you encounter this issue.
Let's check the internal sign-in functionality using IdpInitiatedSignOn. To do this, use the
IdpInititatedSignOn page to verify if the AD FS service is up and running and the
authentication functionality is working correctly. To open the IdpInitiatedSignOn page,
follow these steps:
PowerShell
2. From a computer that is inside your network, visit the following page:
https://<FederationInstance>/adfs/ls/idpinitiatedsignon.aspx
Then, check the external sign-in functionality using IdpInitiatedSignOn. Use the
IdpInititatedSignOn page to quickly verify if the AD FS service is up and running and the
authentication functionality is working correctly. To open the IdpInitiatedSignOn page,
follow these steps:
PowerShell
2. From a computer that is outside of your network, visit the following page:
https://<FederationInstance>/adfs/ls/idpinitiatedsignon.aspx
If the sign-in is successful, continue the troubleshooting with the steps in All users are
impacted by the issue, and the user can access some of the relying parties.
Check if the endpoints are enabled. AD FS provides various endpoints for different
functionalities and scenarios. Not all endpoints are enabled by default. To check the
status of the endpoints, following these steps:
3. Locate the endpoints and verify if the statuses are enabled on the Enabled column.
Then, check if Microsoft Entra Connect is installed. We recommend that you use
Microsoft Entra Connect which makes SSL certificate management easier.
If Microsoft Entra Connect is installed, ensure that you use it to manage and update SSL
certificates.
If Microsoft Entra Connect is not installed, check if the SSL certificate meets the
following AD FS requirements:
AD FS requires that SSL certificates are from a trusted root certification authority. If
AD FS is accessed from non-domain joined computers, we recommend that you
use an SSL certificate from a trusted third-party root certification authority like
DigiCert, VeriSign, etc. If the SSL certificate is not from a trusted root certification
authority, SSL communication can break.
The subject name should match the federation service name, not the AD FS server
name or some other name. To get the federation service name, run the following
command on the primary AD FS server:
Get-AdfsProperties | select hostname
Check for certificate revocation. If the certificate is revoked, SSL connection can't
be trusted and will be blocked by clients.
If the SSL certificate does not meet these requirements, try to get a qualified certificate
for SSL communication. We recommend that you use Microsoft Entra Connect which
makes SSL certificate management easier. See Update the TLS/SSL certificate for an
Active Directory Federation Services (AD FS) farm.
If the SSL certificate meets these requirements, check the following configurations of the
SSL certificate.
The SSL certificate should be installed to the Personal store for the local computer on
each federation server in your farm. To install the certificate, double click the .PFX file of
the certificate and follow the wizard.
To verify if the certificate is installed to the correct place, follow these steps:
1. List the certificates that are in the Personal store for the local computer by running
the following command:
dir Cert:\LocalMachine\My
Get the thumbprint of the certificate that is in use for SSL communication and verify if
the thumbprint matches the expected certificate thumbprint.
To get the thumbprint of the certificate that is in use, run the following command in
Windows PowerShell:
PowerShell
Get-AdfsSslCertificate
If the wrong certificate is used, set the correct certificate by running the following
command:
PowerShell
The SSL certificate needs to be set as the service communication certificate in your AD
FS farm. This does not happen automatically. To check if the correct certificate is set,
follow these steps:
If the wrong certificate is listed, set the correct certificate, and then grant the AD FS
service the Read permission to the certificate. To do this, follow these steps:
3. If adfssrv is not listed, grant the AD FS service the Read permission to the
certificate:
a. Click Add, click Locations, click the server, and then click OK.
b. Under Enter the object names to select, enter nt service\adfssrv, click Check
Names, and then click OK.
If you are using AD FS with Device Registration Service (DRS), enter nt
service\drs instead.
c. Grant the Read permission, and then click OK.
If you've configured AD FS with DRS, make sure that the SSL certificate is also properly
configured for RDS. For example, if there are two UPN suffixes contoso.com and
fabrikam.com , the certificate must have enterpriseregistration.contoso.com and
To check if the SSL certificate has the correct SANs, follow these steps:
1. List all the UPN suffixes being used in the organization by running the following
command:
PowerShell
Get-AdfsDeviceRegistratrionUpnSuffix
3. If SSL certificate does not have the correct DRS names as SANs, get a new SSL
certificate that has the correct SANs for DRS, and then use it as the SSL certificate
for AD FS.
Then, check the certificate configuration on WAP servers and the fallback bindings:
1. Make sure that the SSL certificate is installed in the Personal store for the
local computer on each WAP server.
2. Get the SSL certificate used by WAP by running the following command:
PowerShell
Get-WebApplicationProxySslCertificate
3. If the SSL certificate is wrong, set the correct SSL certificate by running the
following command:
PowerShell
To support non-SNI cases, administrators may specify fallback bindings. Other than
the standard federationservicename:443 binding, look for fallback bindings under
the following application IDs:
{5d89a20c-beab-4389-9447-324788eb944a}: This is the application ID for AD
FS.
{f955c070-e044-456c-ac00-e9e4275b3f04}: This is the application ID for Web
Application Proxy.
For example, if the SSL certificate is specified for a fallback binding like 0.0.0.0:443,
make sure that the binding is updated accordingly when the SSL certificate gets
updated.
All users are impacted by the issue, and the user can access some
of the relying parties
First, let's get the relying party and OAuth client information. If you use a conventional
relying party, follow these steps:
PowerShell
Add-PSSnapin Microsoft.Adfs.PowerShell
PowerShell
$rp = Get-AdfsRelyingPartyTrust RPName
PowerShell
If you use the Application Group feature in Windows Server 2016, follow the steps
below:
3. If the OAuth client is public, get the client information by running the following
command:
PowerShell
If the client is confidential, get the client information by running the following
command:
PowerShell
The relying party identifier, client ID and redirect URI should be provided by the owner
of the application and the client. However, there could still be a mismatch between what
the owner provides and what are configured in AD FS. For example, a mismatch could
be caused by a typo. Check if the settings provided by the owner match those
configured in AD FS. The steps in the previous page get you the settings configured in
AD FS via PowerShell.
ノ Expand table
Client ID $client.ClientId
If items in the table matches, additionally check if these settings match between what
they appear in the authentication request sent to AD FS and what are configured in AD
FS. Try reproducing the issue during which you capture a Fiddler trace on the
authentication request sent by the application to AD FS. Examine the request
parameters to do the following checks depending on the request type.
OAuth requests
https://sts.contoso.com/adfs/oauth2/authorize?
response_type=code&client_id=ClientID&redirect_uri=https://www.TestApp.com&resource
=https://www.TestApp.com
ノ Expand table
client_id $client.ClientId
The "resource" parameter should represent a valid relying party in AD FS. Get the relying
party information by running one of the following commands.
WS-Fed requests
https://fs.contoso.com/adfs/ls/?
wa=wsignin1.0&wtrealm=https://claimsweb.contoso.com&wctx=rm=0&id=passive&ru=/&wct=2
014-10-21T22:15:42Z
ノ Expand table
wtrealm $rp.Identifier
SAML requests
https://sts.contoso.com/adfs/ls/?
SAMLRequest=EncodedValue&RelayState=cookie:29002348&SigAlg=http://www.w3.org/2000/0
9/Fxmldsig#rsa-sha1&Signature=Signature
Decode the value of the SAMLRequest parameter by using the "From DeflatedSAML"
option in the Fiddler Text Wizard. The decoded value looks like the following:
XML
Not all users are impacted by the issue, and the user can't access
any of the relying parties
In this scenario, do the following checks.
Check the user status in Windows PowerShell or the UI. If the user is disabled, enable the
user.
PowerShell
3. Click the Users node, right-click the user in the right pane, and then click
Properties.
If any property of the user is updated in the Active Directory, it results in a change in the
metadata of the user object. Check the user metadata object to see which properties
were updated recently. If changes are found, make sure that they are picked up by the
related services. To check if there were property changes to a user, following these steps:
4. In the metadata, examine the Time/Date column for each attribute for any clue to a
change. In the following example, the userPrincipleName attribute takes a newer
date than the other attributes which represents a change to the user object
metadata.
3. In the management console, right-click the domain that contains the trust that you
want to verify, and then click Properties.
5. Under Domains trusted by this domain (outgoing trusts) or Domains that trust
this domain (incoming trusts), click the trust to be verified, and then click
Properties.
6. Click Validate.
In the Active Directory Domain Services dialog box, select either of the options.
If you select No, we recommend that you repeat the same procedure for the
reciprocal domain.
If you select Yes, provide an administrative user credential for the reciprocal
domain. There is no need to perform the same procedure for the reciprocal
domain.
If these steps did not help you solve the issue, continue the troubleshooting with the
steps in the Not all users are impacted by the issue, and the user can access some of the
relying parties section.
Not all users are impacted by the issue, and the user can access
some of the relying parties
In this scenario, check if this issue occurs in a Microsoft Entra scenario. If so, do these
checks to troubleshoot this issue. If not, see Use the Dump Token app to troubleshoot
this issue.
If a user is trying to log in to Microsoft Entra ID, they will be redirected to AD FS for
authentication for a federated domain. One of the possible reasons for a failed login is
that the user is not yet synced to Microsoft Entra ID. You might see a loop from
Microsoft Entra ID to Active Directory FS after the first authentication attempt at AD FS.
To determine whether the user is synced to Microsoft Entra ID, follow these steps:
1. Download and install the Azure AD PowerShell module for Windows PowerShell.
2. Open Windows PowerShell with the "Run as administrator" option.
3. Initiate a connection to Microsoft Entra ID by running the following command:
Connect-MsolService
If the user is not in the list, sync the user to Microsoft Entra ID.
Microsoft Entra ID requires immutableID and the user's UPN to authenticate the user.
7 Note
Azure AD Sync
Azure Active Directory Sync (DirSync)
To check if the claim rules for immutableID and UPN in AD FS matches what Microsoft
Entra ID uses, follow these steps:
c. Right-click the relying party trust with Microsoft Entra ID, and then click Edit
Claim Issuance Policy.
e. Verify if the variables queried for values of immutableID and UPN are the same
as those appear in Microsoft Entra Connect.
3. If there is a difference, use one of the methods below:
If these checks did not help you solve the issue, see Use the Dump Token app to
troubleshoot this issue.
PowerShell
3. Get the thumbprint of the current token signing certificate on the federation
partner. The application owner needs to provide you this.
Do the same check if AD FS uses a renewed token decrypting certificate, except that the
command to get the token decrypting certificate on AD FS is as follows:
PowerShell
If the thumbprints match, ensure the partners are using the new AD FS certificates.
If there are certificate mismatches, ensure that the partners are using the new
certificates. Certificates are included in the federation metadata published by the AD FS
server.
7 Note
If the partners can access the federation metadata, ask the partners to use the new
certificates.
In this case, you must manually send the partners the public keys of the new
certificates. To do this, follow these steps:
1. Export the public keys as .cert files, or as .p7b files to include the entire
certificate chains.
2. Send the public keys to the partners.
3. Ask the partners to use the new certificates.
The thumbprints of the two certificates don't match
Then, check if there is a token-signing algorithm mismatch. To do this, follow these
steps:
1. Determine the algorithm used by the relying party by running the following
command:
PowerShell
2. Check with the application owner for the algorithm used on the application side.
If the two algorithms match, check if the Name ID format matches what the application
requires.
1. On the AD FS server, dump the issuance transform rules by running the following
command:
PowerShell
2. Locate the rule that issues the NameIdentifier claim. If such a rule doesn't exist,
skip this step.
c:[Type ==
"http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"] =>
issue(Type =
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", Value
= c.Value,
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/for
mat"] = "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified");
Properties["Property-type-URI"] = "ValueURI"
The possible formats are listed below. The first format is the default.
urn:oasis:names:tc:SAML:1.1:nameid-format:unspecifie.
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
urn:oasis:names:tc:SAML:2.0:nameid-format:transient
3. Ask the application owner for the NameIdentifier format required by the
application.
5. If the formats don't match, configure the NameIdentifier claim to use the format
that the application requires. To do this, follow these steps:
a. Open the AD FS management console.
b. Click Relying Party Trusts, select the appropriate federation partner, and then
click Edit Claims Issuance Policy in the Actions pane.
c. Add a new rule if there is no rule to issue the NameIdentifier claim, or update an
existing rule. Select Name ID for Incoming claim type, and then specify the
format that the application requires.
If the two algorithms mismatch, update the signing algorithm used by the relying party
trust.
3. On the Advanced tab, select the algorithm to match what the application requires.
About certificate auto renewal
If the token signing certificate or token decrypting certificate are self-signed,
AutoCertificateRollover is enabled by default on these certificates and AD FS manages
the auto renewal of the certificates when they are close to expiration.
PowerShell
If the Subject and Issuer attributes both start with "CN=ADFS Signing...", the
certificate is self-signed and managed by AutoCertRollover.
PowerShell
Get-ADFSProperties | FL AutoCertificateRollover
Check DNS
Accessing ADFS should point directly to one of the WAP (Web Application Proxy) servers
or the load balancer in front of the WAP servers. Do the following checks:
Ping the federation service name (e.g. fs.contoso.com ). Confirm if the IP address
the Ping resolves to is of one of the WAP servers or of the load balancer of the
WAP servers.
Check if there is an A record for the federation service in the DNS server. The A
record should point to one of the WAP servers or to the load balancer of the WAP
servers.
If WAP is not implemented in your scenario for external access, check if accessing ADFS
points directly to one of the ADFS servers or the load balancer in front of the ADFS
servers:
Ping the federation service name (e.g. fs.contoso.com ). Confirm if the IP address
that you get resolves to one of the ADFS servers or the load balancer of the ADFS
servers.
Check if there is an A record for the federation service in the DNS server. The A
record should point to one of the ADFS servers or to the load balancer of the ADFS
servers.
If you are running Windows Server 2012 R2, ensure that the August 2014 update
rollup is installed.
Check if port 80 is enabled in the firewall on the WAP servers and ADFS servers.
Ensure that probe is set for port 80 and for the endpoint /adfs/probe.
the firewall between the Web Application Proxy server and the federation server
farm.
the firewall between the clients and the Web Application Proxy server.
Check if inbound traffic through TCP port 49443 is enabled on the firewall between the
clients and the Web Application Proxy server when the following conditions are true:
7 Note
The configuration is not required on the firewall between the Web Application
Proxy server and the federation servers.
3. Locate the endpoint and verify if the status is enabled on the Proxy Enabled
column.
7 Note
Background information
The proxy trust relationship is client certificate based. When you run the Web
Application Proxy post-install wizard, the wizard generates a self-signed client certificate
using the credentials that you specified in the wizard. Then the wizard inserts the
certificate into the AD FS configuration database and adds it to the AdfsTrustedDevices
certificate store on the AD FS server.
For any SSL communication, http.sys uses the following priority order for SSL certificate
bindings to match a certificate:
ノ Expand table
Priority Name Parameters Description
AD FS 2012 R2 and later are independent of Internet Information Services (IIS) and runs
as a service on top of http.sys. hostname:port SSL certificate bindings are used by AD FS.
During client certificate authentication, AD FS sends a certificate trust list (CTL) based on
the certificates in the AdfsTrustedDevices store. If an SSL certificate binding for your AD
FS server uses IP:port or the CTL store is not AdfsTrustedDevices, proxy trust relationship
may not be established.
In the list of bindings returned, look for those with the Application ID of 5d89a20c-
beab-4389-9447-324788eb944a. Here is an example of a healthy binding. Note the "Ctl
Store Name" line.
Output
Hostname:port : adfs.contoso.com:443
Certificate Hash : 3638de9b03a488341dfe32fc3ae5c480ee687793
Application ID : {5d89a20c-beab-4389-9447-324788eb944a}
Certificate Store Name : MY
Verify Client Certificate Revocation : Enabled
Verify Revocation Using Cached Client Certificate Only : Disabled
Usage Check : Enabled
Revocation Freshness Time : 0
URL Retrieval Timeout : 0
Ctl Identifier : (null)
Ctl Store Name : AdfsTrustedDevices
DS Mapper Usage : Disabled
Negotiate Client Certificate : Disabled
PowerShell
param
(
[switch]$syncproxytrustcerts
)
function checkhttpsyscertbindings()
{
Write-Host; Write-Host("1 – Checking http.sys certificate bindings for
potential issues")
$httpsslcertoutput = netsh http show sslcert
$adfsservicefqdn = (Get-AdfsProperties).HostName
$i = 1
$certbindingissuedetected = $false
While($i -lt $httpsslcertoutput.count)
{
$ipport = $false
$hostnameport = $false
if ( ( $httpsslcertoutput[$i] -match "IP:port" ) ) { $ipport = $true
}
elseif ( ( $httpsslcertoutput[$i] -match "Hostname:port" ) ) {
$hostnameport = $true }
## Check for IP specific certificate bindings
if ( ( $ipport -eq $true ) )
{
$httpsslcertoutput[$i]
$ipbindingparsed = $httpsslcertoutput[$i].split(":")
if ( ( $ipbindingparsed[2].trim() -ne "0.0.0.0" ) -and (
$ipbindingparsed[3].trim() -eq "443") )
{
$warning = "There is an IP specific binding on IP " +
$ipbindingparsed[2].trim() + " which may conflict with the AD FS port 443
cert binding." | Write-Warning
$certbindingissuedetected = $true
}
$i = $i + 14
continue
}
## check that CTL Store is set for ADFS service binding
elseif ( $hostnameport -eq $true )
{
$httpsslcertoutput[$i]
$ipbindingparsed = $httpsslcertoutput[$i].split(":")
If ( ( $ipbindingparsed[2].trim() -eq $adfsservicefqdn ) -and (
$ipbindingparsed[3].trim() -eq "443") -and (
$httpsslcertoutput[$i+10].split(":")[1].trim() -ne "AdfsTrustedDevices" ) )
{
Write-Warning "ADFS Service binding does not have CTL Store
Name set to AdfsTrustedDevices"
$certbindingissuedetected = $true
}
$i = $i + 14
continue
}
$i++
}
If ( $certbindingissuedetected -eq $false ) { Write-Host "Check Passed: No
certificate binding issues detected" }
}
function checkadfstrusteddevicesstore()
{
## check for CA issued (non-self signed) certs in the AdfsTrustedDevices
cert store
Write-Host; Write-Host "2 – Checking AdfsTrustedDevices cert store for non-
self signed certificates"
$certlist = Get-Childitem cert:\LocalMachine\AdfsTrustedDevices -recurse |
Where-Object {$_.Issuer -ne $_.Subject}
If ( $certlist.count -gt 0 )
{
Write-Warning "The following non-self signed certificates are present in
the AdfsTrustedDevices store and should be removed"
$certlist | Format-List Subject
}
Else { Write-Host "Check Passed: No non-self signed certs present in
AdfsTrustedDevices cert store" }
}
function checkproxytrustcerts
{
Param ([bool]$repair=$false)
Write-Host; Write-Host("3 – Checking AdfsTrustedDevices cert store is in
sync with ADFS Proxy Trust config")
$doc = new-object Xml
$doc.Load("$env:windir\ADFS\Microsoft.IdentityServer.Servicehost.exe.config"
)
$connString =
$doc.configuration.'microsoft.identityServer.service'.policystore.connection
String
$command = "Select ServiceSettingsData from [IdentityServerPolicy].
[ServiceSettings]"
$cli = new-object System.Data.SqlClient.SqlConnection
$cli.ConnectionString = $connString
$cmd = new-object System.Data.SqlClient.SqlCommand
$cmd.CommandText = $command
$cmd.Connection = $cli
$cli.Open()
$configString = $cmd.ExecuteScalar()
$configXml = new-object XML
$configXml.LoadXml($configString)
$rawCerts =
$configXml.ServiceSettingsData.SecurityTokenService.ProxyTrustConfiguration.
_subjectNameIndex.KeyValueOfstringArrayOfX509Certificate29zVOn6VQ.Value.X509
Certificate2
#$ctl = dir cert:\LocalMachine\ADFSTrustedDevices
$store = new-object
System.Security.Cryptography.X509Certificates.X509Store("ADFSTrustedDevices"
,"LocalMachine")
$store.open("MaxAllowed")
$atLeastOneMismatch = $false
$badCerts = @()
foreach($rawCert in $rawCerts)
{
$rawCertBytes =
[System.Convert]::FromBase64String($rawCert.RawData.'#text')
$cert=New-Object
System.Security.Cryptography.X509Certificates.X509Certificate2(,$rawCertByte
s)
$now = Get-Date
if ( ($cert.NotBefore -lt $now) -and ($cert.NotAfter -gt $now))
{
$certThumbprint = $cert.Thumbprint
$certSubject = $cert.Subject
$ctlMatch = dir
cert:\localmachine\ADFSTrustedDevices\$certThumbprint -ErrorAction
SilentlyContinue
if ($ctlMatch -eq $null)
{
$atLeastOneMismatch = $true
Write-Warning "This cert is NOT in the CTL: $certThumbprint –
$certSubject"
if ($repair -eq $true)
{
write-Warning "Attempting to repair"
$store.Add($cert)
Write-Warning "Repair successful"
}
else
{
Write-Warning ("Please install KB.2964735 or re-run
script with -syncproxytrustcerts switch to add missing Proxy Trust certs to
AdfsTrustedDevices cert store")
}
}
}
}
$store.Close()
if ($atLeastOneMismatch -eq $false)
{
Write-Host("Check Passed: No mismatched certs found. CTL is in sync
with DB content")
}
}
checkhttpsyscertbindings
checkadfstrusteddevicesstore
checkproxytrustcerts($syncproxytrustcerts)
Write-Host; Write-Host("All checks completed.")
The IP:port binding takes the highest precedence. If an IP:port binding is in the AD FS
SSL certificate bindings, http.sys always uses the certificate for the binding for SSL
communication. To solve this problem, use the following methods.
Be aware that the IP:port binding may come back after you removed it. For
example, an application configured with this IP:port binding may automatically
recreate it on the next service start-up.
If the IP:port binding is required, resolve the ADFS service FQDN to another IP
address that is not used in any bindings. That way, http.sys will use the
Hostname:port binding for SSL communication.
This is the last resort if you can't use the methods above. But it is better to
understand the following conditions before you change the default CTL store to
AdfsTrustedDevices:
PowerShell
Therefore, delete any CA issued certificate from the AdfsTrustedDevices certificate store.
Method 1
Install the update documented in KB 2964735 on all AD FS servers. After the update is
installed, a sync of the client certificate is expected to happen automatically.
Method 2
Run the script with the – syncproxytrustcerts switch to manually sync the client
certificates from the AD FS configuration database to the AdfsTrustedDevices certificate
store. The script should be run on all the AD FS servers in the farm.
7 Note
This is not a permanent solution because the client certificates will be renewed on a
regular basis.
Check if there is SSL termination between the AD FS server and the WAP server
Disable SSL termination on the network device between the AD FS and WAP servers.
1. Get the information of the relying party for the application you want to access. If
OAuth authentication is implemented, get the OAuth client information as well.
2. Set up the Dump Token app.
PowerShell
Add-PSSnapin Microsoft.Adfs.PowerShell
PowerShell
PowerShell
If you use the Application Group feature in Windows Server 2016, follow the steps
below:
PowerShell
3. If the OAuth client is public, get the client information by running the following
command:
PowerShell
If the OAuth client is confidential, get the client information by running the
following command:
PowerShell
PowerShell
$authzRules = "=>issue(Type =
`"http://schemas.microsoft.com/authorization/claims/permit`", Value =
`"true`");"
$issuanceRules = "x:[]=>issue(claim=x);"
$redirectUrl = "https://dumptoken.azurewebsites.net/default.aspx"
$samlEndpoint = New-AdfsSamlEndpoint -Binding POST -Protocol
SAMLAssertionConsumer -Uri $redirectUrl
Add-ADFSRelyingPartyTrust -Name "urn:dumptoken" -Identifier "urn:dumptoken"
-IssuanceAuthorizationRules $authzRules -IssuanceTransformRules
$issuanceRules -WSFedEndpoint $redirectUrl -SamlEndpoint $samlEndpoint
Now continue with the following troubleshooting methods. At the end of each method,
see if the problem is solved. If not, use another method.
Troubleshooting methods
In Windows Server 2016 and later versions, you can use $rp. AccessControlPolicyName
to configure authentication and authorization policy. If $rp. AccessControlPolicyName
has value, an access control policy is in place which governs the authorization policy. In
that case, $rp.IssuanceAuthorizationRules is empty. Use $rp.ResultantPolicy to find out
details about the access control policy.
If $rp.ResultantPolicy doesn't have the details about the policy, look into the actual claim
rules. To get the claim rules, follow these steps:
1. Set the access control policy to $null by running the following command:
Set-AdfsRelyingPartyTrust -TargetRelyingParty $rp -AccessControlPolicyName
$null
1. Set the Dump Token authentication policy to be the same as the failing relying
party.
2. Have the user open one of the following links depending on the authentication
policy you set.
WS-Fed: https://FederationInstance/adfs/ls?
wa=wsignin1.0&wtrealm=urn:dumptoken
SAML-P: https://FederationInstance/adfs/ls/IdpInitiatedSignOn?
LoginToRP=urn:dumptoken
What you get is the set of claims of the user. See if there is anything in the authorization
policy that explicitly denies or allows the user based on these claims.
2. Configure the Dump Token authentication policy to be the same as the failing
relying party.
3. Have the user open one of the following links depending on the authentication
policy you set.
WS-Fed: https://FederationInstance/adfs/ls?
wa=wsignin1.0&wtrealm=urn:dumptoken
SAML-P: https://FederationInstance/adfs/ls/IdpInitiatedSignOn?
LoginToRP=urn:dumptoken
This is the set of claims the relying party is going to get for the user. If any claims are
missing or unexpected, look at the issuance policy to find out the reason.
If all the claims are present, check with the application owner to see which claim is
missing or unexpected.
If the authorization rules check for device claims, verify if any of these device claims are
missing in the list of claims you get from the Dump Token app. The missing claims could
block device authentication. To get the claims from the Dump Token app, follow the
steps in the Use the Dump Token app to diagnose the authorization policy section in
the Check authorization policy if the user was impacted method.
The following are the device claims. The authorization rules may use some of them.
http://schemas.microsoft.com/2012/01/devicecontext/claims/registrationid
http://schemas.microsoft.com/2012/01/devicecontext/claims/displayname
http://schemas.microsoft.com/2012/01/devicecontext/claims/identifier
http://schemas.microsoft.com/2012/01/devicecontext/claims/ostype
http://schemas.microsoft.com/2012/01/devicecontext/claims/osversion
http://schemas.microsoft.com/2012/01/devicecontext/claims/ismanaged
http://schemas.microsoft.com/2012/01/devicecontext/claims/isregistereduser
http://schemas.microsoft.com/2014/02/devicecontext/claims/isknown
http://schemas.microsoft.com/2014/02/deviceusagetime
http://schemas.microsoft.com/2014/09/devicecontext/claims/iscompliant
http://schemas.microsoft.com/2014/09/devicecontext/claims/trusttype
If there is a missing claim, follow the steps in Configure On-Premises Conditional Access
using registered devices to make sure the environment is setup for device
authentication.
If all the claims are present, see if the values of the claims from the Dump Token app
match the values required in the authorization policy.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where users can't sign in to the domain after
password changes on a Remote Domain Controller.
Symptoms
After you change a user account password on a remote domain controller that holds the
primary domain controller (PDC) Flexible Single Master Operation (FSMO) role, the user
may not be able to sign in to a local domain controller by entering the new password.
However, the user may still be able to sign in to the domain by using their previous
password.
Cause
This behavior may occur when the following conditions are true:
The remote domain controller hasn‘t yet replicated with the local domain
controller.
Kerberos is configured to use User Datagram Protocol (UDP) protocol (the default
configuration).
The user's security token is too large to fit in a UDP Kerberos message.
7 Note
The user's security token may be large if that user is a member of many
groups.
This problem is caused by the anti-replay feature of Kerberos authentication on the local
domain controller. The following steps illustrate this behavior:
1. The user account password is changed on the remote domain controller, but that
change hasn’t yet been replicated to the local domain controller.
2. The user tries to sign in to the domain by using the new password. The Kerberos
Authentication Service Exchange message (KRB_AS_REQ) is sent to the local
domain controller by using UDP.
3. The local domain controller fails the authentication because it doesn't yet have the
new password information.
4. The local domain controller forwards the request to the remote PDC
( KDCSVC!FailedLogon ).
5. In the FailedLogon function, an entry for the request is entered into the replay-
detection table, and the KRB_AS_REQ message is sent to the remote PDC.
6. The remote PDC successfully authenticates the request, and then returns a positive
reply to the local domain controller.
7. The local domain controller detects that the reply is too large for a UDP packet,
and that's why sends a request to the client computer to resend the request by
using Transmission Control Protocol (TCP).
8. The client computer resubmits the authentication request by using TCP.
9. The local domain controller fails the authentication because it doesn't yet have the
new password information (as in step 3).
10. The local domain controller forwards the request to the remote PDC domain
controller ( KDCSVC!FailedLogon ) (as in step 4).
11. The replay detection check in the FailedLogon function returns a
KRB_AP_ERR_REPEAT message because an entry for this request is already present
in the replay detection table. This is the entry that was created in step 5.
Resolution
To resolve this problem, obtain the latest service pack for Windows 2000.
The English version of this fix has the file attributes (or later) that are listed in the
following table. The dates and times for these files are listed in coordinated universal
time (UTC). When you view the file information, it's converted to local time. To find the
difference between UTC and local time, use the Time Zone tab in the Date and Time tool
in Control Panel.
Console
Workaround
To work around this issue, do user account password changes on the local domain
controller or force Kerberos to use TCP (Transmission Control Protocol) instead of UDP
(User Datagram Protocol).
For more information, see How to force Kerberos to use TCP instead of UDP in
Windows .
Status
Microsoft has confirmed that it's a problem in the Microsoft products that are listed at
the beginning of this article. This problem was first corrected in Windows 2000 Service
Pack 3.
More information
The Kerberos anti-replay feature prevents the same packet from being received two
times by the authenticating server. A replay attack is an attack in which a valid data
transmission is maliciously or fraudulently repeated, either by the originator or by an
adversary who intercepts the data and retransmits it. An attacker may attempt to
"replay" a valid user's user name and password in an attempt to authenticate by using
that user's credentials.
Feedback
Was this page helpful? Yes No
This article provides help to fix an error that occurs when you seize the relative ID (RID)
Master role with the Ntdsutil tool to a different domain controller.
Symptoms
Assume the following scenario. The server that holds the RID operations master role is
no longer accessible and must be rebuilt. You attempt to seize the RID Master role with
the Ntdsutil tool to a different domain controller but you receive the following error:
Cause
The fSMORoleOwner attribute of the RID Manager$ object in Active Directory is invalid.
For example, the following value would result in this error:
Resolution
To resolve this issue, use the AdsiEdit tool to update the fSMORoleOwner attribute of
the Rid Manager$ object in Active Directory.
3. With CN=System selected in the left pane, right-click CN=RID Manager$ and
select Properties.
4. The fSMORoleOwner attribute should correspond to the old RID Master. For
example, if DC01 was the old RID Master (the server that is no longer available),
the fSMORoleOwner attribute would be:
CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=contoso,DC=com
An example of an invalid value for the fSMORoleOwner attribute that may result in
an error when attempting to seize the role would be:
5. Change the fSMORoleOwner attribute value to reflect the domain controller that
you want to be the RID Master. For example if DC01 is the failed domain controller,
and DC02 is the domain controller to which you want to seize the RID Master role,
you would change the attribute to reflect that DC02 will be the new RID Master.
CN=NTDS Settings,CN=DC02,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=contoso,DC=com
Feedback
Was this page helpful? Yes No
This article describes how to find the servers that hold the Flexible Single Master
Operation (FSMO) roles in a forest.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 234790
Summary
Active Directory defines five FSMO roles:
Schema master
Domain naming master
RID master
PDC master
Infrastructure master
The schema master and the domain naming master are per-forest roles. Therefore, there
is only one schema master and one domain naming master per forest.
The RID master, the PDC master, and the infrastructure master are per-domain roles.
Each domain has its own RID master, PDC master, and infrastructure master. Therefore,
if a forest has three domains, there are three RID masters, three PDC masters, and three
infrastructures masters.
7 Note
For the Active Directory Schema snap-in to be available, you may have to register
the Schmmgmt.dll file. To do this, click Start , click Run , type regsvr32
schmmgmt.dll in the Open box, and then click OK . A message is displayed that
states the registration was successful.
Console
@echo off
REM
REM Script to dump FSMO role owners on the server designated by %1
REM
goto done
:usage
@echo Please provide the name of a domain controller (i.e. dumpfsmos MYDC)
@echo.
:done
Ntdsutil.exe is the only tool that shows you all the FSMO role owners. You can view the
PDC emulator, RID master, and infrastructure master role owners in Active Directory
Users and Computers. You can view the schema master role owner in the Active
Directory Schema snap-in. You can view the domain naming master role owner in Active
Directory Domains and Trusts.
1. Click Start, click Run, type cmd in the Open box, and then press ENTER.
8. Type list roles for connected server, and then press ENTER. A list is displayed
similar to what is listed below. Results may very depending on the roles the
particular Domain Controller may hold. If you receive an error message, check the
spelling of the commands as the syntax of the commands must be exact. If you
need the syntax of a command, type? at each prompt:
Console
Use DCDIAG
On a Windows 2000 Domain Controller, run the following command:
Console
DCdiag /test:Knowsofroleholders /v
You must use the /v switch. This lists the owners of all FSMO roles in the enterprise.
References
For additional information, click the article numbers below to view the articles:
Feedback
Was this page helpful? Yes No
This article mainly helps you to learn about the Flexible Single Master Operation (FSMO)
roles in Active Directory.
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019,
Windows Server 2022
Original KB number: 197132
Summary
Active Directory is the central repository in which all objects in an enterprise and their
respective attributes are stored. It's a hierarchical, multi-master enabled database that
can store millions of objects. Changes to the database can be processed at any given
domain controller (DC) in the enterprise, regardless of whether the DC is connected or
disconnected from the network.
Multi-master model
A multi-master enabled database, such as the Active Directory, provides the flexibility of
allowing changes to occur at any DC in the enterprise. But it also introduces the
possibility of conflicts that can potentially lead to problems once the data is replicated
to the rest of the enterprise. One way Windows deals with conflicting updates is by
having a conflict resolution algorithm handle discrepancies in values. It's done by
resolving to the DC to which changes were written last, which is the last writer wins. The
changes in all other DCs are discarded. Although this method may be acceptable in
some cases, there are times when conflicts are too difficult to resolve using the last
writer wins approach. In such cases, it's best to prevent the conflict from occurring
rather than to try to resolve it after the fact.
Single-master model
To prevent conflicting updates in Windows, the Active Directory performs updates to
certain objects in a single-master fashion. In a single-master model, only one DC in the
entire directory is allowed to process updates. It's similar to the role given to a primary
domain controller (PDC) in earlier versions of Windows, such as Microsoft Windows NT
3.51 and 4.0. In earlier versions of Windows, the PDC is responsible for processing all
updates in a given domain.
Active Directory extends the single-master model found in earlier versions of Windows
to include multiple roles, and the ability to transfer roles to any DC in the enterprise.
Because an Active Directory role isn't bound to a single DC, it's referred to as an FSMO
role. Currently in Windows there are five FSMO roles:
Schema master
Domain naming master
RID master
PDC emulator
Infrastructure master
Typically, an FSMO role ownership is executed only when the domain controller has
replicated the naming context (NC) where the ownership is stored since the Directory
Service started. Make sure that an FSMO role seizure reaches the previous owner before
the role is used.
This FSMO role holder is only active when the role owner has inbound replicated
the configuration NC successfully since the Directory Service started.
Domain members of the forest only contact the FSMO role holder when they
update the cross-references. DCs contact the FSMO role holder when:
Domains are added or removed in the forest.
New instances of application directory partitions on DCs are added. For
example, a DNS server has been enlisted for the default DNS application
directory partitions.
A domain SID that's the same for all SIDs created in a domain.
A relative ID (RID) that's unique for each security principal SID created in a domain.
Each Windows DC in a domain is allocated a pool of RIDs that it's allowed to assign to
the security principals it creates. When a DC's allocated RID pool falls below a threshold,
that DC issues a request for additional RIDs to the domain's RID master. The domain RID
master responds to the request by retrieving RIDs from the domain's unallocated RID
pool, and assigns them to the pool of the requesting DC. There's one RID master per
domain in a directory.
This FSMO role holder is active only when the role owner has inbound replicated
the domain NC successfully since the Directory Service started.
DCs contact the FSMO role holder when they retrieve a new RID pool. The new RID
pool is delivered to DCs through AD replication.
PDC emulator FSMO role
The PDC emulator is necessary to synchronize time in an enterprise. Windows includes
the W32Time (Windows Time) time service that is required by the Kerberos
authentication protocol. All Windows-based computers within an enterprise use a
common time. The purpose of the time service is to ensure that the Windows Time
service uses a hierarchical relationship that controls authority. It doesn't permit loops to
ensure appropriate common time usage.
The PDC emulator of a domain is authoritative for the domain. The PDC emulator at the
root of the forest becomes authoritative for the enterprise, and should be configured to
gather the time from an external source. All PDC FSMO role holders follow the hierarchy
of domains in the selection of their in-bound time partner.
In a Windows domain, the PDC emulator role holder retains the following functions:
Password changes done by other DCs in the domain are replicated preferentially to
the PDC emulator.
When authentication failures occur at a given DC because of an incorrect
password, the failures are forwarded to the PDC emulator before a bad password
failure message is reported to the user.
Account lockout is processed on the PDC emulator.
The PDC emulator performs all of the functionality that a Windows NT 4.0 Server-
based PDC or earlier PDC performs for Windows NT 4.0-based or earlier clients.
This part of the PDC emulator role becomes unnecessary under the following situation:
All workstations, member servers, and domain controllers (DCs) that are running
Windows NT 4.0 or earlier are all upgraded to Windows 2000.
The PDC emulator still does the other functions as described in a Windows 2000
environment.
The following information describes the changes that occur during the upgrade process:
Windows clients (workstations and member servers) and down-level clients that
have installed the distributed services client package don't perform directory writes
(such as password changes) preferentially at the DC that has advertised itself as the
PDC. They use any DC for the domain.
Once backup domain controllers (BDCs) in down-level domains are upgraded to
Windows 2000, the PDC emulator receives no down-level replica requests.
Windows clients (workstations and member servers) and down-level clients that
have installed the distributed services client package use the Active Directory to
locate network resources. They don't require the Windows NT Browser service.
Initial replication and connectivity requirements
This FSMO role holder is always active when the PDC emulator finds the
fSMORoleOwner attribute of the domain NC head points to itself. There is no
inbound replication requirement.
DCs contact the FSMO role holder when they have a new password, or the local
password verification fails. No error occurs when the PDC emulator can't be
reached or the AvoidPdcOnWan registry value is set to 1.
You can use the following cmdlet to run the prerequisites for demoting a DC.
PowerShell
PS C:\Users\Capecodadmin> Test-ADDSDomainControllerUninstallation -
DemoteOperationMasterRole |fl
The GUID
The SID (for references to security principals)
The DN of the object being referenced
The infrastructure FSMO role holder is the DC responsible for updating an object's SID
and distinguished name in a cross-domain object reference.
7 Note
The Infrastructure Master (IM) role should be held by a DC that is not a Global
Catalog server(GC). If the Infrastructure Master runs on a Global Catalog server it
will stop updating object information because it does not contain any references to
objects that it does not hold. This is because a Global Catalog server holds a partial
replica of every object in the forest. As a result, cross-domain object references in
that domain will not be updated and a warning to that effect will be logged on that
DC's event log.
If all the DCs in a domain also host the global catalog, all the DCs have the current data.
It isn't important which DC holds the infrastructure master role.
When the Recycle Bin optional feature is enabled, every DC is responsible to update its
cross-domain object references when the referenced object is moved, renamed, or
deleted. In this case, there are no tasks associated with the Infrastructure FSMO role.
And it isn't important which domain controller owns the Infrastructure Master role. For
more information, see 6.1.5.5 Infrastructure FSMO Role.
This FSMO role holder is active only when the role owner has inbound replicated
the domain NC successfully since the Directory Service started.
There is no connectivity requirement for this FSMO role holder. It is a forest
internal cleanup functionality.
Feedback
Was this page helpful? Yes No
This article describes when and how to transfer or seize Operation Master roles, formerly
known as Flexible Single Master Operations (FSMO) roles.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 2012
Original KB number: 255504
More information
Within an Active Directory Domain Services (AD DS) forest, there are specific tasks that
must be performed by only one domain controller (DC). The DCs that are assigned to
perform these unique operations are known as Operation Master role holders. The
following table lists the Operation Master roles, and their placement in Active Directory.
ノ Expand table
For more information about the Operation Master role holders and recommendations
for placing the roles, see FSMO placement and optimization on Active Directory domain
controllers.
7 Note
Active Directory Application partitions that include DNS application partitions have
Operation Master role links. If a DNS application partition defines an owner for the
infrastructure master (IM) role, you can't use Ntdsutil, DCPromo, or other tools to
remove that application partition. For more information, see DCPROMO demotion
fails if unable to contact the DNS infrastructure master.
When a DC that has been acting as a role holder starts to run (for example, after a
failure or a shutdown), it doesn't immediately resume behaving as the role holder. The
DC waits until it receives inbound replication for its naming context (for example, the
Schema master role owner waits to receive inbound replication of the Schema partition).
The information that the DCs pass as part of Active Directory replication includes the
identities of the current Operation Master role holders. When the newly started DC
receives the inbound replication information, it verifies whether it's still the role holder. If
it is, it resumes typical operations. If the replicated information indicates that another
DC is acting as the role holder, the newly started DC relinquishes its role ownership. This
behavior reduces the chance that the domain or forest will have duplicate Operation
Master role holders.
) Important
AD FS operations fail if they require a role holder and if the newly started role
holder is, in fact, the role holder and it doesn't receive inbound replication.
The resulting behavior resembles what would happen if the role holder was offline.
DCs continue to own Operation Master roles until they're reassigned by using one of
the following methods:
The DC shuts down and restarts. When the DC restarts, it receives inbound
replication information that indicates that another DC is the role holder. In this
case, the newly started DC relinquishes the role (as described previously).
We recommend that you transfer Operation Master roles in the following scenarios:
The current role holder is operational and can be accessed on the network by the
new Operation Master owner.
You're gracefully demoting a DC that currently owns Operation Master roles that
you want to assign to a specific DC in your Active Directory forest.
The DC that currently owns Operation Master roles is being taken offline for
scheduled maintenance, and you have to assign specific Operation Master roles to
live DCs. You may have to transfer roles to perform operations that affect the
Operation Master owner. This is especially true for the PDC Emulator role. This is a
less important issue for the RID master role, the Domain naming master role, and
the Schema master roles.
We recommend that you seize Operation Master roles in the following scenarios:
role.
) Important
The operating system on the computer that originally owned a specific role no
longer exists or has been reinstalled.
7 Note
We recommend that you only seize all roles when the previous role holder
isn't returning to the domain.
If Operation Master roles have to be seized in forest recovery scenarios, see
step 5 in Perform initial recovery under the Restore the first writeable
domain controller in each domain section.
After a role transfer or seizure, the new role holder doesn't act immediately.
Instead, the new role holder behaves like a restarted role holder and waits for
its copy of the naming context for the role (such as the domain partition) to
complete a successful inbound replication cycle. This replication requirement
helps make sure that the new role holder is as up to date as possible before it
takes action. It also limits the window of opportunity for errors. This window
includes only changes that the previous role holder did not finish replicating
to the other DCs before it went offline. For a list of the naming context for
each Operation Master role, see the table at the More information section.
For example, assume that you have to transfer the Schema master role. The Schema
master role is part of the schema partition of the forest
(CN=Schema,CN=Configuration,DC=<forest root domain>). The best candidate for a
new role holder is a DC that also resides in the forest root domain, and in the same
Active Directory site as the current role holder.
U Caution
The infrastructure master role isn't needed anymore if the following conditions are
true:
All domain controllers in the domain are Global Catalogs (GCs). In this case,
the GCs get updates that remove cross-domain references.
The AD Recycle Bin is enabled in the forest. In this case, each DC is
responsible for updating its references.
The infrastructure master role isn't used anymore once you enable Active Directory
Recycle Bin. AD Recycle Bin changes the approach to handling object referrals that
are being removed.
1. Select Start > Programs > Administrative Tools > Active Directory Sites and
Services.
2. In the navigation pane, double-click Sites and then locate the appropriate site
or select Default-first-site-name if no other sites are available.
3. Open the Servers folder, and then select the DC.
4. In the DC's folder, double-click NTDS Settings.
5. On the Action menu, select Properties.
6. On the General tab, view the Global Catalog check box to see whether it's
selected.
1. Start PowerShell.
2. Type the following cmdlet, and adjust DC_NAME with your actual DC name:
PowerShell
) Important
To avoid the risk of duplicate SIDs in the domain, Rid Master seizures increment the
next available RID in the pool when you seize the RID master role. This behavior can
cause your forest to consume available ranges of RID values significantly (also
known as RID burn). So seize the Rid Master only when you're sure that the current
Rid Master can't be brought back into service.
If you have to seize the RID master role, consider the following details:
To seize or transfer the Operation Master roles by using the Ntdsutil utility, follow these
steps:
1. Sign in to a member computer that has the AD RSAT tools installed, or a DC that is
located in the forest where Operation Master roles are being transferred.
7 Note
2. Select Start > Run, type ntdsutil in the Open box, and then select OK.
7 Note
To see a list of available commands at any one of the prompts in the Ntdsutil
utility, type ?, and then press Enter.
7 Note
To transfer the role: Type transfer <role>, and then press Enter.
7 Note
To seize the role: Type seize <role>, and then press Enter.
7 Note
For example, to seize the RID master role, type seize rid master. Exceptions are for
the PDC emulator role, whose syntax is seize pdc, and the Domain naming master,
whose syntax is seize naming master.
To see a list of roles that you can transfer or seize, type ? at the fsmo maintenance
prompt, and then press Enter, or see the list of roles at the start of this article.
8. At the fsmo maintenance prompt, type q, and then press Enter to gain access to
the ntdsutil prompt. Type q, and then press Enter to quit the Ntdsutil utility.
) Important
If you plan to use the repaired computer as a DC, we recommend that you rebuild
the computer into a DC from scratch instead of restoring the DC from a backup.
The restoration process rebuilds the DC as a role holder again.
2. On another DC in the forest, use Ntdsutil to remove the metadata for the
former role holder. For more information, see To clean up server metadata by
using Ntdsutil.
3. After you clean up the metadata, you can repromote the computer to a DC,
and transfer a role back to it.
To remove the computer from the forest after seizing its roles:
) Important
In most cases, you can take advantage of the initial replication requirement (as
described in this article) to weed out duplicate role holders. A restarted role holder
should relinquish the role if it detects a duplicate role-holder.
You may encounter circumstances that this behavior does not resolve. In such
cases, the information in this section may be helpful.
The following table identifies the Operation Master roles that can cause problems if a
forest or domain has multiple role-holders for that role:
ノ Expand table
PDC emulator No
Infrastructure master No
This issue doesn't affect the PDC Emulator master or the infrastructure master. These
role holders don't persist operational data. Additionally, the Infrastructure master
doesn't make changes often. Therefore, if multiple islands have these role holders, you
can reintegrate the islands without causing long-term issues.
The Schema master, the Domain naming master, and the RID master can create objects
and persist changes in Active Directory. Each island that has one of these role holders
could have duplicate and conflicting schema objects, domains, or RID pools by the time
that you restore replication. Before you reintegrate islands, determine which role holders
to keep. Remove any duplicate Schema masters, Domain Naming masters, and RID
masters by following the repair, removal, and cleanup procedures that are mentioned in
this article.
References
For more information, see:
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 2012
Original KB number: 324801
Summary
This article describes how to transfer Flexible Single Master Operations (FSMO) roles
(also known as operations master roles) by using the Active Directory snap-in tools in
Microsoft Management Console (MMC).
FSMO Roles
In a forest, there are at least five FSMO roles that are assigned to one or more domain
controllers. The five FSMO roles are:
Schema Master: The schema master domain controller controls all updates and
modifications to the schema. To update the schema of a forest, you must have
access to the schema master. There can be only one schema master in the whole
forest.
Domain naming master: The domain naming master domain controller controls
the addition or removal of domains in the forest. There can be only one domain
naming master in the whole forest.
Infrastructure Master: The infrastructure is responsible for updating references
from objects in its domain to objects in other domains. At any one time, there can
be only one domain controller acting as the infrastructure master in each domain.
7 Note
The Infrastructure Master (IM) role isn't often needed anymore, as it has no
work to do if the environment uses the recommended configuration. Refer to
the articles linked below for details. To summarize, the scenarios are:
All domain controllers in the domain are Global Catalogs.
The forest is configured to use the Recycle Bin.
The IM role should still always be set to a valid domain controller to avoid
errors being reported in monitoring systems.
Relative ID (RID) Master: The RID master is responsible for processing RID pool
requests from all domain controllers in a particular domain. At any one time, there
can be only one domain controller acting as the RID master in the domain.
PDC Emulator: The PDC emulator is a domain controller that advertises itself as the
primary domain controller (PDC) to workstations, member servers, and domain
controllers that are running earlier versions of Windows. For example, if the
domain contains computers that are not running Microsoft Windows XP
Professional or Microsoft Windows 2000 client software, or if it contains Microsoft
Windows NT backup domain controllers, the PDC emulator master acts as a
Windows NT PDC. It is also the Domain Master Browser, and it handles password
discrepancies. At any one time, there can be only one domain controller acting as
the PDC emulator master in each domain in the forest.
You can transfer FSMO roles by using the Ntdsutil.exe command-line utility or by using
an MMC snap-in tool. Depending on the FSMO role that you want to transfer, you can
use one of the following three MMC snap-in tools:
Active Directory Schema snap-in
Active Directory Domains and Trusts snap-in
Active Directory Users and Computers snap-in
If a computer no longer exists, the role must be seized. To seize a role, use the
Ntdsutil.exe utility.
For additional information about how to use the Ntdsutil.exe utility to seize FSMO roles,
click the article number below to view the article in the Microsoft Knowledge Base:
Use the Active Directory Schema Master snap-in to transfer the schema master role.
Before you can use this snap-in, you must register the Schmmgmt.dll file.
Register Schmmgmt.dll
1. Click Start, and then click Run.
2. Type regsvr32 schmmgmt.dll in the Open box, and then click OK.
3. Click OK when you receive the message that the operation succeeded.
2. Right-click Active Directory Domains and Trusts, and then click Connect to
Domain Controller.
7 Note
You must perform this step if you are not on the domain controller to which
you want to transfer the role. You do not have to perform this step if you are
already connected to the domain controller whose role you want to transfer.
In the Enter the name of another domain controller box, type the name of
the domain controller that will be the new role holder, and then click OK.
-or-
In the Or, select an available domain controller list, click the domain
controller that will be the new role holder, and then click OK.
4. In the console tree, right-click Active Directory Domains and Trusts, and then click
Operations Master.
5. Click Change.
6. Click OK to confirm that you want to transfer the role, and then click Close.
Transfer the RID Master, PDC Emulator, and Infrastructure
Master Roles
1. Click Start, point to Administrative Tools, and then click Active Directory Users and
Computers.
2. Right-click Active Directory Users and Computers, and then click Connect to
Domain Controller.
7 Note
You must perform this step if you are not on the domain controller to which
you want to transfer the role. You do not have to perform this step if you are
already connected to the domain controller whose role you want to transfer.
In the Enter the name of another domain controller box, type the name of
the domain controller that will be the new role holder, and then click OK.
-or-
In the Or, select an available domain controller list, click the domain
controller that will be the new role holder, and then click OK.
4. In the console tree, right-click Active Directory Users and Computers, point to All
Tasks, and then click Operations Master.
5. Click the appropriate tab for the role that you want to transfer (RID, PDC, or
Infrastructure), and then click Change.
6. Click OK to confirm that you want to transfer the role, and then click Close.
References
For more information, see:
Feedback
Was this page helpful? Yes No
This article describes a registry value that administrators can use to control when the
primary domain controller (PDC) is contacted, which can help reduce communication
costs between sites and reduce the load on the PDC.
) Important
This article contains information about modifying the registry. Before you modify
the registry, make sure to back it up and make sure that you understand how to
restore the registry if a problem occurs. For information about how to back up,
restore, and edit the registry, see Windows registry information for advanced
users.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 2012
Original KB number: 225511
Summary
By default, when a user password is reset or changed, or when a domain controller
receives a client authentication request using an incorrect password, the Windows
domain controller acting as the PDC Flexible Single Master Operation (FSMO) role
owner for the Windows domain is contacted. This article describes a registry value that
administrators can use to control when the PDC is contacted, which can help reduce
communication costs between sites and reduce the load on the PDC.
This communication to the PDC isn't done for computer accounts. Computers will retry
the authentication with the most recent previous password when the authentication
fails. Along the same line, the computers would try the most recent previous password
when decrypting a Kerberos service ticket they receive.
More information
2 Warning
If you use Registry Editor incorrectly, you may cause serious problems that may
require you to reinstall your operating system. Microsoft cannot guarantee that you
can solve problems that result from using Registry Editor incorrectly. Use Registry
Editor at your own risk.
The following registry value can be modified to control Password Change Notification
and Password Conflict Resolution as described below:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
If the AvoidPdcOnWan value is set to TRUE and the PDC FSMO is located at another site,
the password change isn't sent immediately to the PDC. However, it's updated with the
change through normal Active Directory replication. If the PDC FSMO is at the same site,
the AvoidPdcOnWan value isn't used, and the password change is immediately
communicated to the PDC.
An updated password may not be sent to the PDC emulator even if AvoidPdcOnWan is
FALSE or not set, if there are problems sending the request to the PDC, for example a
Network outage. There's no error logged in this case. The update is then distributed
using normal AD replication.
Password conflict resolution
By default, Windows domain controllers query the PDC FSMO role owner if a user is
attempting to authenticate using a password that is incorrect according to its local
database. If the password sent from the client by the user is correct on the PDC, the
client is allowed access, and the domain controller replicates the password change.
If the AvoidPdcOnWan value is set to TRUE and the PDC FSMO role owner is located at
another site, the domain controller doesn't try to authenticate a client against password
information stored on the PDC FSMO. Note, however, that this results in denying access
to the user. This may cause a productivity impact, as many users aren't going to try the
previous password to authenticate. In some scenarios, they may not know the previous
password.
An incorrect password may not be tried at the PDC emulator even if AvoidPdcOnWan is
FALSE or not set, if there are problems sending the request to the PDC, for example a
Network outage. There's no error logged in this case. The logon attempt is denied in
this case.
If these two changes arrive at a DC, the normal AD conflict resolution is performed. The
AD version of attributes will be the same, but the time-stamp of the PDC will be a bit
older, and the password of the initial DC will be used.
It makes no difference as the data payload is identical because both DCs have written
the same new password value.
Logging in the Directory Services event log
Windows Server 2022 has added events to track the activity of interactions with the PDC
emulator regarding password update notifications.
Event ID 3035
Event ID 3035 is logged on the PDC at logging level four of the category "27 PDC
Password Update Notifications" in the following registry entry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics
Output
Event ID 3036
Event ID 3036 is logged if there's an error when updating the PDC with the updates in a
call from a Backup Domain Controller (BDC):
Output
Event ID 3037
Event ID 3037 is logged on the BDC at logging level four of the category "27 PDC
Password Update Notifications" in the following registry entry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics
Output
Event ID 3038
Event ID 3038 is logged if there's an error when updating the PDC with the updates in a
call from a BDC:
Output
You may also see network or RPC related errors in Event ID 3038. For example, when a
firewall blocks the communication between the BDC and PDC, you may receive this
event.
References
How to configure Active Directory and LDS diagnostic event logging
Feedback
Was this page helpful? Yes No
This article describes how Flexible Single Master Operations (FSMO) roles are transferred
from one domain controller to another and how this role can be forcefully appointed in
the event that the domain controller that previously held the role is no longer available.
Operational attributes are attributes that translate into an action on the server. This type
of attribute isn't defined in the schema, but is instead maintained by the server and
intercepted when a client attempts to read or write to it. When the attribute is read,
generally the result is a calculated result from the server. When the attribute is written, a
pre-defined action occurs on the domain controller.
The following operational attributes are used to transfer FSMO roles and are located on
the RootDSE (or Root DSA Specific Entry--the root of the Active Directory tree for a
given domain controller where specific information about the domain controller is kept).
In the operation of writing to the appropriate operational attribute on the domain
controller to receive the FSMO role, the old domain controller is demoted and the new
domain controller is promoted automatically. No manual intervention is required. The
operational attributes that represent the FSMO roles are:
becomeRidMaster
becomeSchemaMaster
becomeDomainMaster
becomePDC
becomeInfrastructureMaster
If the administrator specifies the server to receive the FSMO role using a tool such as
Ntdsutil, the exchange of the FSMO role is defined between the current owner and the
domain controller specified by the administrator.
In all transfers, if the role is a domain-specific role, the role can be moved only to
another domain controller in the same domain. Otherwise, any domain controller in the
enterprise is a candidate.
When the administrator seizes an FSMO role from an existing computer, the
"fsmoRoleOwner" attribute is modified on the object that represents the root of the
data directly bypassing synchronization of the data and graceful transfer of the role. The
"fsmoRoleOwner" attribute of each of the following objects is written with the
Distinguished Name (DN) of the NTDS Settings object (the data in the Active Directory
that defines a computer as a domain controller) of the domain controller that is taking
ownership of that role. As replication of this change starts to spread, other domain
controllers learn of the FSMO role change.
References
For more information about FSMO roles in general, see the following article in the
Microsoft Knowledge Base:
197132 Windows 2000 Active Directory FSMO Roles
For more information about the correct placement of FSMO roles, see the following
article in the Microsoft Knowledge Base:
223346 FSMO Placement and Optimization on Windows 2000 Domains
Feedback
Was this page helpful? Yes No
This article describes an issue in which ADAM general Event ID 1161 is logged on an AD
LDS server.
Symptoms
The following event is logged in the ADAM log every time an instance is restarted on an
AD LDS server that's running Windows Server 2012 R2.
Cause
The address book hierarchy table does not exist in the Active Directory Lightweight
Directory Services (AD LDS) database. Therefore, the event is triggered during service
startup.
Feedback
Was this page helpful? Yes No
This article describes how to change a Windows Active Directory and LDS user password
through LDAP.
Summary
Based on certain restrictions, you can set a Windows Active Directory and Lightweight
Directory Services (LDS) password through the Lightweight Directory Access Protocol
(LDAP). This article describes how to set or change the password attribute.
These steps also apply to Active Directory Application Mode (ADAM) and LDS users and
userProxy objects in the same way as done with AD users. See additional hints at the
end of the article for details.
More information
The password is stored in the AD and LDS database on a user object in the unicodePwd
attribute. This attribute can be written under restricted conditions but can't be read. The
attribute can only be modified; it can't be added on object creation or queried by a
search.
To modify this attribute, the client must have a 128-bit Transport Layer Security
(TLS)/Secure Socket Layer (SSL) connection to the server. An encrypted session using
SSP-created session keys using Windows New Technology LAN Manager (NTLM) or
Kerberos are also acceptable as long as the minimum key length is met.
The server must possess a server certificate for a 128-bit RSA connection.
The client must trust the certificate authority (CA) that generated the server
certificate.
Both client and server must be capable of 128-bit encryption.
The syntax of the unicodePwd attribute is octet-string; however, the directory service
expects that the octet-string will contain a UNICODE string (as the name of the attribute
indicates). This means that any values for this attribute passed in LDAP must be
UNICODE strings that are BER-encoded (Basic Encoding Rules) as an octet-string. In
addition, the UNICODE string must begin and end in quotes that aren't part of the
desired password.
There are two possible ways to modify the unicodePwd attribute. The first is similar to a
regular user change password operation. In this case, the modify request must contain
both delete and an add operation. The delete operation must contain the current
password with quotes around it. The add operation must contain the desired new
password with quotes around it.
C++
if (err == LDAP_SUCCESS )
wprintf(L"\nPassword successfully changed!\n");
else
wprintf(L"\nPassword change failed!\n");
return err;
}
if (err == LDAP_SUCCESS )
wprintf(L"\nPassword succesfully set!\n");
else
wprintf(L"\nPassword set failed!\n");
return err;
}
Tip
To configure LDS instances using UserProxy objects for password resets, you
have to allow constrained delegation of the LDS service account (default: LDS
computer account) to the domain controllers in case the user logon uses
Kerberos.
If you are using LDAP simple bind, you have to use Windows Server 2022 or a
newer version and set a registry entry to forward the admin LDAP session
credentials to the Active Directory Domain Controller:
Registry Key: HKLM\system\currentcontrolset\services<LDS
Instance>\Parameters
Registry Entry: Allow ClearText Logon Type
Type: REG_DWORD
Data: 0: Don't allow forwarding of credentials (Default)
1: Allow forwarding of credentials for password reset
Note that the change in both cases means that the LDS server should be
considered a Tier-0 device as it can start security-sensitive tasks on the
Domain Controller.
Applies to
Windows Server 2012 Datacenter
Windows Server 2012 Standard
Windows Server 2012 R2 Datacenter
Windows Server 2012 R2 Standard
Windows Server 2016
Windows Server 2019
Windows Server 2022
Windows 8.1 Enterprise
Windows 8.1 Pro
Windows 10
Windows 11
Feedback
Was this page helpful? Yes No
This article describes how to Hide or Display the InetOrgPerson object class in Active
Directory Users and Computers.
Summary
In Windows Server 2003-and-later versions of Active Directory, an additional object class
is introduced. The InetOrgPerson object class. InetOrgPerson is defined in RFC 2798, and
it has been accepted as the de facto standard in other Lightweight Directory Access
Protocol (LDAP) directory implementations.
Active Directory has been modified to support the InetOrgPerson class, and with the
addition of the User class definition, you can now create InetOrgPerson as security
principals in Active Directory. This greatly enhances an administrator's capabilities to
migrate user accounts from third-party directories into the Active Directory.
However, this change may introduce problems with third-party programs (third-party
programs are defined as any programs that use Active Directory as an authentication
method). Microsoft recommends that you perform complete program compatibility
testing before you use the InetOrgPerson class.
For this reason, and also to avoid confusion, you may want to disable the visible
references to the InetOrgPerson object type in Active Directory Users and Computers.
This will prevent administrators from mistakenly creating InetOrgPerson users instead of
the more accepted User type.
More information
To enable or disable the InetOrgPerson user type in Active Directory Users and
Computers, follow these steps:
1. Log on to the Windows Server 2003 domain controller that holds the Schema
Master FSMO role as an account with Schema Administrator permissions.
2. Open the Adsiedit Microsoft Management Console (MMC) snap-in.
3. In the Schema folder, locate the CN=InetOrgPersonClass object. Right-click this
object, and then click Properties.
4. Locate the defaultHidingValue attribute, and then modify its value based on your
expected outcome. If you set this value to True, this hides the InetOrgPerson object
type in Active Directory Users and Computers. If you set this value to False, this
displays the object type.
5. After you set the value, click Apply, and then click OK. Allow for standard
replication latency, and then restart any instances of Active Directory Users and
Computers.If you set the defaultHidingValue attribute to False, you can create new
users of the InetOrgPerson type. With DefaultHidingValue set to True, this
functionality is removed.
7 Note
This is true only of Active Directory Users and Computers. You can still create the
InetOrgPerson user types through other means, regardless of this setting.
Feedback
Was this page helpful? Yes No
This step-by-step article describes how to configure Active Directory diagnostic event logging in
Microsoft Windows Server operating systems.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server
2012 R2, Windows Server 2012
Original KB number: 314980
Summary
Active Directory records events to the Directory Services or LDS Instance log in Event Viewer. You
can use the information that is collected in the log to help you diagnose and resolve possible
problems or monitor the activity of Active Directory-related events on your server.
By default, Active Directory records only critical events and error events in the Directory Service
log. To configure Active Directory to record other events, you must increase the logging level by
editing the registry.
Each of the following REG_DWORD values under the Diagnostics subkey represents a type of
event that can be written to the event log:
Logging levels
Each entry can be assigned a value from 0 through 5, and this value determines the level of detail
of the events that are logged. The logging levels are described as:
0 (None): Only critical events and error events are logged at this level. This is the default
setting for all entries, and it should be modified only if a problem occurs that you want to
investigate.
1 (Minimal): High-level events are recorded in the event log at this setting. Events may
include one message for each major task that is performed by the service. Use this setting to
start an investigation when you do not know the location of the problem.
2 (Basic)
3 (Extensive): This level records more detailed information than the lower levels, such as steps
that are performed to complete a task. Use this setting when you have narrowed the problem
to a service or a group of categories.
4 (Verbose)
5 (Internal): This level logs all events, including debug strings and configuration changes. A
complete log of the service is recorded. Use this setting when you have traced the problem
to a particular category of a small set of categories.
) Important
This section, method, or task contains steps that tell you how to modify the registry. However,
serious problems might occur if you modify the registry incorrectly. Therefore, make sure that
you follow these steps carefully. For added protection, back up the registry before you modify
it. Then, you can restore the registry if a problem occurs. For more information, see How to
back up and restore the registry in Windows .
Each entry that's displayed in the right pane of the Registry Editor window represents a type
of event that Active Directory can log. All entries are set to the default value of 0 (None).
7 Note
Logging levels should be set to the default value of 0 (None) unless you are
investigating an issue.
When you increase the logging level, the detail of each message and the number
of messages that are written to the event log also increase. A diagnostic level of 3
or greater is not recommended, because logging at these levels requires more
system resources and can degrade the performance of your server. Make sure that
you reset the entries to 0 after you finish investigating the problem.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\15 Field
Engineering
3. Create the following registry keys to configure registry-based filters for expensive, inefficient,
and long-running searches:
ノ Expand table
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\Expensive REG_DWORD 1
Search Results Threshold
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\Inefficient REG_DWORD 1
Search Results Threshold
Feedback
Was this page helpful? Yes No
This article provides some information about the issue that anonymous LDAP operations
to Active Directory are disabled on domain controllers.
Summary
By default, anonymous Lightweight Directory Access Protocol (LDAP) operations to
Active Directory, other than rootDSE searches and binds, are not permitted in Microsoft
Windows Server 2003.
More information
Active Directory in earlier versions of Microsoft Windows-based domains accepts
anonymous requests. In these versions, a successful result depends on having correct
user permissions in Active Directory.
With Windows Server 2003, only authenticated users may initiate an LDAP request
against Windows Server 2003-based domain controllers. You can override this new
default behavior by changing the seventh character of the dsHeuristics attribute on the
DN path as follows:
CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration, Root domain in
forest
The DsHeuristics setting applies to all Windows Server 2003-based domain controllers in
the same forest. The value is realized by domain controllers upon Active Directory
replication without restarting Windows. Microsoft Windows 2000-based domain
controllers do not support this setting and do not restrict anonymous operations if they
are present in a Windows Server 2003-based forest.
Valid values for the dsHeuristic attribute are 0 and 0000002. By default, the DsHeuristics
attribute does not exist, but its internal default is 0. If you set the seventh character to 2
(0000002), anonymous clients can perform any operation that is permitted by the access
control list (ACL), as can Windows 2000-based domain controllers.
7 Note
If the attribute is already set, do not modify any characters in the DsHeuristics
string other than the seventh character. If the value is not set, make sure that you
provide the leading zeros up to the seventh character. Also, you can use
Adsiedit.msc to make the change to the attribute.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that LDS service startup fails after you
manually change msDS-Behavior-Version.
Symptom
In ADSI Edit, you change the msDS-Behavior-Version attribute of the Partitions
container to 7 in order to raise the Active Directory (AD) Lightweight Directory Services
(LDS) instance functional level to WIN2016.
After you restart the server or stop the LDS service, the LDS service cannot be started.
When you try to manually start the service, the following event errors are logged:
Log Name: ADAM (LDS)
Source: ADAM [LDS] General
Event ID: 1168
Task Category: Internal Processing
Level: Error
Keywords: Classic
User: ANONYMOUS LOGON
Computer: LDS.CONTOSO.COM
Description:
Internal error: An Active Directory Lightweight Directory Services error has occurred.
Additional Data
Error value (decimal):
-1601
Error value (hex):
fffff9bf
Internal ID:
20801a4
Windows could not start the <ServiceName> LDS service on Local Computer.
Error 0xc0000025: 0xc0000025
Cause
Manually setting the msDS-Behavior-Version attribute value to 7 on LDS instances is
not supported.
Resolution
If the LDS instance contains only one server, you must restore the server from a backup
to resolve the issue.
If there are multiple replica servers in that instance (for example, LDSServer1 and
LDSServer2), and if one server has not yet been restarted, follow these steps:
1. If the LDS server on which the service that does not start (for example, LDSServer1)
holds the LDS Roles (for example, Schema and Domain Naming FSMO), seize the
roles by running ntdsutil:
C:\Windows\system32> ntdsutil
ntdsutil: roles
fsmo maintenance: connections
server connections: connect to server LDSServer2:50000( 50000 is the port
number in that example)
Binding to LDSServer2:50000 ...
Connected to LDSServer2:50000 using credentials of locally logged on user.
server connections: q
fsmo maintenance: seize schema master
2. Connect to the configuration partition of the server that still runs the LDS instance
(for example, LDSServer2), and then roll back the functionality level version by
reverting the msDS-Behavior-Version attribute value.
C:\Windows\system32> dsmgmt
dsmgmt: metadata cleanup
metadata cleanup: connections
server connections: connect to server LDSServer2:50000 ( 50000 is the port
number in that example)
Binding to LDSServer2:50000 ... Connected to LDSServer2:50000 using
credentials of locally logged on user. server connections: q
metadata cleanup: select operation target
select operation target: list naming contexts
Found 3 Naming Context(s) 0 - CN=Configuration,CN={6B7FEBF4-017B-4366-
A8B8-3E5467888DEF} 1 - CN=Schema,CN=Configuration,CN={6B7FEBF4-
017B-4366-A8B8-3E5467888DEF} 2 - DC=LDS,DC=COM select operation
target: select naming context2 ( 2 stands for the domain naming context )
No current site No current domain No current server Naming Context -
DC=LDS,DC=COM select operation target: list sites
Found 4 site(s) 0 - CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,CN={6B7FEBF4-017B-4366-A8B8-
3E5467888DEF} 1 - CN=Site1,CN=Sites,CN=Configuration,CN={6B7FEBF4-
017B-4366-A8B8-3E5467888DEF} 2 -
CN=Site2,CN=Sites,CN=Configuration,CN={6B7FEBF4-017B-4366-A8B8-
3E5467888DEF} 3 - CN=Site3,CN=Sites,CN=Configuration,CN={6B7FEBF4-
017B-4366-A8B8-3E5467888DEF} select operation target: select site3 (where 3
is the number of the site in which the server is located, matching output
from previous step)
Site - CN=Site3,CN=Sites,CN=Configuration,CN={6B7FEBF4-017B-4366-A8B8-
3E5467888DEF} No current domain No current server Naming Context -
DC=LDS,DC=COM select operation target: list servers in Site
Found 1 server(s) 0 -
CN=LDSServer1,CN=Servers,CN=Site3,CN=Sites,CN=Configuration,CN=
{6B7FEBF4-017B-4366-A8B8-3E5467888DEF} select operation target: select
Server0 (where 0 is the number of the server you wish to remove, matching
output from previous step)
Site - CN=Site3,CN=Sites,CN=Configuration,CN={6B7FEBF4-017B-4366-A8B8-
3E5467888DEF} No current domain Server -
CN=LDSServer1,CN=Servers,CN=Site3,CN=Sites,CN=Configuration,CN=
{6B7FEBF4-017B-4366-A8B8-3E5467888DEF} DSA object - CN=NTDS
Settings,CN=LDSServer1,CN=Servers,CN=Site3,CN=Sites,CN=Configuration,C
N={6B7FEBF4-017B-4366-A8B8-3E5467888DEF} DNS host name -
LDSServer1.CONTOSO.COM Naming Context - DC=LDS,DC=COM select
operation target: q
metadata cleanup: remove selected server
4. Log on to LDSServer1, and uninstall the instance:
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that numerous "Event ID 1216" Events
occur in Directory Services Event Log.
7 Note
This article contains information about modifying the registry. Before you modify
the registry, make sure to back it up and make sure that you understand how to
restore the registry if a problem occurs. For information about how to back up,
restore, and edit the registry, click the following article number to view the article in
the Microsoft Knowledge Base:
256986 Description of the Microsoft Windows Registry
Symptoms
You may find multiple instances of the following entry in the Directory Services event
log:
Event Type:Warning
Event Source:NTDS LDAP
Event Category:LDAP Interface
Event ID:1216
Date:<DateTime>
Time:<DateTime>
User:N/A
Computer:Computer
Description:
The LDAP server closed a socket to a client because of an error condition, 1234.
(Internal ID c01028c::4294967295).
7 Note
The Internal ID value varies with each instance.
Cause
This event log message occurs when a Lightweight Directory Access Protocol (LDAP)
client sends a request to the computer by using User Datagram Protocol (UDP), but
does not keep its socket open to listen for the response from the server. When the
server tries to send the answer back, the error message is logged to the event log. It is a
harmless error that can occur frequently under normal operating conditions. It occurs
only if the diagnostic logging level is increased by modifying the level of LDAP logging
to 2 or more in the registry.
Resolution
2 Warning
If you use Registry Editor incorrectly, you may cause serious problems that may
require you to reinstall your operating system. Microsoft cannot guarantee that you
can solve problems that result from using Registry Editor incorrectly. Use Registry
Editor at your own risk.
Feedback
Was this page helpful? Yes No
Symptoms
Domain Name System (DNS) registrations of SRV and domain controller (DC) locator A
records (registered by Netlogon) and NS records (added by the authoritative DNS
servers) in an Active Directory-integrated DNS zone for some DCs may not work in a
domain that contains a large number of DCs (usually over 1200). If the Active Directory-
integrated DNS zone has the same name as the Active Directory domain name,
problems with the registration of A records and NS records at the zone root seem to
occur in a domain with more than 400 DCs. Also, one or more of the following error
messages may be logged in the Event log:
Output
Output
Output
Output
Cause
This problem occurs because Active Directory has a limitation of approximately 1200
values that can be associated with a single object. In an Active Directory-integrated DNS
zone, DNS names are represented by dnsNode objects, and DNS records are stored as
values in the multi-valued dnsRecord attribute on dnsNode objects, causing the error
messages listed earlier in this article to occur.
Resolution
You can use one of the following methods to resolve this issue.
Method 1
If you want to specify a list of DNS servers that can add NS records corresponding to
themselves to a specified zone, choose one DNS server and then run Dnscmd.exe with
the /AllowNSRecordsAutoCreation switch:
Console
To clear the list of TCP/IP addresses of DNS servers that have permission to
automatically create NS records for a zone and return the zone to the default state
when every primary DNS server automatically adds to a zone an NS record
corresponding to it, use the dnscmd servername /config zonename
/AllowNSRecordsAutoCreation command. For example:
Console
To query the list of TCP/IP addresses of DNS servers that have permission to
automatically create NS records for a zone, use the dnscmd servername /zoneinfo
zonename /AllowNSRecordsAutoCreation command. For example:
Console
7 Note
Run this command on only one DNS server. Active Directory replication propagates
the changes to all DNS servers that are running on DCs in the same domain.
In an environment in which the majority of the DNS DCs for a domain are located in
branch offices and a few are located in a central location, you may want to use the
Dnscmd command described earlier in this article to set the IPList to include only the
centrally located DNS DCs. By doing so, only the centrally located DNS DCs add their
respective NS records to the Active Directory domain zone.
Method 2
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows .
If you want to choose which DNS server does not add NS records corresponding to
themselves to any Active Directory-integrated DNS zone, use Registry Editor
(Regedt32.exe) to configure the following registry value on each affected DNS server:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters
This value affects all Active Directory-integrated DNS zones. The values have the
following meanings:
ノ Expand table
Value Meaning
0 DNS server automatically creates NS records for all Active Directory-integrated DNS
zones unless any zone, that is hosted by the server, contains the
AllowNSRecordsAutoCreation attribute (described earlier in this article) that does not
include the server. In this situation, the server uses the AllowNSRecordsAutoCreation
configuration.
1 DNS server does not automatically create NS records for all Active Directory-integrated
DNS zones, regardless of the AllowNSRecordsAutoCreation configuration in the Active
Value Meaning
7 Note
To apply the changes to this value, you must restart the DNS Server service.
If you want to prevent certain DNS servers from adding their corresponding NS records
to Active Directory-integrated DNS zones that they host, you can use the
DisableNSRecordsAutoCreation registry value described earlier in this article.
7 Note
Netlogon Fix
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows .
The Netlogon portion of this hotfix gives administrators greater control as described
earlier in this article. You should apply the fix to every DC. Also, to prevent a DC from
attempting dynamic updates of certain DNS records that by default are dynamically
updated by Netlogon, use Regedt32.exe to configure the following registry value:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
7 Note
Set the value to the list of the enter-delimited mnemonics that are specified in the
following table.
ノ Expand table
LdapIpAddress A <DnsDomainName>
Gc SRV _ldap._tcp.gc._msdcs.<DnsForestName>
GcIpAddress A gc._msdcs.<DnsForestName>
Dc SRV _ldap._tcp.dc._msdcs.<DnsDomainName>
7 Note
RegisterDnsARecords = 0x1
If you list LdapIpAddress and GcIpAddress in the DnsAvoidRegisterRecords registry
value settings, A records are not registered.
RegisterDnsARecords = 0x0
No matter whether you list LdapIpAddress and GcIpAddress in the
DnsAvoidRegisterRecords registry value settings, A records are not registered.
To prevent the problem described earlier in this article from occurring in an environment
in which a set of DCs and/or global catalog (GC) servers are located in a central location
and a large number of the DCs and/or GC servers are located in branch offices, the
administrator can disable registration of some of the DNS records by Netlogon on the
DCs/GCs in the branch offices. In this situation, the list of mnemonics that should not be
registered includes:
DC-specific records:
ノ Expand table
LdapIpAddress A <DnsDomainName>
Mnemonic Type DNS Record
Dc SRV _ldap._tcp.dc._msdcs.<DnsDomainName>
GC-specific records:
ノ Expand table
Gc SRV _ldap._tcp.gc._msdcs.<DnsForestName>
GcIpAddress A gc._msdcs.<DnsForestName>
7 Note
These lists do not include the site-specific records. Therefore, DCs and GC servers in
branch offices are located by site-specific records that are usually used by a DC
locator. If a program searches for a DC/GC by using generic (non-site-specific)
records such as any of the records in the lists that are listed earlier in this article, it
finds a DC/GC in the central location.
An administrator may also choose to limit the number of the DC locator records such as
SRV and A records registered by Netlogon for the same generic DNS name
(_ldap._tcp.dc._msdcs.<DomainName>), even in a scenario with fewer than 1200 DCs in
the same domain, to reduce the size of DNS responses to queries for such records.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
More Information
Every DNS server that is authoritative for an Active Directory-integrated DNS zone adds
an NS record. By default, every DC in a domain registers an SRV record for a set of non-
site-specific names such as "_ldap._tcp.<domain_name>" and A record(s) that map(s)
the Active Directory DNS domain name to the TCP/IP address(es) of the DC. When a
DNS server tries to write a record after approximately 1200 records with the same
shared name, Local Security Authority (LSA) runs at 100 percent CPU usage for
approximately 10 seconds and the registration does not succeed. Netlogon retries this
registration every hour; the 100 percent CPU usage spike reappears at least once an
hour and the attempted registrations do not succeed.
Feedback
Was this page helpful? Yes No
Summary
This error occurs because of class definition differences between the Active Directory
directory service and the ADAM instance. To troubleshoot this issue, follow the steps
that are described in the following sections:
Symptoms
You try to use the Active Directory Application Mode (ADAM) Synchronizer
(Adamsync.exe) tool to synchronize the Active Directory objects to an ADAM instance
on a Windows Server. However, an error message that resembles the following is logged
in the Adamsync log file:
Processing Entry: Page X, Frame X, Entry X, Count X, USN X Processing source entry
<guid=f9023a23e3a06d408f07a0d51c301f38> Processing in-scope entry
f9023a23e3a06d408f07a0d51c301f38. Adding target object
CN= TestGroup,OU= Accounts,dc= domain, dc= com. Adding attributes:
sourceobjectguid, objectClass, instanceType, displayName, info, adminDescription,
displayNamePrintable, userAccountControl, codePage, countryCode, logonHours,
primaryGroupID, comment, accountExpires, sAMAccountName, desktopProfile,
legacyExchangeDN, userPrincipalName
Ldap error occurred. ldap_add_sW: Object Class Violation. Extended Info: 0000207D:
UpdErr: DSID-0315119D, problem 6002 (OBJ_CLASS_VIOLATION), data -2054643804
Cause
This problem occurs because of the class definition differences between Active Directory
and ADAM. This difference appears when you try to modify an object to include an
attribute that is invalid for its class. For example, the attribute is not defined in the
ADAM schema at all, or the attribute is defined but the attribute is not present in the list
of Mandatory or Optional attributes for the specific class. Typically, the second situation
is the most frequent cause of this problem.
The class definition for the object that is to be synchronized contains one or more
attributes in Active Directory that are unavailable in ADAM. The "Adding attributes"
section of the error message that is mentioned in the "Symptoms" section displays the
attributes that you try to add. These attributes are defined in the list of Optional or
Mandatory attributes for the class of the object that is being synchronized.
For example, in the error message that is mentioned in the "Symptoms" section, the
reference object is CN=TestGroup. When you view the CN=TestGroup object in Active
Directory, and you check the list of attributes for this class and all parent classes, you see
that one or more attributes in this list are not in the list of Mandatory or Optional
attributes that are enabled for this class in ADAM.
7 Note
Resolution
To resolve this problem, follow these steps.
Exclude these attributes by using the <exclude> section in the XML configuration
file.
By using the MMC schema, manually add these attributes to the list of Optional
attributes for the relevant class in the ADAM schema. For example, in the error
message that is mentioned in the "Symptoms" section, the failing object is of the
Group class. Therefore, you must add these attributes to the Optional attributes list
for the Group class in ADAM.
2. Use the File menu to load Active Directory as the target schema and ADAM as the
base schema. Wait for the tool to finish comparing the schemas.
4. On the File menu, click Create LDIF file to create an LDF file that contains the
changes.
7 Note
If you import this LDF file directly into ADAM, the necessary attributes will
probably not be added or modified correctly.
5. No error message is displayed. See the "Why you cannot import the LDF file
directly into ADAM" section for an explanation of why this occurs. In this case, go
to step 5 without importing the LDF file.
6. Examine the LDF file that you created in step 4. Specifically, view the class that is
causing the problem. For example, view the Group class. The section for this class
will contain the list of attributes that are present in the list of Mandatory or
Optional attributes for this class in Active Directory but that are missing in ADAM.
7. Find the problem attribute in the LDF file. To do this, examine the "#attributes"
section in the LDF file. Attributes that are not imported remain in this section.
Typically, the problem attribute is the only attribute that you find in the
"#attributes" section. If you find the problem attribute, go to step 8. If you do not
find the problem attribute, go to step 7.
8. If the problem attribute is not obvious from the "#attributes" section in the LDF
file, follow these steps to find the problem attribute:
a. Currently all modifications to a class are under one section in the LDF file. This is
the "#Updating Present Elements" section. Under this section, locate the section
that updates the class that has the problem. For example, if the Group class is
the problem, you will find a section that resembles the following:
Note Some more entries that may be located here have been excluded from
this example.
dn:
changetype: modify
add: schemaUpdateNow
schemaUpdateNow: 1
b. Change the entries that you located in step 4a by splitting the entries into a
single attribute per operation. For example, change the entries in the example in
step 7a by using entries that resemble the following:
dn: cn=Group,cn=Schema,cn=Configuration,dc=X
changetype: modify
add: mayContain
# mayContain: groupAttributes
mayContain: 1.2.840.113556.1.4.152
-
dn: cn=Group,cn=Schema,cn=Configuration,dc=X
changetype: modify
add: mayContain
# mayContain: groupMembershipSAM
mayContain: 1.2.840.113556.1.4.166
-
Note Some more entries that may be located here have been excluded from
this example.
dn:
changetype: modify
add: schemaUpdateNow
schemaUpdateNow: 1
11. View the report that is displayed by the Ldifde utility. Ldifde will now report the
errors that occur with the attributes that were not imported. The error information
will resemble the following sample information:
Console
7 Note
Locate the problem attribute in the LDF file by viewing the line number that is
indicated in the error report.
12. Use this error information to find the problem attribute and resolve the problem.
Follow these steps to try to resolve the problem:
a. Locate the problem attribute in the LDF file by viewing the line number that is
indicated in the error report. The failed attribute may have a "DUP-" prefix in the
DisplayName.
b. Note the object identifier (OID) of the attribute and look for this object identifier
in ADAM.
c. Find the attribute in ADAM that has the same object identifier.
d. Compare the attribute in ADAM and in the LDF file to find any differences. For
example, the attributes may have a different DisplayName but the same object
identifier.
e. Decide which attribute to keep, and then correct the other one. For example,
you can remove the entry from the LDF file, or you can correct the ADAM
attribute entry. Or, you can exclude the problem attribute from the
synchronization by using the <exclude> section in the XML configuration file.
13. After the problem attribute is corrected in Active Directory or in the ADAM schema
or after the attribute is removed from the LDF file, import the modified LDF file
again. Now the import operation should be successful. If the problem is not
resolved, there may be another attribute that is causing the problem. Repeat steps
10 through 12 until all the attributes are imported.
Diagnostics Logging
When you find the problem attribute, it may not be obvious what is wrong with it. For
example, you may not find a duplicate object identifier or a
different DisplayName entry. When a problem attribute is not imported, you can obtain
more information about the failure by turning on debug logging for the LDAP interface.
To do this, follow these steps:
1. To obtain more information about the ldifde failure, turn on LDAP logging in
ADAM. To do this, change the value for the Category 16 LDAP Interface events
registry entry to 5. This registry entry is located under the following registry
subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ADAM_instanceName\Diagnos
tics
4. After you finish troubleshooting, reset the value for the Category 16 LDAP
Interface events registry entry to 0. Otherwise, the event log will be flooded.
Status
This behavior is by design.
More information
To synchronize data from Active Directory to ADAM by using the Adamsync tool, follow
these steps:
1. Click Start, point to All Programs, point to ADAM, and then click ADAM Tools
Command Prompt.
2. At the command prompt, type the following command, and then press ENTER:
adamsync /fs Server_Name: port_number configurationName /log
log_file_name.log
Why you cannot import the LDF file directly into ADAM
If you import the LDF file that you created in step 1 under the "Steps to resolve the
problem when attributes do not belong to the TOP class" section into ADAM, these
attributes are still not added to the attribute list in ADAM. You can verify this behavior
by using the ADAM schema MMC or ADSIEDIT to examine the schema. This behavior
occurs because the Ldifde import operation fails silently. Currently, Ldifde does not
report errors. It fails silently because of the way that ADSchemaAnalyzer constructs the
LDF file. ADSchemaAnalyzer uses the ntdsschemaadd and ntdsSchemamodify
commands. These commands turn on permissive LDAP control. This means that any
failure is silent.
Additionally, for each class, all attributes to be added into the Optional attributes list are
added in one add/modify operation. Therefore, if there is a problem adding one of the
attributes, the whole operation fails, and no attributes in the list are added. Therefore,
additional steps must be taken to find the problem attribute.
Usually, the likely reason for failure is a duplicate object identifier of an attribute or
some other difference in the attribute definitions in Active Directory and ADAM. This
means that duplicate OIDs may be missed, and an attribute may be seen as a new
attribute if the LDapDisplayName does not exist in ADAM.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that occurs when you reboot an AD LDS
server that holds FSMO roles or restart an AD LDS instance on that server.
Symptoms
When you reboot an Active Directory Light-weight Domain Services (AD LDS) server that
holds Flexible Single Master Operations (FSMO) roles or restart an AD LDS instance on
that server, you get a warning message (Event ID 2092) in the ADAM event viewer for
that particular instance. Event ID 2092 shows:
This server is the owner of the following FSMO role, but does not consider it valid.
For the partition which contains the FSMO, this server has not replicated successfully
with any of its partners since this server has been restarted. Replication errors are
preventing validation of this role.
Operations which require contacting a FSMO operation master will fail until this
condition is corrected.
User Action:
1. Initial synchronization is the first early replications done by a system as it is
starting. A failure to initially synchronize may explain why a FSMO role cannot
be validated. This process is explained in KB article 305476.
2. This server has one or more replication partners, and replication is failing for all
of these partners. Use the command repadmin /showrepl to display the
replication errors. Correct the error in question. For example there maybe
problems with IP connectivity, DNS name resolution, or security authentication
that is preventing successful replication.
3. In the rare event that all replication partners being down is an expected
occurrence, perhaps because of maintenance or a disaster recovery, you can
force the role to be validated. This can be done by using NTDSUTIL.EXE to
seize the role to the same server. This may be done using the steps provided in
KB articles 255504 and 324801 on https://support.microsoft.com .
This server is the owner of the following FSMO role, but does not consider it valid.
For the partition which contains the FSMO, this server has not replicated successfully
with any of its partners since this server has been restarted. Replication errors are
preventing validation of this role.
Operations which require contacting a FSMO operation master will fail until this
condition is corrected.
User Action:
Cause
When there are two or more AD LDS instances in a replica set, FSMO-owning AD LDS
instances are required to in-bound replicate a particular partition on service start-up in
order to satisfy initial synchronization requirements. Event 2092 is logged shortly after
service start-up to indicate this condition. The domain naming FSMO is required to
replicate the Configuration partition, and the Schema FSMO is required to replicate the
Schema partition. Once the respective partition has been replicated successfully updates
will be allowed again. There is no event logged to indicate that initial synchronization
has completed successfully.
Resolution
If AD LDS replication is working between instances, you can ignore this event. This is a
by design behavior that FSMO role holder instance looks for a replica partner to update
the information, when AD LDS service/server is restarted.
More information
To check replication between AD LDS instances, you can use dcdiag.exe or
repadmin.exe. For more information, see the following articles:
Repadmin
Dcdiag
Feedback
Was this page helpful? Yes No
This article helps resolve an issue where an "The supplied password does not match this
encryption key's password" error occurs when you configure the Password Export Server
(PES) service on Active Directory Migration Tool version 3.1.
Symptoms
Configuring the Password Export Server (PES) service on Active Directory Migration Tool
version 3.1 on the source domain PDC Emulator role holder using the ADMT KEY
command shown below fails with the following on-screen error:
Command-line syntax:
On-screen error:
The supplied password does not match this encryption key's password. ADMT's
Password Migration Filter DLL will not install without a valid encryption key.
Cause
The supplied password was correct, but Windows Installer (msiexec.exe) failed to open a
handle to the policy object on the domain controller for saving the password that will be
used by the PES service. The failure indicates that the user account didn't have the
required permission.
The user who installs the PES service must be a member of the domain's built-in
Administrators group.
In addition, if the user account isn't a member of the built-in Administrators account,
and User Account Control (UAC) is enabled on the domain controller, the user runs with
least user privileges after logon. To access the policy object on the domain controller for
installing the PES service, the user must launch the Pwdmig.msi setup file with full
privileges.
Resolution
Ensure the user account who installs the PES service is a member of the domain's built-
in Administrators group by running the whoami /groups command, and then run the
Pwdmig.msi setup file in an elevated command prompt window launched with the Run
as administrator option.
Alternatively, you can launch an elevated command prompt window, change the
directory to the one where you downloaded the PES installer, and then run the msiexec
/i pwdmig.msi command.
More information
If you see that the output of the command whoami /groups looks like the following, it
means the user logged in with least user privileges. Although they're a member of the
built-in Administrators group, they don't have permissions to perform administrative
tasks with this token.
ノ Expand table
....
Feedback
Was this page helpful? Yes No
This article provides help to an error (Cannot open database "ADMT" requested by the
login. The logon failed) that occurs when you run Active Directory Migration Tool
(ADMT) console.
Symptoms
When installing ADMT 3.2 on a Windows Server 2008 R2 domain controller and using
SQL Express 2008 with SP1 and SQL 2008 Cumulative Update 4, the installation
completes without errors. However, the dialog "Active Directory Migration Tool
Installation Wizard" is blank when the install is finished.
When then attempting to run the ADMT console, you receive error:
Cause
There is a code defect in how ADMT interoperates with SQL Express 2008 SP1 on
domain controllers resulting in the
"SQLServerMSSQLUser$ComputerName$InstanceName" group not being created. This
group is required by ADMT to configure specific permissions during the ADMT install
and allows the ADMT database to be created in the SQL instance. ADMT expects the
group to be present, which leads to the blank dialog and an incomplete installation.
Workaround 1
The standard practice is to install ADMT on a member computer in the target domain.
Install SQL Express 2008 SP1 on a Windows 2008 R2 member server in the target
domain and then install ADMT 3.2 on that same member server.
Workaround 2
If you have a requirement to install ADMT 3.2 on a domain controller in order to use
command-line or scripted user migrations with SID History, install SQL 2008 SP1 (non-
Express edition) on a Windows Server 2008 R2 member server in the target domain and
select that remote instance when installing ADMT 3.2 on the domain controller.
Alternatively, you can install SQL Express 2005 SP3 on the domain controller.
Workaround 3
If you have a requirement to install ADMT 3.2 and SQL Express 2008 SP1 on the same
domain controller, use the following steps on the target domain's domain controller:
1. Install the Cumulative Update Package 4 for SQL Server 2008 on the domain
controller.
2. Install SQL Express 2008 SP1 on the domain controller. Note the SQL instance
name created during the install (default is SQLEXPRESS).
Console
4. Retrieve the SQL service SID using the SC.EXE command with the name of the SQL
service instance. For example, if the SQL instance was "SQLEXPRESS" you would
run the following command in an elevated command prompt and note the
returned SERVICE SID value:
Console
SC SHOWSID MSSQL$SQLEXPRESS
5. In the Windows directory, create the "ADMT" subfolder and a subfolder beneath
that named "Data". For example, you would run the following command in an
elevated command prompt:
Console
MD %SystemRoot%\ADMT\Data
6. Using the SID retrieved in Step 4, set FULL CONTROL permissions on the
%SystemRoot%\ADMT\Data folder. For example, if the SID returned in Step 4 was
"S-1-5-80-3880006512-4290199581-3569869737-363123133" you would run the
following command in an elevated command prompt:
Console
7. Install ADMT 3.2 on the domain controller while selecting the local SQL Express
2008 instance.
Feedback
Was this page helpful? Yes No
This article describes known issues that you may experience when you use Active
Directory Migration Tool 3.1 to migrate Active Directory data to a domain, and provides
help to resolve these issues.
Summary
Although Active Directory Migration Tool (ADMT) 3.1 is not intended to target Windows
Server 2008 R2, Microsoft has verified that this tool can be used to migrate Active
Directory data to a domain hosted by one or more Windows Server 2008 R2 domain
controllers. However, there are known issues with this approach. This article outlines
these issues and provides workarounds.
More information
The following list describes updated supported scenarios for using ADMT 3.1:
ADMT 3.1 must be run from a Windows Server 2008-based computer. The
computer must be a member server or a domain controller.
ADMT can be installed on any computer that is running Windows Server 2008,
unless the computers are Read-Only domain controllers or in a Server Core
configuration.
The target domain must be based on Windows 2000 Server, Windows Server 2003,
Windows Server 2008, or Windows Server 2008 R2.
The source domain must be based on Windows 2000 Server, Windows Server 2003,
or Windows Server 2008.
The ADMT agent, which is installed by ADMT on computers in the source domains,
can operate on computers that are running Windows 2000 Professional, Windows
2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server
2008, Windows 7, or Windows Server 2008 R2.
7 Note
If you do not have Windows Server 2008 because you upgraded from Windows
2000 or Windows Server 2003 to Windows Server 2008 R2, you do have downgrade
rights. To obtain product keys and media for Windows Server 2008 R2, visit this
site .
Known issues
The following known issues may occur when you use ADMT 3.1 to migrate data to a
Windows Server 2008 R2 Active Directory environment:
Managed Service Account is a new Windows Server 2008 R2 feature. For more
information, visit the following Microsoft Web page:
Security translation on registry keys may fail (nonblocking). When the issue occurs,
the administrator may receive an error message that resembles any of the
following:
Unable to establish a session with the password expert server: The RPC server is
unavailable
Feedback
Was this page helpful? Yes No
This article discusses information about the current level of support for Active Directory
Migration Tool (ADMT) on current Windows Client and Windows Server operating
systems. This article also lists known issues that administrators might experience when
they try to migrate user profiles, security principals, passwords, or security identifier
history (sIDHistory) data between Active Directory domains and forests.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2
Original KB number: 4089459
Windows 11
Windows 10
Windows 8.1
Windows Server 2022
Windows Server 2019
Windows Server 2016
Windows Server 2012 R2
When you run ADMT on operating systems that aren't supported, you might experience
the following known issues:
ADMT can't migrate user profiles from operating systems that are later than
Windows 7 or Windows Server 2008 R2 to other operating systems. ADMT also
can't migrate user profiles to operating systems that are later than Windows 7 or
Windows Server 2008 R2 from older operating systems.
ADMT isn't compatible with the secure defaults that modern operating systems
use.
ADMT hasn't been tested together with later versions of Microsoft SQL Server. If
you use ADMT in such circumstances, you might see incompatibilities or other
issues.
) Important
Your experience in using ADMT depends on many factors, including the Windows
version that you are migrating from and the Windows version that you are
migrating to. Use the tool at your own risk.
) Important
Many of these issues occur because of changes that have improved the
functionality or security of Windows. Some solutions to these issues involve making
temporary changes to Windows that nullify these improvements. Use these
solutions at your own risk.
) Important
Consult your security team before you change the Credential Guard configuration.
Back up the ADMT server before you make any changes.
The Manage Windows Defender Credential Guard topic provides a script that disables
Credential Guard. In addition to running the script, disable the Computer
Configuration\Administrative Templates\System\Device Guard\Secure Launch
Configuration Group Policy Object (GPO). Otherwise, the computer will re-enable
Credential Guard the next time that it starts.
7 Note
On devices that run Windows Server 2022, Credential Guard is enabled if the GPO
that's described here is set to Not Configured.
Solution: Install and run ADMT apps on the target domain controller. This configuration
removes the need for delegation.
Intra-forest migrations are most at risk for this behavior. This is because intra-forest
migrated user accounts can't be restored to the original source domain.
Solution: After you complete the migration, uninstall the modern apps, and then
reinstall them from the Windows Store.
For more information about this issue, see Windows App cannot start after ADMT 3.2
security translation runs in Windows 8, Windows 8.1 and Windows 10.
Solution: As soon as the migration finishes, disable the source user account. This action
prevents the issue from occurring.
Error 7422: Failed to move source object CN=<object name>. hr=0x8007208c The
operation cannot be performed because child objects exist. This operation can only
be performed on a child object.
A few examples of child objects that block migration include, but aren't limited to, the
following:
Solution: You have to delete the child object (also known as a leaf object) in order to
migrate the parent object. For example, you would have to delete the Exchange
ActiveSync object. Otherwise, there's no known workaround.
Computer migration fails on devices that have custom
DNS suffixes
Issue: During an inter-forest migration, you migrate computers that are configured to
retain their primary DNS suffix when their domain membership changes. The ADMT
post-migration check fails when ADMT tries to verify the domain membership of the
migrated computer. The error messages resemble the following examples:
Error 7711: Unable to retrieve the DNS hostname for the migrated computer
'workstation1.contoso.com'. The ADSI property cannot be found in the property
cache. (hr=0x8000500d) Post-check will be retried on the computer 'workstation1'
Error 7675: Unable to verify the migrated computer 'workstation1' belongs to the
domain 'tailspintoys.com'. Access is denied. (hr=0x80070005)
To check this configuration, open the System properties on the computer. To do this,
select Start > Settings > About > Advanced system settings > Computer Name >
Change > More. If Change primary DNS suffix when domain membership changes
isn't selected, the computer is affected by this issue.
Manual configuration. After you join the computer to the target domain, remove
the SPNs from the account in the source domain. Alternatively, you can delete the
computer account in the source domain.
DNS suffix when domain membership changes. Then during migration, the
computer registers SPNs that match the new domain and doesn't conflict anymore.
Solution: On the computer on which ADMT is installed, temporarily enable TLS 1.0.
ADMT works even if TLS 1.0 is disabled on the domain controller.
) Important
Unable to establish a session with the password export server. The RPC server is
unavailable.
) Important
Consult your security team before you change the LSA Protection configuration.
Back up the computer before you make any changes.
More information
ADMT is available for download at Active Directory Migration Tool version 3.2 .
Feedback
Was this page helpful? Yes No
This article discusses the dependencies and troubleshooting steps for common
problems associated with the inter -forest password migration operation.
Summary
If you perform intra-forest migrations by using the Active Directory Migration Tool
(ADMT) v2, no special configuration is needed to maintain user passwords, sIDHistory,
and object globally unique identifiers (GUIDs) during the move operation.
However, if you use ADMTv2 to perform inter-forest password migration when you
clone user accounts, this operation relies on dependencies that the administrator must
configure. This article discusses the dependencies and troubleshooting steps for
common problems associated with this operation.
Configuration
Beyond basic configuration, ADMTv2 requires the following dependencies when used to
perform inter-forest password migration:
The following registry key should be configured on the Password Export Server:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\AllowPasswordExp
ort = 1
The Password Export Server must be restarted after the registry is edited.
If the target domain is Windows Server 2003-based, run this command to make
the following group a member of the Pre-Windows 2000 Compatible Access
group: NET LOCALGROUP "PRE-WINDOWS 2000 COMPATIBLE ACCESS"
"ANONYMOUS LOGON" /ADD
Troubleshooting
The following are some of the more common error messages and their resolutions:
Unable to establish a session with the password export server. The target server
\SERVER does not have an encryption key for source domain {SRCDOM}. This error
may be caused by one of the following configuration problems:
The Password Export Server has not been configured with the Password Migration
DLL and an encryption key for the target server.
-or-
The encryption key was created and installed, but ADMT is running on a different
computer than the computer that created the encryption key. Password Migration
encryption keys are valid per-computer instead of per-domain.
WRN1:7557 Failed to copy the password for {user}. A strong password has been
generated instead. Unable to copy password. Access is denied. If this error
message appears in the Migration.log file, verify the following:
The following registry key value is set on the target domain controllers:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\RestrictAnonymou
s=0
Pre-Windows 2000 Compatible Access has Read and Enumerate Entire SAM
Domain permissions on the object, as follows: CN=Server,CN=System,DC=
{TargetDomain},DC={tld}
W1:7557 Failed to copy the password for {User}. A strong password has been
generated instead. Unable to copy password. The RPC server is unavailable. This
error message typically indicates a failure to resolve names. Verify that Domain
Name System (DNS) and NetBIOS (WINS) name resolution is working correctly for
both domains.
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot inter-forest sIDHistory migration with Active
Directory Migration Tool version 2 (ADMTv2).
More information
When you are using ADMTv2 to migrate sIDHistory as part of an inter-forest user or
group migration, configuration is required with the base migration requirements.
By default, sIDHistory, password, and objectGUID are all preserved during intra-forest
migrations, but this is not true for inter-forest cloning.
Because there is no built-in security context for inter-forest operations, you must take
steps to protect the security of operations across forest boundaries.
Configuration
The basic requirements for inter-forest migration operations are:
registry key must be set to 1 on the source domain primary domain controller.
You must restart the source domain primary domain controller after the registry
configuration.
Windows security requires user credentials with the delegated MigratesIDHistory
extended right or administrator rights in the target domain. You add these
credentials in the wizard when sIDHistory migration is turned on.
1. Click Start, click Administrative Tools, and then click Active Directory Users and
Computers.
2. Right-click the name of the domain that you want to delegate the
MigrateSidHistory extended right from, and then click Delegate Control to open
the Delegation of Control Wizard window.
3. Click Next, click Add, enter the name of the user or group that you wish to add in
the Select Users, Computers, or Groups dialog box, click OK, and then click Next.
4. Click to select the Create a custom task to delegate option, and then click Next.
5. Make sure that the This folder, existing objects in this folder, and creation of new
objects in this folder option is selected, and then click Next.
6. Make sure that the General option is selected, click Migrate SID History in the
Permissions list, and then click Next.
7. Verify that the information is correct, and then click Finish.
No sID to be migrated may exist in the target forest, either as a primary sID
or as an sIDHistory attribute of another object.
Troubleshooting
The most basic step you can use to troubleshoot inter-forest sIDHistory migration is to
use the User Account Migration Wizard or the Group Account Migration Wizard to run a
test-mode migration.
Optionally, ADMT can repair any of these dependencies that are not set. To repair or
configure these settings, the account that is used to run ADMT must have enough
permissions in each respective domain to carry out the tasks.
Only the wizard performs these checks and corrections. The command line and scripting
interfaces do not perform these checks, and do not work without correct configuration.
This error indicates an RPC problem where the migration tool cannot bind to an RPC
endpoint on the source primary domain controller. Possible causes include:
This error typically indicates that a user or a global or universal group with the
{SourceNetBIOSDom}$$$ name already exists. ADMT typically creates the local group of
that name, but it cannot do so if a security principal already exists with the name.
Could not verify auditing and TcpipClientSupport on domains. Will not be able to
migrate Sid's. Access is Denied.
This error typically indicates that the user account that is used to run ADMT does not
have enough permissions to perform the migration in one or both of the
domains.Domain name lookup failed, rc=1332. No mapping between account names
and security IDs was done. This error in the Migration.log file after a migration with
sIDHistory typically indicates that the source domain has configured trusts that do not
exist on the target domain. To resolve this issue, run the Trust Migration Wizard to map
the trusts in the source domain, and then replicate the relationships in the target
domain.
Some third-party vendor products make it possible to turn on sIDHistory in mixed mode
domains. These claims do not represent the legitimate use of public APIs. Domain
administrators that use such tools risk putting their Active Directory deployment in an
unsupported state.
In both cases, migrated objects are assigned a new sID by the target domain. The
original sID is added to the sIDHistory attribute of the migrated object in the new
domain. After this occurs, the sIDHistory attribute may not be modified or deleted by
using the standard Active Directory administration tools. This is not permitted because
the sIDHistory attribute is owned by the SAM. It is possible to clear the sIDHistory by
using a script or a non-public Microsoft internal tool.
Note that the sIDHistory is a transitional tool and is not meant to exist indefinitely
attached to security principals. Although migrating the sIDHistory can significantly ease
and simplify the domain migration process, there are important security ramifications
that must be considered before you implement the sIDHistory in a production
enterprise.
A Windows security token can hold a maximum of 1,023 sIDs, including sIDHistory and
group sIDs. Kerberos is also limited because Windows Kerberos has a 73-sID buffer. This
size can be doubled by an enterprise-wide registry change. Exceeding these limits
violates the MaxTokenSize restriction and can lead to unpredictable results, including
failure of Kerberos authentication and erratic or nonexistent application of policies. To
prevent these issues, use Security Translation instead of sIDHistory as the long-term
solution to maintaining resource access after a domain migration.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when Windows App cannot start
after ADMT 3.2 security translation runs.
Symptoms
Consider the following scenario:
Security translation fails and generates error 1314 in the ADMT log on the client on
which the security translation agent ran. The log entry resembles the following.
ノ Expand table
Built-in and store applications can't start on Windows 8-based, Windows 8.1-
based, or Windows 10-based computers.
Clicking the Start button does not open the Start menu on Windows 10-based
computers.
If you switch to Tablet mode and then switch back to the previous mode in
Windows 10, the Start menu continues to work but other built-in and store
applications do not start.
Search is unresponsive.
The Settings application does not start on Windows 10-based computers when
you click the Settings icon directly or use the Windows+I keyboard shortcut. This
application works the first time that it is started, and it also works when you use
the Display settings shortcut menu on the desktop.
You cannot view .jpg files because the modern application that is assigned in the
file associations tool does not start. When this occurs, you receive the following
error message:
When you click the Store application in the Windows taskbar of a Windows 10-
based computer, the command fails, and you receive the following error message:
Workaround
To work around this issue, follow these steps:
References
Active Directory Migration Tool (ADMT) Guide: Migrating and Restructuring Active
Directory Domains
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the replication isn't completed when
you replicate Active Directory directory service changes to a domain controller.
Symptoms
When you try to replicate Active Directory directory service changes to a Microsoft
Windows Server 2003-based domain controller, the replication is not completed.
In the event log, you may see events that are similar to the following: In this situation,
you also see error 1818 in the output of the repadmin /showrepl command and in the
output of the repadmin /showreps command.
Cause
This issue may occur when destination domain controllers that are performing remote
procedure call (RPC)-based replication do not receive replication changes from a source
domain controller within the time that the RPC Replication Timeout (mins) registry
setting specifies. You might experience this issue most frequently in one of the following
situations:
You promote a new domain controller into the forest by using the Active Directory
Installation Wizard (Dcpromo.exe).
Existing domain controllers replicate from source domain controllers that are
connected over slow network links.
The default value for the RPC Replication Timeout (mins) registry setting on Windows
2000-based computers is 45 minutes. The default value for the RPC Replication Timeout
(mins) registry setting on Windows Server 2003-based computers is 5 minutes. When
you upgrade the operating system from Windows 2000 to Windows Server 2003, the
value for the RPC Replication Timeout (mins) registry setting is changed from 45
minutes to 5 minutes. If a destination domain controller that is performing RPC-based
replication does not receive the requested replication package within the time that the
RPC Replication Timeout (mins) registry setting specifies, the destination domain
controller ends the RPC connection with the non-responsive source domain controller
and logs a Warning event.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base: 322756 How to back up and restore the registry in Windows
To resolve this issue, increase the bandwidth of your network connection so that the
Active Directory changes replicate in the five-minute timeout period. If you cannot
increase the bandwidth of your network connection, edit the registry on your Windows
Server 2003-based computer to increase the value of the RPC timeout for Active
Directory replication. To increase the RPC timeout value, follow these steps:
7 Note
You must restart the computer to activate any changes that are made to RPC
Replication Timeout (mins).
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution steps for cases when Active Directory replication fails with error 1256: The
remote system is not available.
Symptoms
1. The DCDIAG reports that the Active Directory Replications test has failed with error 1256: The remote system is not available.
2. REPADMIN.EXE reports that a replication attempt has failed with status 1256. REPADMIN commands that commonly cite the
1256 status include but are not limited to:
REPADMIN /REPLSUM
REPADMIN /SHOWREPS
REPADMIN /SHOWREPL
REPADMIN /FAILCACHE
Sample output from REPADMIN /SHOWREPS depicting inbound replication from LonEMEADC to LonContosoDC failing with The
remote system is not available error is shown below:
3. NTDS KCC, NTDS Replication, or ActiveDirectory_DomainService events with the 1256 status are logged in the directory service
event log.
ノ Expand table
Event Source Event Event String
ID
NTDS Replication 1085 * Internal event: Active Directory Domain Services could not synchronize the following directory
ActiveDirectory_DomainService partition with the directory service at the following network address.
NTDS KCC 1308 The Knowledge Consistency Checker (KCC) has detected that successive attempts to replicate
ActiveDirectory_DomainService with the following domain controller has consistently failed. The Knowledge Consistency
Checker (KCC) has detected that successive attempts to replicate with the following directory
service has consistently failed.
7 Note
Event 1085 is only logged if the NTDS Diagnostics value 5 Replication Events has been set to a value of 1 or higher.
Cause
Replication status 1256 is logged for the following reason:
When the destination DC fails to bind to the source DC using RPC a win32 error code in the Repsfrom status for that partition -
usually Schema or Configuration since these partitions are replicated at a higher priority. After an RPC bind failure has occurred, a
cleanup routine will run to clear the destination DCs queue from that same source DC. This is done to avoid wasting time attempting
to replicate with a DC that it can't connect to. Since it hasn't attempted a sync for the partitions that have been cleared from the
queue, a status 1256 is logged. In a scenario where destination DC replicates Schema, Configuration, and several GC non-writable
partitions from the source DC, the win32 error status for the Schema and Configuration partitions that caused the RPC bind failure is
logged. The destination DC will then cancel the pending replication tasks for the remaining partitions and log win32 error 1256 for
the status.
In summary: 1256 is logged as the replication status per partition as a result of the destination DC cancelling the sync request from
the source DC due to a connectivity failure previously encountered.
Resolution
The win32 error 1256 should not be the focus of troubleshooting efforts, instead find the replication status that led to the RPC bind
failure and then follow the corresponding Troubleshooting Active Directory operations that fail with error... article.
In order to determine the actual win32 error to troubleshoot, use one of the following methods:
In the following example, win32 error 1722 is logged for the Configuration and Schema partitions and should be the focus of
troubleshooting.
ノ Expand table
B C D E F H I J K
Destination Destination DSA Naming Context Source Source DSA Number Last Last Last
DSA Site DSA of Failure Success Failure
Site Failures Time Time Status
B C D E F H I J K
3. Initiate a manual replication sync between source and destination DCs using repadmin.
Repadmin /replicate DestinationDC SourceDC <DN of partition reporting status 1256> (This will require /readonly switch for
Take note that after manually initiating replication for the partition that the status has changed from 1256 to 1722:
ノ Expand table
B C D E F H I J K
Destination Destination DSA Naming Context Source Source DSA Number Last Last Last
DSA Site DSA of Failure Success Failure
Site Failures Time Time Status
Data collection
If you need assistance from Microsoft support, we recommend you collect the information by following the steps mentioned in
Gather information by using TSS for Active Directory replication issues.
More information
The following articles contain the troubleshooting procedures for errors typically logged with win32 error 1256:
ノ Expand table
-2146893022 Active Directory replication error -2146893022: The target principal name is incorrect
1722 Active Directory replication error 1722: The RPC server is unavailable
1727 Troubleshoot domain controller replication error 1727-The remote procedure call failed and did not execute
1753 Active Directory Replication Error 1753: There are no more endpoints available from the endpoint mapper
1908 Troubleshooting Active Directory operations that fail with error 1908: Could not find the domain controller for this domain
8524 Active Directory Replication Error 8524: The DSA operation is unable to proceed because of a DNS lookup failure
8453 Active Directory replication error 8453: Replication access was denied
Feedback
Was this page helpful? Yes No
Summary
This article discusses the causes and solutions for the Active Directory replication error
8304 (0x2070): "The maximum size on an object has been exceeded".
7 Note
You can get the friendly text of the error code by running the net helpmsg 8304
command.
Symptoms
You may experience one of the following symptoms.
Symptom 1
The dcdiag command reports that the Active Directory replication test failed and
generated error 8304: "The maximum size of an object has been exceeded."
Output
Replicate Now
The following error occurred during the attempt to synchronize naming context
<active directory partition name> from domain controller <source DC> to domain
controller <destination DC>:
Symptom 3
Various repadmin.exe commands fail and generate error 8304. These commands
include, but are not limited to, the following:
repadmin /add
repadmin /replsum
repadmin /showrepl
repadmin /showrepl
repadmin /syncall
Symptom 4
Event ID 1084 is logged in the Directory Service event log of DCs that are trying to
replicate Active Directory objects inbound.
Output
Object:
CN=john\0ADEL:<GUID>,CN=Deleted Objects,<directory partition DN path>
Object GUID:
<GUID>
Source directory service:
<GUID>._msdcs.contoso.com
User Action
Restart the local computer if this condition appears to be related to low
system resources (for example, low physical or virtual memory).
Additional Data
Error value:
8304 The maximum size of an object has been exceeded.
Output
Object:
CN=<MachineName>\0ADEL:<GUID>,CN=Deleted
Objects,DC=xxxx,DC=domainname,DC=com
Object GUID:
<GUID>
Attribute:
9030d (lastKnownParent)
The current value (without changes) of the attribute on the local directory
partition will replicate to all other directory services. This will
counteract the change to the rest of the directory services. The reversal
values may be recognized as follows:
Version:
2
Time of change:
<DateTime>
Cause
Error 8304 is logged when the domain controller tries to replicate an object that exceeds
the maximum size.
The most common cause is having a non-linked attribute with a big number of values.
Because of the internal structure of the Active Directory database together with the
Active Directory database record size of 8 KB, this limit of the values is about 1200-1300
values, depending on the population of other non-linked attributes.
On the source server, when you use a tool like LDP or run the repadmin /showattr
/allvalues /extended command on the object, the output resembles the following:
Output
1> distinguishedName:<GUID=<GUID>>;CN=Allowedclients\0ADEL:<GUID>,CN=Deleted
Objects,CN=Configuration,DC=contoso,DC=com
1>msExchSmtpReceiveMaxRecipientsPerMessage: 200
1243> msExchSmtpReceiveRemoteIPRanges:10.142.241.142;…
The following are the attributes that you may encounter issue:
proxyAddresses
servicePrincipalName
userCertificate
msExchSmtpReceiveRemoteIPRanges
dnsRecord
msiFileList
msTSProperty01, msTSProperty02, …
registeredAddress
7 Note
This issue may happen for any multi-valued non-linked attribute. Attribute with
syntax linked or linked with data are not affected by this problem.
Depending on the available resources and actual local database page population, the
limit may be hit at different number of values. This is why a certain change can be taken
by some Domain Controller or LDS instances, but not on others.
This problem might also occur when a single attribute value exceeds approximately 5
MB. The AD database transaction must hold both the previous and the new value when
the attribute value is updated.
Resolution
This limit is independent of the Microsoft LDAP Server OS version. There is no
workaround for this limitation. You need to potentially revise your application and how it
uses this attribute.
The 1084 event will list the object that has exceeded the maximum size. If the object is
an alive object, identify the attribute that has too many values and remove some of the
values on the source domain controller.
If the object is a deleted object, and the Active Directory recycle bin is enabled, the best
method to correct the issue is to force the object to become a recycled object. When
the object is recycled, Active Directory removes most attributes. This typically reduces
the size of the object enough so that it can be replicated successfully. This process will
truly delete the object and make it unrecoverable from the recycle bin. If the object is a
security principal such as a user account, we recommend that you do not undelete the
object. If a sufficiently large object is undeleted, it may prevent some attributes from
being correctly set. This can cause the object to be damaged and may prevent the
object from being used or even deleted.
The following PowerShell command can be used to force the object into the recycled
state.
7 Note
The following command must be run on the DC listed in the 1084 event as the
source domain controller. The event will also list the object distinguished name.
PowerShell
For example:
PowerShell
After the object is recycled, use Active Directory Sites and Services to try to force
replication.
More information
Here are some suggestions to avoid the limit from past Microsoft issues.
When you approach a lot of domain controllers in a domain, like 1200 domain
controllers, there may be issues updating the DNS objects for the names with the
additional values. In such a domain, it is also often not desired to have this many entries
for site-less names. To avoid this limit, you can create a registry value
"DnsAvoidRegisterRecords" on the domain controllers that should not be present in
site-less names.
In Windows Server 2008, DFS introduces version 2 namespaces where each DFS link is a
separate AD object.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a resolution for Active Directory Replication Error 8451: "The replication operation encountered a
database error".
7 Note
Home users: This article is intended only for technical support agents and IT professionals. If you're looking for help
to resolve a problem, please ask the Microsoft Community .
Symptoms
This article describes the symptoms and causes of situations in which Active Directory Domain Services (AD DS) operations
fail and generate error 8451: "The replication operation encountered a database error." This article also provides a
resolution for this problem.
You might experience one of more of the following symptoms:
You see one or more on-screen error messages, logged events, or diagnostic output that identifies a database error.
Possible formats for that error include the following.
ノ Expand table
-1075 0xfffffbc JET_errOutOfLongValueID Long-value ID counter has reached maximum value (do an
offline defragmentation to reclaim free and unused
LongValueIDs).
Repadmin.exe reports that the replication attempt has failed with status 8451. Repadmin.exe commands that
commonly cite the 8451 status include but are not limited to:
Repadmin /kcc
Repadmin /rehost
Repadmin /replicate
Repadmin /replsum
Repadmin /showrepl
Repadmin /showreps
Repadmin /showutdvec
Repadmin /syncall
For detailed information about how to use Repadmin to troubleshoot replication problems, see Monitoring and
Troubleshooting Active Directory Replication Using Repadmin .
The following sample shows output from the repadmin /showreps command that indicates that inbound
replication from CONTOSO-DC2 to CONTOSO-DC1 failed and generated the "replication access was denied"
message.
Default-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID: b6dc8589-7e00-4a5d-b688-045aef63ec01
DSA invocationID: b6dc8589-7e00-4a5d-b688-045aef63ec01
==== INBOUND NEIGHBORS ======================================
DC=contoso,DC=com
Default-First-Site-Name\CONTOSO-DC2 via RPC
DSA object GUID: 74fbe06c-932c-46b5-831b-af9e31f496b2
Last attempt @ <date> <time> failed, result 8451 (0x2103):
The replication operation encountered a database error.
consecutive failure(s).
Last success @ <date> <time>.
Event Viewer lists one or more events that cite the 8451 error. The following table lists the event sources and Event
IDs of common events that cite the 8451 error (in event source + event ID order).
ノ Expand table
Event source Event ID Event message
Microsoft-Windows- 1039 with Internal event: Active Directory Domain Services could not process the following object.
ActiveDirectory_DomainService extended
error
8451
Microsoft-Windows- 1084 with Internal event: Active Directory could not update the following object with changes received
ActiveDirectory_DomainService extended from the following source domain controller. It is because an error occurred during the
error application of the changes to Active Directory on the domain controller.
8451
Microsoft-Windows- 1308 with The Knowledge Consistency Checker (KCC) has detected that successive attempt to replicate
ActiveDirectory_DomainService extended with the following directory service failed.
error
8451
Microsoft-Windows- 1699 with The local domain controller failed to retrieve the changes requested for the following
ActiveDirectory_DomainService extended directory partition. As a result, it was unable to send the change requests to the domain
error controller at the following network address.
8451
NTDS Replication 2108 with This event contains REPAIR PROCEDURES for the 1084 event that has previously been
extended logged. This message indicates a specific issue with the consistency of the Active Directory
error database on this replication destination. A database error occurred while applying replicated
8451 with changes to the following object. The database had unexpected contents, preventing the
secondary change from being made. Object:
error CN= [email protected] ,OU=marketing,OU=5thWard,OU=Houston,DC=Contoso,DC=com
value- Object GUID: 2843919c-345c-4f57-bc1a-4ed5acbcf9e2 Source domain controller: 173ee10f-
1075 4c28-4acd-a2d7-61af8d4d3010._msdcs.Contoso.com User Action If none of these actions
succeed and the replication error continues, you should demote this domain controller and
promote it again. Additional Data Primary Error value: 8451 The replication operation
encountered a database error. Secondary Error value: -1075
NTDS Replication 2108 with This event contains REPAIR PROCEDURES for the 1084 event that has previously been
extended logged. This message indicates a specific issue with the consistency of the Active Directory
error database on this replication destination. A database error occurred while applying replicated
8451 with changes to the following object. The database had unexpected contents, preventing the
secondary change from being made. Object:
error CN= [email protected] ,OU=marketing,OU=5thWard,OU=Houston,DC=Contoso,DC=com
value- Object GUID: 2843919c-345c-4f57-bc1a-4ed5acbcf9e2 Source domain controller: 173ee10f-
1526 4c28-4acd-a2d7-61af8d4d3010._msdcs.Contoso.com User Action If none of these actions
succeed and the replication error continues, you should demote this domain controller and
promote it again. Additional Data Primary Error value: 8451 The replication operation
encountered a database error. Secondary Error value: -1526
NTDS Replication 2108 with This event contains REPAIR PROCEDURES for the 1084 event that has previously been
extended logged. This message indicates a specific issue with the consistency of the Active Directory
error database on this replication destination. A database error occurred while applying replicated
8451 with changes to the following object. The database had unexpected contents, preventing the
secondary change from being made. Object:
error CN= [email protected] ,OU=marketing,OU=5thWard,OU=Houston,DC=Contoso,DC=com
value Object GUID: 2843919c-345c-4f57-bc1a-4ed5acbcf9e2 Source domain controller: 173ee10f-
-1414 4c28-4acd-a2d7-61af8d4d3010._msdcs.Contoso.com User Action If none of these actions
succeed and the replication error continues, you should demote this domain controller and
promote it again. Additional Data Primary Error value: 8451 The replication operation
encountered a database error. Secondary Error value: -1414
NTDS General 1039 with Internal event: Active Directory could not process the following object.
extended
error
8451.
NTDS KCC 1925 with The attempt to establish a replication link for the following writable directory partition failed.
extended
error
8451
Event source Event ID Event message
NTDS Replication 1084 with Internal event: Active Directory could not update the following object with changes received
extended from the following source domain controller. It is because an error occurred during the
error application of the changes to Active Directory on the domain controller.
8451
NTDS Replication 1699 with The local domain controller failed to retrieve the changes requested for the following
extended directory partition. As a result, it was unable to send the change requests to the domain
error controller at the following network address.
8451
When you increase the NTDS diagnosing logging level on the domain controller, Event Viewer lists additional events
that are related to the 8451 error. The following table lists the event sources and Event IDs of events that frequently
accompany other events that contain the 8451 error.
ノ Expand table
Internal 1481 Internal error: The operation on the object failed. Additional Data: Error value: 2 000020EF: NameErr:
Processing with DSID-032500E8, problem 2001 (NO_OBJECT), data -1601, best match of: "
error-
1601
Internal 1173 Internal event: Active Directory has encountered the following exception and associated parameters.
Processing with Exception: e0010004 Parameter: 0 Additional Data Error value: -1075 Internal ID: 205086d
error-
1075
Internal 1173 Internal event: Active Directory has encountered the following exception and associated parameters.
Processing with Exception: e0010004 Parameter: 0 Additional Data Error value: -1526 Internal ID: 205036b
error-
1526
Internal 1173 Internal event: Active Directory has encountered the following exception and associated parameters.
Processing with Exception: e0010004 Parameter: 0 Additional Data Error value: -1603 Internal ID: 2050344
error-
1603
NTDS ISAM 474 The database page read from the file 'E:\NTDS\Data\ntds.dit' at offset 3846455296 (0x00000000e5444000)
with for 8192 (0x00002000) bytes failed verification due to a page checksum mismatch. The expected
error- checksum was 323677604 (0x134aeda4) and the actual checksum was 2081515684 (0x7c1168a4). The read
1018 operation will fail with error -1018 (0xfffffc06). If this condition persists, restore the database from a
previous backup. This problem is likely due to faulty hardware. Contact your hardware vendor for further
assistance diagnosing the problem.
NTDS ISAM 488 NTDS (396) NTDSA: Data inconsistency detected in table datatable of database
C:\WINDOWS\NTDS\ntds.dit (4621,7905).
When you run the Dcdiag.exe utility, it produces output that resembles as:
* Replications Check
[Replications Check,<DC Name>] A recent replication attempt failed:
From <source DC> to <destination DC>
Naming Context: <DN path of failing naming context>
The replication generated an error (8451):
The replication operation encountered a database error
In Active Directory Sites and Services, when you right-click the connection object of a source DC and select Replicate
now, the command fails and generates a message that resembles as:
The following error occurred during the attempt to synchronize naming context <%directory partition name%>
from Domain Controller <Source DC> to Domain Controller <Destination DC>:
"The replication operation encountered a database error."
The operation will not continue.
C:>err 8451
for decimal 8451 / hex 0x2103 :
ERROR_DS_DRA_DB_ERROR winerror.h
The replication operation encountered a database error.
2 matches found for "8451"
C:>err -1414
for decimal -1414 / hex 0xfffffa7a :
JET_errSecondaryIndexCorrupted esent98.h
/Secondary index is corrupt. The database must be defragmented/
1 matches found for "-1414"
C:>err -1526
for decimal -1526 / hex 0xfffffa0a :
JET_errLVCorrupted esent98.h
/Corruption encountered in long-value tree/
1 matches found for "-1526"
C:>err -1603
for decimal -1603 / hex 0xfffff9bd :
JET_errNoCurrentRecord esent98.h
/Currency not on a record/
1 matches found for "-1603"
C:>err -1075
for decimal -1075 / hex 0xfffffbcd :
JET_errOutOfLongValueIDs esent98.h
/Long-value ID counter has reached maximum value. (perform offline defrag to reclaim free/unused
LongValueIDs)/
1 matches found for "-1075"
C:>err -1601
for decimal -1601 / hex 0xfffff9bf :
JET_errRecordNotFound esent98.h
/The key was not found/
1 matches found for "-1601"
C:>err -1047
for decimal -1047 / hex 0xfffffbe9 :
JET_errInvalidBufferSize esent98.h
/Data buffer doesn't match column size/
1 matches found for "-1047"
C:>err -1018
for decimal -1018 / hex 0xfffffc06 :
JET_errReadVerifyFailure ese.h
/Checksum error on a database page/
JET_errReadVerifyFailure esent98.h
/* Checksum error on a database page */
2 matches found for "-1018"
C:>err -1206
for decimal -1206 / hex 0xfffffb4a :
JET_errDatabaseCorrupted esent98.h
/Non database file or corrupted db/
1 matches found for "-1206"
Cause
The status 8451: "The replication operation encountered a database error" has multiple root causes, including the
following ones:
The Active Directory database or Active Directory database index might be corrupted. It may be caused by the
following reasons:
Failing hardware:
Disk
Controller
Controller cache
Outdated drivers:
Controller
Outdated firmware:
Computer BIOS
Controller
Disk
Sudden power loss.
Lingering objects.
The long-value ID counter has reached its maximum value:
The ESE column types JET_coltypLongText and JET_coltypLongBinary are called long value column types. These
columns are large string and large binary objects that may be stored in separate B+ trees away from the
primary index. When long values are stored separately from the primary record, they are internally keyed on a
long value ID (LID).
Invalid security descriptor in the msExchSecurityDescriptor attribute.
Resolution
) Important
Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before
you modify it, back up the registry for restoration in case problems occur.
If offline defragmentation does not correct the issue, demote and then repromote the affected domain controller. For
information about how to do it, see Demoting Domain Controllers and Domains.
1. Enable NTDS diagnostic logging for Replication Events and Internal Processing at a level of 5.
To increase NTDS diagnostic logging, change the following REG_DWORD values in the registry of the destination
domain controller under the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics
Replication Events
Internal Processing
7 Note
Level-5 logging is extremely verbose. The values of both keys should be restored to the default of 0 after the
problem is resolved. Filtering the Directory Services event log should be done to isolate and identify these
events.
For more information about the standard terminology that is used to describe Microsoft software updates, see the
following Knowledge Base article:
2. Review the event logs for the new events that were generated from the increased logging for error values that will
give a definitive view of the original 8451 error. For example, an Internal Processing Event ID 1173 that has an error
value of -1526 would indicate that we have a corruption in long-value tree.
3. Based on the additional information from the increased logging, refer to the following table for a potential resolution.
ノ Expand table
-1018 0xfffffc06 JET_errReadVerifyFailure Checksum error on a Check hardware, firmware, and drivers.
database page Restore from backup.Demote/promote.
-1047 0xfffffbe9 JET_errInvalidBufferSize Data buffer doesn't match 832851 Inbound Replication Fails on
column size Domain Controllers with Event ID: 1699,
Error 8451 or jet error -1601 Note: This
hotfix is no longer available.
-1601 0xfffff9bf JET_errRecordNotFound The key was not found Check hardware, firmware, and
drivers.Run the Esentutl /k command.
Run the Ntdsutil file integrity and SDA
commands, and then do offline
defragmentation.Otherwise restore from
backup or demote and promote.
-1603 0xfffff9bd JET_errNoCurrentRecord Currency not on a record Check hardware, firmware, and
drivers.Run the Esentutl / k command.
Run the Ntdsutil file integrity and SDA
commands, and then do offline
defragmentation.Otherwise restore from
backup or demote and promote.
8451 0x2103 ERROR_DS_DRA_DB_ERROR The replication operation Check hardware, firmware, and
encountered a database drivers.Run the Esentutl /k command.
error Run the Ntdsutil file integrity and SDA
commands, and then do offline
defragmentation. Otherwise restore from
backup or demote/promote.
4. If all these methods fail, restore the domain controller from a backup, or demote it and then repromote.
More information
Verify the vertical jet database stack from the bottom up (proceeding up to the next layer only after the underlying layer is
graded as "good"), the same as you do for TCP.
ノ Expand table
(2) Extensible Storage Engine (ESE) logical Ntdsutil, files, integrity Esentutl /g
consistency
(3) Application logical consistency Ntdsutil, semantic database analysis + Ntdsutil, no equivalent for SDA +
compact Esentutl /d
Data collection
If you need assistance from Microsoft support, we recommend you collect the information by following the steps
mentioned in Gather information by using TSS for Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article helps to resolve the issue where you get Event ID 1925 with the error
message that DNS lookup failed, inbound replication of a directory partition has failed
on the destination domain controller.
This problem typically occurs when an attempt to establish a replication link fails as a
result of a Domain Name System (DNS) lookup problem. If you receive Event ID 1925
with the error message that DNS lookup failed, inbound replication of a directory
partition has failed on the destination domain controller, and you must fix the DNS
problem.
Directory partition:
CN=Configuration,DC=contoso,DC=com
Source directory service: CN=NTDS Settings,CN=DC1,CN=Servers,CN=Default-First-
Site-Name, CN=Sites,CN=Configuration,DC=contoso,DC=com
Source domain controller address:
f8786828-ecf5-4b7d-ad12-8ab60178f7cd._msdcs.contoso.com
Intersite transport (if any): CN=IP,CN=Inter-Site Transports,
CN=Sites,CN=Configuration,DC=constoso,DC=com
This domain controller will be unable to replicate with the source domain controller
until this problem is corrected.
User Action
Verify if the source domain controller is accessible or network connectivity is
available.
Additional Data
Error value:
8524 The DSA operation is unable to proceed because of a DNS lookup failure.
Resolution
Proceed with DNS testing as described in "Active Directory Replication Event ID 2087:
DNS lookup failure caused replication to fail ."
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article helps you troubleshoot Active Directory replication Event ID 2042.
Symptoms
If a domain controller has not replicated with its partner for longer than a tombstone
lifetime, it is possible that a lingering object problem exists on one or both domain
controllers. The tombstone lifetime in an Active Directory forest determines how long a
deleted object (called a "tombstone") is retained in Active Directory Domain Services
(AD DS). The tombstone lifetime is determined by the value of the tombstoneLifetime
attribute on the Directory Service object in the configuration directory partition.
When the condition that causes Event ID 2042 to be logged occurs, inbound replication
with the source partner is stopped on the destination domain controller and Event ID
2042 is logged in the Directory Service event log. The event identifies the source domain
controller and the appropriate steps to take to either remove the outdated domain
controller or remove lingering objects and restore replication from the source domain
controller.
User Action:
Determine which of the two machines was disconnected from the forest and is now
out of date. You have three options:
The repadmin /showrepl command also reports error 8416, as shown in the following
example:
Source: Default-First-Site-Name\DC1
******* <number> CONSECUTIVE FAILURES since <date> <time>
Last error: 8614 (0x21a6):
The Active Directory Domain Services cannot replicate with this server because the
time since the last replication with this server has exceeded the tombstone lifetime.
Cause
There are a few potential causes for the logging of Event ID 2042, which include the
following:
Resolution
The resolution of this issue depends on the actual cause or causes of the issue. To
resolve this issue, check for each of the following conditions:
1. Determine whether there are any Windows Server 2003 domain controllers that do
not have at least SP1 applied. If you find any such domain controllers, ensure that
you update them to at least SP1 to resolve this issue.
2. Determine whether there are any replication failures that have been allowed to
exceed the tombstone lifetime of the forest. Typically, the tombstone lifetime of
the forest is 60 to 180 days by default. The event message indicates the tombstone
lifetime of the forest as it is currently configured.
3. Determine whether there are lingering objects. You can do this by running the
command repadmin /removelingeringobjects in advisory mode, as described in the
following procedure.
You must first identify an authoritative domain controller. If you know that a specific
domain controller has the latest changes, you can use that domain controller as the
authoritative domain controller. Otherwise, you may have to complete the following
procedure on multiple domain controllers until you identify a domain controller that you
believe has the latest changes. Then, you can use that domain controller as your
authoritative domain controller.
Membership in Domain Admins, or equivalent, is the minimum required to complete
this procedure. Review details about default group memberships at Active Directory
Local and Domain Default Groups.
2. Run the following repadmin command in advisory mode. This makes it possible for
you to assess the lingering objects without actually removing anything.
Console
Substitute the following items for the placeholders in the command syntax:
DestDCName: The host name of the domain controller that you are targeting
for lingering object clean-up. For example, if you want to remove lingering
objects from DC1 in the contoso.com domain, substitute dc1.contoso.com for
<DestDCName>.
Console
where AuthDCname is the host name of the domain controller that you
selected as authoritative. Substitute the first DSA object GUID that appears
for <SourceDCGUID>.
If necessary, repeat the previous steps on additional domain controllers until you
determine the domain controller that you believe has the latest changes. Use that
domain controller as your authoritative domain controller. Run the repadmin
/removelingeringobjects command without the /advisory_mode switch to actually
After you remove all lingering objects, you can restart replication on the domain
controller that logged the event by editing the registry.
7 Note
Restart replication only after you have removed all lingering objects. Incorrectly
editing the registry might severely damage your system. Before making changes to
the registry, you should back up any valued data on the computer.
Console
ノ Expand table
Parameter Description
/regkey Enables (+) and disables (-) the value for the Strict Replication
Consistency registry entry in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters .
+allowDivergent Enables replication to start again with the replication partner that had
lingering objects. You should run this command only after all the
lingering objects have been removed. After replication is running
properly again, use the -allowDivergent switch to prevent divergent
replication from occurring.
7 Note
If you did not use an asterisk character (*) to apply the change to all domain
controllers, repeat step 2 for every domain controller on which you want to allow
divergent replication.
Console
Console
7 Note
If you did not remove all the lingering objects, attempting replication might result
in replication of a lingering object. If strict replication consistency is enabled on the
destination domain controller, replication with the source domain controller will be
blocked again.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to the Active Directory replication Event ID 2087 that
occurs when a Domain Name System (DNS) lookup failure causes replication to fail.
Symptoms
This problem typically occurs when a Domain Name System (DNS) lookup failure causes
replication to fail. When a destination domain controller receives Event ID 2087 in the
Directory Service event log, attempts to resolve the globally unique identifier (GUID) in
the alias (CNAME) resource record, the fully qualified domain name (FQDN), and the
NetBIOS name to the IP address of the source domain controller have all failed. Failure
to locate the source replication partner prevents replication with that source until the
problem is fixed.
User Action:
2. Confirm that the source domain controller is running Active Directory Domain
Services and is accessible on the network by typing "net view \\<source DC
name>" or "ping <source DC name>".
3. Verify that the source domain controller is using a valid DNS server for DNS
services, and that the source domain controller's host record and CNAME
record are correctly registered, using the DNS Enhanced version of
DCDIAG.EXE available on http://www.microsoft.com/dns
dcdiag /test:dns
4. Verify that this destination domain controller is using a valid DNS server for
DNS services, by running the DNS Enhanced version of DCDIAG.EXE command
on the console of the destination domain controller, as follows:
dcdiag /test:dns
Additional Data
Error value: 11004
The requested name is valid, but no data of the requested type was found.
Diagnosis
Failure to resolve the current alias (CNAME) resource record of the source domain
controller to an IP address can have the following causes:
The source domain controller is powered off, is offline, or resides on an isolated
network, and Active Directory and DNS data for the offline domain controller has
not been deleted to indicate that the domain controller is inaccessible.
Active Directory Domain Services (AD DS) has been removed on the source
domain controller and then reinstalled with the same IP address, but knowledge of
the new NTDS Settings GUID has not reached the destination domain controller.
AD DS has been removed on the source domain controller and then reinstalled
with a different IP address, but the current host address (A) resource record for the
IP address of the source domain controller is either not registered or does not exist
on the DNS servers that the destination domain controller queries as a result of
replication latency or replication error.
The operating system of the source domain controller has been reinstalled with a
different computer name, but its metadata either has not been removed or has
been removed and not yet inbound-replicated by the destination domain
controller.
Resolution
First, Determine whether a domain controller is functioning. If the source domain
controller is not functioning, remove its remaining metadata from AD DS.
Requirements:
Membership in the Domain Users group in the domain of the domain controller,
or equivalent, is the minimum required to complete this procedure. Review details
about using the appropriate accounts and group memberships at Local and
Domain Default Groups.
Console
This command displays the Netlogon and SYSVOL shares, indicating that the server is
functioning as a domain controller. If this test shows that the domain controller is not
functioning on the network, determine the nature of the disconnection and whether the
domain controller can be recovered or whether its metadata must be removed from AD
DS manually. If the domain controller is not functioning and cannot be restored, use the
procedure in the following section, Clean up domain controller metadata, to delete the
data that is associated with that server from AD DS.
If the defunct domain controller is the last domain controller in the domain, you should
also remove the metadata for the domain. Allow sufficient time for all global catalog
servers in the forest to inbound-replicate the domain deletion before you promote a
new domain with the same name.
The process for cleaning up metadata is improved in the version of Ntdsutil that is
included with Windows Server 2003 Service Pack 1 (SP1). Instructions for cleaning up
metadata with the Windows Server 2003 version of Ntdsutil and the Windows Server
2003 SP1 version of Ntdsutil are provided in the following procedure.
Requirements:
2. At the Command Prompt, type the ntdsutil command, and then press ENTER.
3. At the ntdsutil command prompt, type the metadata cleanup command, and then
press ENTER.
7 Note
If you are removing domain metadata as well as server metadata, skip the
following procedure and use the procedure that begins at step 1.
If you are performing server metadata cleanup only and you are using the
version of Ntdsutil.exe that is included with Windows Server 2003 SP1, at the
metadata cleanup: command prompt, type the following command, and then
press ENTER:
Console
Or
Console
Parameter Description
<ServerName2> The DNS name of the domain controller to which you want to
connect and from which you want to remove server metadata.
i. At the select operation target: prompt, type the list servers in site
command, and then press ENTER.
j. A numbered list of servers in a domain and site is displayed. Type the
select server <ServerNumber> command, and then press ENTER.
k. At the select operation target: prompt, type the quit command, and
then press ENTER.
l. At the metadata cleanup: prompt, type the remove selected server
command, and then press ENTER.
m. If the server whose metadata you have removed is the last domain
controller in the domain and you want to remove the domain metadata, at
the metadata cleanup: prompt, type the remove selected domain
command, and then press ENTER. Metadata for the domain that you
selected in step h is removed.
n. At the metadata cleanup: and ntdsutil: prompts, type quit , and then
press ENTER.
ノ Expand table
Parameter Description
<Server> The DNS name of a domain controller that you want to connect
to.
<SiteNumber> The number that is associated with the site of the server that
you want to clean up, which appears in the list.
<DomainNumber> The number that is associated with the domain of the server
that you want to clean up, which appears in the list.
<ServerNumber> The number that is associated with the server that you want to
clean up, which appears in the list.
Before you begin these procedures, gather the following information, which is contained
in the Event ID 2087 message text:
The FQDN of the source domain controller and destination domain controller
The IP address of the source domain controller
The updated version of Dcdiag that is included in Windows Support Tools in Windows
Server 2003 SP1 contains tests that provide consolidated and improved testing of basic
and advanced DNS features. You can use this tool to diagnose basic DNS functionality
and dynamic updates.
When you use the enhanced SP1 version of Dcdiag for DNS testing, there are specific
requirements that do not apply to all Dcdiag tests.
Requirements:
You can run the enhanced version of Dcdiag on computers running the
following operating systems:
Windows XP Professional
Windows Server 2003
Windows Server 2003 with SP1
You can run the new Dcdiag DNS tests against Microsoft DNS servers that are
installed on domain controllers running the following operating systems:
Windows 2000 Server with Service Pack 3 (SP3)
Windows 2000 Server with Service Pack 4 (SP4)
Windows Server 2003
Windows Server 2003 with SP1
7 Note
You can use the /f: switch in Dcdiag commands to save the output to a text file.
Use /f: FileName to generate the file in the location that is indicated in FileName,
for example, /f:c:\Test\DnsTest.txt .
To verify the settings that might interfere with Active Directory replication, you can
begin by running the basic DNS test that ensures that DNS is operating properly on the
domain controller.
Essential services: The test confirms that the following services are running and
available on the tested domain controller:
DNS Client service
Net Logon service
Key Distribution Center (KDC) service
DNS Server service (if DNS is installed on the domain controller)
DNS client configuration: The test confirms that DNS servers on all adapters are
reachable.
Resource record registrations: The test confirms that the host (A) resource record
of each domain controller is registered on at least one of the DNS servers that is
configured on the client.
Zone and start of authority (SOA): If the domain controller is running the DNS
Server service, the test confirms that the Active Directory domain zone and start of
authority (SOA) resource record for the Active Directory domain zone are present.
1. At a command prompt, type the following command, and then press ENTER:
Console
As an alternative, you can test all domain controllers in the forest by typing /e:
instead of /s: .
3. Scroll to the Summary table near the bottom of the Dcdiag log file.
4. Note the names of all domain controllers that report "Warn" or "Fail" status in the
Summary table.
5. Find the detailed breakout section for the problem domain controller by searching
for the string "DC: <DomainControllerName>".
6. Make the required configuration changes on DNS clients and DNS servers.
7. To validate the configuration changes, rerun Dcdiag /test:DNS with the /e: or /s:
switch.
If the basic DNS test shows no errors, continue by verifying that resource records that
are used to locate domain controllers are registered in DNS.
The destination domain controller uses the DNS alias (CNAME) resource record to locate
its source domain controller replication partner. Although domain controllers running
Windows Server 2003 with SP1 can locate source replication partners by using FQDNs-
or, if that fails, NetBIOS names-the presence of the alias (CNAME) resource record is
expected and should be verified for proper DNS functioning.
You can use Dcdiag to verify registration of all resource records that are essential for
domain controller location by using the dcdiag /test:dns /DnsRecordRegistration test.
This test verifies registration of the following resource records in DNS:
The alias (CNAME) (the GUID-based resource record that locates a replication
partner)
The host (A) (the host resource record that contains the IP address of the domain
controller)
LDAP SRV (the service (SRV) resource records that locate LDAP servers)
GC SRV (the service (SRV) resource records that locate global catalog servers)
PDC SRV (the service (SRV) resource records that locate primary domain controller
(PDC) emulator operations masters)
As an alternative, you can use the following procedure to check for only the alias
(CNAME) resource record.
1. In the DNS snap-in, locate any domain controller that is running the DNS Server
service, where the server hosts the DNS zone with the same name as the Active
Directory domain of the domain controller.
3. In the details pane, verify that the following resource records are present:
If the alias (CNAME) resource record is not registered, verify that dynamic updates are
functioning properly. Use the test in the following section.
To verify dynamic updates, at a command prompt, type the following command, and
then press ENTER:
Console
As an alternative, you can test all domain controllers by using the /e: switch instead of
the /s: switch.
If secure dynamic update is not configured, use the following procedure to configure it.
Requirements:
Membership in the Domain Admins group in the forest root domain or the
Enterprise Admins group, or equivalent, is the minimum required to complete this
procedure.
Tools: net stop / net start , ipconfig
Console
Console
ipconfig /flushdns
ipconfig /registerdns
Wait 15 minutes, and then review events in Event Viewer to ensure proper registration of
the resource records.
Repeat the procedure in the Verify resource record registration section earlier in this
section to verify that the resource records appear in DNS.
Requirements:
If replication does not succeed, use the procedure in the following section to verify
consistency of the NTDS Settings GUID.
Requirements:
Membership in the Domain Admins group in the domain of the destination
domain controller, or equivalent, is the minimum required to complete this
procedure.
Tool: Ldp.exe (Windows Support Tools)
1. Click Start, click Run, type Ldp, and then click OK.
2. On the Connection menu, click Connect.
3. In the Connect dialog box, leave the Server box empty.
4. In Port, type 389, and then click OK.
5. On the Connection menu, click Bind.
6. In the Bind dialog box, provide Enterprise Admins credentials. If it is not already
selected, click Domain.
7. In Domain, type the name of the forest root domain, and then click OK.
8. On the View menu, click Tree.
9. In the Tree View dialog box, type CN=Configuration,DC=Forest_Root_Domain and
then click OK.
10. Navigate to the object CN=NTDS
Settings,CN=SourceServerName,CN=Servers,CN=SiteName,
CN=Sites,CN=configuration,DC=ForestRootDomain.
11. Double-click the NTDS Settings object. In the details pane, view the value for the
attribute objectGUID. Right-click that value, and then copy it to Notepad.
12. On the Connection menu, click Disconnect.
13. Repeat steps 2 through 11, but in step 3, type the name of the source domain
controller, for example, DC03.
14. In Notepad, compare the values of the two GUIDs.
15. If the values do not match, the destination domain controller must receive
replication of the valid GUID. Check the GUID value on other domain controllers
and attempt replication on the destination domain controller with a different
domain controller that has the correct GUID.
16. If the values match, verify that the GUID matches the GUID in the
Dsa_Guid._msdcs.Dns_Domain_Nameresource record for the source domain
controller, as follows:
a. Note the primary DNS servers that each domain controller identifies in the
TCP/IP properties in their Network Settings. All the DNS servers that are listed in
the respective TCP/IP properties should be able to indirectly or directly resolve
this alias (CNAME) resource record.
b. From the servers that are listed, identify the authoritative name server or servers
for this domain zone by looking at the server names that are listed for the name
server (NS) resource records at the root of the zone. (In the DNS snap-in, select
the forward lookup zone for the root domain, and then view the name server
(NS) records in the details pane.)
c. On the name server or servers obtained in step b, open the DNS snap-in, and
double-click the forward lookup zone for the forest root domain name. Double-
click the _msdcs folder, and note the alias (CNAME) resource records that exist
for your server name.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where you get event IDs 2108 and 1084 when
inbound replication of the Active Directory Domain Services (AD DS) occurs.
Symptoms
When inbound replication of the Active Directory Domain Services (AD DS) occurs, a
destination domain controller that is running Microsoft Windows Server 2003 Service
Pack 1 (SP1) through Windows Server 2016 logs the following event in the Directory
Service log:
Event ID 1084: Internal event: Active Directory Domain Services could not update
the following object with changes received from the following source directory
service. This is because an error occurred during the application of the changes to
Active Directory Domain Services on the directory service.
Synchronization of the directory service with the source directory service is blocked
until this update problem is corrected.
User Action:
Restart the local computer if this condition appears to be related to low system
resources (for example, low physical or virtual memory).
Additional Data:
Error value: <error code> <error string>
7 Note
In the Error value text, <error code> and <error string> represent the actual
values that are shown in the log entry.
Event 1804 has been logged since Windows 2000 Server.
Destination domain controllers that are running Windows Server 2003 SP1 also log the
following event in the Directory Service log:
Event ID 2108: This event contains REPAIR PROCEDURES for the 1084 event which
has previously been logged. This message indicates a specific issue with the
consistency of the Active Directory Domain Services database on this replication
destination. A database error occurred while applying replicated changes to the
following object. The database had unexpected contents, preventing the change
from being made.
7 Note
Cause
These events occur when the domain controller cannot write a transactional change to
the local copy of the Active Directory database.
Resolution
To resolve this problem, follow these steps. Retry the replication operation after each
step that makes a change.
1. Make sure that sufficient free disk space is available on the volumes that host the
Active Directory database, and then retry the operation. Follow these steps to free
additional disk space:
2. Make sure that the physical drives that host the Ntds.dit file and the transaction
log files do not have NTFS file system compression turned on. To confirm this,
right-click the drive letter in My Computer, and then make sure that the Compress
drive to save disk space check box is not selected.
3. Make sure that the physical drives that host the Ntds.dit file and the transaction
log files are specifically excluded from remote and local antivirus programs. See
your antivirus software documentation for more information.
4. If the destination domain controller contains the global catalog, and the error
occurs in one of the read-only partitions, use one of the following methods to help
resolve the problem:
Method 1: Use the rehost option of the Repadmin.exe tool to rehost the
affected partition.
Console
If the error occurs in a program partition, use the Ntdsutil.exe tool to change
the replica that hosts the program partition.
6. Determine whether the problem is related to the parent of the Active Directory
object on the destination domain controller. To do this, follow these steps:
a. On the source domain controller, temporarily move the object that is referenced
in Event 1084 to an organizational unit (OU) container. The OU must be
unrelated to the current container. For example, move the object to a new
container off the root of the domain.
b. If replication is completed after you move the object, move the object back to
its original container.
i. Make sure that the Windows Server 2003 Support Tools are installed. The
Support Tools are available on the Windows Server 2003 CD-ROM in the
Support\Tools folder. Double-click the Suptools.msi file to install the tools.
ii. Click Start, click Run, type ldp, and then click OK.
iii. Click Connection, click Connect, and then type the name of the server that
you want to connect to.
7 Note
iv. Click Connection, click Bind, and then type your administrative user name,
password, and domain. (You must use domain administrator or enterprise
administrator credentials.) Click OK.
v. On the Browse menu, click Modify. Leave the DN text box blank. In the
Attribute text box, type FixUpInheritance. Click Yes in the Value text box.
7 Note
7 Note
The right pane now shows a Modified status, and the security descriptor
propagator starts. The runtime for the security descriptor propagator
depends on the size of the Active Directory database. The process is
complete when the DS Security Propagation Events counter in the
NTDS Performance object returns to zero.
metadata for the distinguished name path that is referenced in Event 1084. Repeat
this step on the destination domain controller. Look for inconsistent values that
include, but are not limited to, the following:
Incorrect values may indicate a problem with the database page that hosts the
object.
To use the Repadmin.exe tool when the distinguished name path refers to a live
object, type the following at a command prompt:
Console
Console
For example, if Event 1084 and Event 2108 reference an object where the GUID is
b49cd496-98a2-4500-bb08-58550c2f79ac, type repadmin /showmeta "
<GUID=b49cd496-98a2-4500-bb08-58550c2f79ac>" .
7 Note
8. Obtain the most recent Ntdsutil.exe tool by installing the latest service pack for
your operating system. Use the Ntdsutil.exe tool to perform an integrity check of
the Active Directory database on the source domain controller.
Before you start the computer in Directory Services Restore Mode, obtain the
password for the offline administrator account. If you do not know the
administrator account password, reset the Directory Services Restore Mode
password before you start in this mode. On domain controllers that are running
Windows 2000 Service Pack 2 (SP2) and later, use the Setpwd.exe command. The
Setpwd.exe command is located in the %Systemroot%\System32 folder. On
Windows Server 2003-based domain controllers, use the Ntdsutil Set Directory
Services Restore Mode Password command.
For more information about Directory Services Restore Mode, see "Directory
Services cannot start" error message when you start your Windows-based or SBS-
based domain controller .
For more information about how to change the password in Windows Server 2003,
see "Directory Services cannot start" error message when you start your Windows-
based or SBS-based domain controller .
9. Restart the source domain controller, and then press F8 to start Directory Services
Restore Mode. At the command prompt, type ntdsutil files integrity , and then
press Enter.
7 Note
If the Ntdsutil tool reports that the database is corrupted, and you have
replicas of the naming contexts on the source domain controller, force a
demotion of the source domain controller, and then re-promote it after you
verify the integrity of the drivers, the firmware, and the physical drives that
host the Active Directory database and the transaction log files.
If the database is still corrupted, restore the most recent system state backup,
and then, at a command prompt, type:
Console
Use the NTDSutil.exe tool confirm the integrity of the database again. If the
database passes the integrity check, perform an offline defragmentation of
the disk partition. For more information, see How to perform offline
defragmentation of the Active Directory database .
Console
esentutl.exe /g database_name
Finally, use the Start Windows Normally option to restart the computer, and
then retry replication from the source domain controller to the affected
destination domain controller. If the database fails the integrity check, the
domain controller must be discontinued. You use the Active Directory
Migration Tool (ADMT) to migrate objects. You can also use the Ldifde.exe
and Csvde.exe tools to export objects that you will import to a new
destination domain controller.
For more information about how to use the Ldifde.exe and Csvde.exe tools,
see Step-by-Step Guide to Bulk Import and Export to Active Directory.
10. If these steps do not succeed, and the replication error continues, demote the
domain controller, confirm the integrity of the physical drives and the volumes that
host the Ntds.dit file and the disk subsystem, and then promote the domain
controller again. Use the same computer name.
11. Use the ntdsutil files compact command to perform an offline defragmentation of
the Active Directory database. For more information, see Performing offline
defragmentation of the Active Directory Database .
12. At the command prompt, type the following command, and then press Enter:
Console
7 Note
The quotation marks in this example are required to run the semantic
database analysis command by using a single command line argument.
If errors are reported, type ntdsutil go fixup , and then press Enter.
7 Note
The third-party products that this article discusses are manufactured by companies
that are independent of Microsoft. Microsoft makes no warranty, implied or
otherwise, about the performance or reliability of these products.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article helps you troubleshoot Active Directory replication Event ID 1388 and 1988.
Summary
If a destination domain controller logs Event ID 1388 or Event ID 1988, a lingering object
has been detected and one of two conditions exists on the destination domain
controller:
Event ID 1388: Inbound replication of the lingering object has occurred on the
destination domain controller.
Event ID 1988: Inbound replication of the directory partition of the lingering object
has been blocked on the destination domain controller.
Event ID 1388
This event indicates that a destination domain controller that does not have strict
replication consistency enabled received a request to update an object that does not
reside in the local copy of the Active Directory database. In response, the destination
domain controller requested the full object from the source replication partner. In this
way, a lingering object was replicated to the destination domain controller. Therefore,
the lingering object was reintroduced into the directory.
) Important
When Event ID 1388 occurs, if either the source domain controller (the replication
partner that is outbound-replicating the lingering object) or the destination domain
controller (the inbound replication partner that reports Event ID 1388) is running
Windows 2000 Server, you cannot use the Repadmin tool to remove lingering
objects. For information about how to remove lingering objects in this case, see
Lingering objects may remain after you bring an out-of-date global catalog
server back online. The procedures and information in this article apply to the
removal of lingering objects from global catalog servers as well as from domain
controllers that are not global catalog servers.
The event text identifies the source domain controller and the outdated (lingering)
object. The following is an example of the event text:
Registry Key:
HKLM\System\CurrentControlSet\Services\NTDS\Parameters\Strict Replication
Consistency
Event ID 1988
This event indicates that a destination domain controller that has strict replication
consistency enabled has received a request to update an object that does not exist in its
local copy of the Active Directory database. In response, the destination domain
controller blocked replication of the directory partition containing that object from that
source domain controller. The event text identifies the source domain controller and the
outdated (lingering) object. The following is an example of the event text:
This event is being logged because the source DC contains a lingering object which
does not exist on the local DCs Active Directory Domain Services database. This
replication attempt has been blocked.
The best solution to this problem is to identify and remove all lingering objects in
the forest.
Diagnosis
An object that has been permanently deleted from AD DS (that is, its tombstone has
been garbage-collected on all connected domain controllers) remains on a
disconnected domain controller. The domain controller failed to receive direct or
transitive replication of the object deletion because it was disconnected (it is offline or
experiencing an inbound replication failure) from the replication topology for a period
that exceeded a tombstone lifetime. The domain controller is now reconnected to the
topology and that object has been updated on the domain controller, causing a
replication notification to the replication partner that an update is ready for replication.
The replication partner responded according to its replication consistency setting. This
notification applies to attempted replication of a writable object. A copy of the writable
lingering object might also exist on a global catalog server.
Resolution
If replication of a lingering object is detected, you can remove the object from AD DS,
along with any read-only replicas of the object, by identifying the domain controllers
that might store this object (including global catalog servers) and running a repadmin
command to remove lingering objects on these servers ( repadmin
/removelingeringobjects ). This command is available on domain controllers that are
running Windows Server 2008. It is also available on domain controllers that are not
running Windows Server 2008 but are running the version of Repadmin.exe that is
included with Windows Support Tools in Windows Server 2003.
Requirements:
Console
ノ Expand table
Parameter Description
/showrepl Displays the replication status, including when the domain controller that
is specified by <ServerName> last attempted inbound replication of
Active Directory partitions. Also displays the GUID of the specified domain
controller.
<ServerName> The name of the domain controller whose GUID you want to display.
2. In the first section of the output, locate the objectGuid entry. Select and copy the
GUID value into a text file so that you can use it elsewhere.
Requirements:
Membership in Domain Admins in the domain of the domain controller that has
lingering objects, or Enterprise Admins if the directory partition that has lingering
objects is the configuration or schema directory partition, is the minimum required
to complete this procedure. Review details about using the appropriate accounts
and group memberships at Local and Domain Default Groups.
Operating system: Windows Server 2003 or Windows Server 2008 for
<ServerName> and <ServerGUID>
Tool: Repadmin.exe
2. At the command prompt, type the following command, and then press ENTER:
Console
ノ Expand table
Parameter Description
<ServerName> The name of the domain controller that has lingering objects, as
identified in the event message (Event ID 1388 or Event ID
1988). You can use the Domain Name System (DNS) name or
the distinguished name, for example, the distinguished name
CN=DC5,OU=Domain Controllers,DC=contoso,DC=com or the
DNS name DC5.contoso.com .
/advisory_mode Logs the lingering objects that will be removed so that you can
review them, but does not remove them.
4. Repeat steps 2 and 3 for every domain controller that might have lingering objects.
7 Note
The <ServerName> parameter uses the DC_LIST syntax for repadmin, which allows
the use of * for all domain controllers in the forest and gc: for all global catalog
servers in the forest. To see the DC_LIST syntax, type repadmin /listhelp . For
information about the syntax of the /regkey and /removelingeringobjects
parameters, type repadmin /experthelp .
On domain controllers running Windows Server 2003 without SP1 or running any
version of Windows 2000 Server, you must edit the registry to enable the setting.
Use this procedure to remove lingering objects on a domain controller that is running
Windows Server 2003 with SP1, Windows Server 2003 with SP2, Windows Server 2003
R2, or Windows Server 2008.
Membership in Domain Admins, or equivalent, is the minimum required to complete
this procedure on a single domain controller. Membership in Enterprise Admins, or
equivalent, is the minimum required to complete this procedure on all domain
controllers in the forest. Review details about using the appropriate accounts and group
memberships at Local and Domain Default Groups.
2. At the command prompt, type the following command, and then press ENTER:
Console
ノ Expand table
Parameter Description
/regkey Enables (+) and disables (-) the value for the Strict Replication Consistency
registry entry in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters .
<DC_LIST> The name of a single domain controller, or * to apply the change to all
domain controllers in the forest. For the domain controller name, you can use
the DNS name, the distinguished name of the domain controller computer
object, or the distinguished name of the domain controller server object, for
example, the distinguished name CN=DC5,OU=Domain
Controllers,DC=contoso,DC=com or the DNS name DC5.contoso.com .
3. If you do not use * to apply the change to all domain controllers, repeat step 2 for
every domain controller on which you want to enable strict replication consistency.
7 Note
For more naming options and information about the syntax of the <DC_LIST>
parameter, at the command prompt type repadmin /listhelp . For information
about the syntax of the /regkey and /removelingeringobjects parameters, type
repadmin /experthelp .
The values for the Strict Replication Consistency registry entry are as follows:
Value: 1 (0 to disable)
Default: 1 (enabled) in a new Windows Server 2003 or Windows Server 2008 forest;
otherwise 0.
Data type: REG_DWORD
Requirements:
7 Note
It is recommended that you do not directly edit the registry unless there is no other
alternative. Modifications to the registry are not validated by the registry editor or
by Windows before they are applied, and as a result, incorrect values can be stored.
This can result in unrecoverable errors in the system. When possible, use Group
Policy or other Windows tools, such as Microsoft Management Console (MMC), to
accomplish tasks rather than editing the registry directly. If you must edit the
registry, use extreme caution.
1. Open Regedit as an administrator: Click Start and then, in Start Search, type
regedit. At the top of the Start menu, right-click regedit.exe, and then click Run as
administrator. In the User Account Control dialog box, provide Domain Admins
credentials, and then click OK.
The object that you create is an operational GUID with the following name:
CN=94fdebc6-8eeb-4640-80de-
ec52b9ca17fa,CN=Operations,CN=ForestUpdates,CN=Configuration,DC=
<ForestRootDomain>
You can use the following procedure on any domain controller in the forest to add this
object to the configuration directory partition.
4. At the command prompt, type the following command, and then press ENTER:
Console
ldifde -i -f <Path>\<FileName>
ノ Expand table
Parameter Description
-i Specifies the import mode. If the import mode is not specified, the
default mode is export.
<Path>\ The path and name of the import file that you created in step 1, for
<FileName> example, C:\ldifde.txt.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes an issue where Active Directory Replications fail with Win32 error
1127: "While accessing the hard disk, a disk operation failed even after retries."
Symptoms
This article describes symptoms, cause, and resolution steps for cases where AD
operations fail with Win32 error 1127: "While accessing the hard disk, a disk operation
failed even after retries."
1. The DCPROMO promotion of a new domain controller fails with error 1127: While
accessing the hard disk, a disk operation failed even after retries
3. REPADMIN.EXE reports that the last replication attempt has failed with status 1127
REPADMIN commands that commonly cite the 1127 status include but aren't
limited to:
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
4. The "replicate now" command in Active Directory Sites and Services (DSSITE.MSC)
fails with the on-screen error "While accessing the hard disk, a disk operation failed
even after retries"
5. Events in the Directory Services event log cite the error status 1127
Events that commonly cite the 1127 status include but aren't limited to:
ノ Expand table
NTDS KCC The attempt to establish a replication link to a read-only directory partition
1926 with the following parameters failed
NTDS Internal event: Active Directory could not update the following object with
Replication changes received from the following source domain controller. This is
1084 because an error occurred during the application of the changes to Active
Directory on the domain controller.
NTDS The local domain controller failed to retrieve the changes requested for the
Replication following directory partition. As a result, it was unable to send the change
1699 requests to the domain controller at the following network address.
NTDS This event contains REPAIR PROCEDURES for the 1084 event that has
Replication previously been logged. This message indicates a specific issue with the
2108 consistency of the Active Directory database on this replication destination.
A database error occurred while applying replicated changes to the
following object. The database had unexpected contents, preventing the
change from being made.
6. NTDS Replication event 2108 may be logged in the Directory Services Event log
citing the object, source DC, and jet error that is triggering the logging of the 1127
status in on-screen errors, logged events, and diagnostic tool output.
Jet errors known to appear in NTDS Replication event 2108 with status 1127
include but aren't limited to:
ノ Expand table
ノ Expand table
NTDS The database page read from the file <drive:\path\ntds.dit> at offset <decimal
ISAM offset> (<hex offset>) for <decimal page size> (<hex page size>) bytes failed
474 verification to a page checksum mismatch.... The read operation will fail with
error <decimal jet error> (<hex jet error>). ). If this condition persists then
please restore the database from a previous backup. This problem is likely due
to faulty hardware. Please contact your hardware vendor for further assistance
diagnosing the problem.
NTDS The database page read from the file <drive:\path\ntds.dit> at offset <decimal
ISAM offset> (<hex offset>) for <decimal page size> (<hex page size>) bytes failed
475 verification to a page number mismatch.... The read operation will fail with error
<decimal jet error> (<hex jet error>). ). If this condition persists then please
restore the database from a previous backup. This problem is likely due to faulty
hardware. Please contact your hardware vendor for further assistance
diagnosing the problem.
Cause
Active Directory is unable to write to the Active Directory database or log files. Root
causes include:
1. Software on the local machine is interfering with Active Directory's ability to write
changes to the Active Directory database and/ or log files
2. A defect exists in the disk subsystem including the motherboard/ driver controller,
firmware, driver, physical drives.
Resolution
1. Locate NTDS replication event 1084 events in the Directory Services Event Log
For DCs logging the 1127 status, open the Directory Service Event log and focus
on NTDS Replication event 1084.
NTDS Replication Event 1084 indicates that Active Directory could not write
updates to an object in its local copy of Active Directory.
Metadata in the Event 1084 identifies (1.) the DN path (and thus the objects host
partition) that could not be updated, (2.) the objectGUID for the object in question
and (3.) the fully qualified CNAME record of the source DC that is sending the
update
2. Locate the NTDS Replication Event 2108 logged immediately following each
NTDS Replication 1084 event and identify the jet error logged in the 2108 event.
NTDS Replication event 2108 is the "User Action" for the NTDS Replication 1084
event.
For every NTDS replication 1084 event logged, there should be a corresponding
NTDS replication 2108 event logged in the Directory Services event log that cites
(1.) the same object DN path and (2.) objectguid and (3.) source DC logged in the
preceding NTDS Replication 1084 event AND a jet error that defines / scopes the
cause and your recovery plan to resolve the error condition.
3. Execute the action plan for the Jet error logged in your NTDS Replication Event
2108:
If the Jet error logged in your NTDS replication events is listed in the table below,
execute the user action, otherwise, skip to step #4:
ノ Expand table
4. If the Jet error in the NTDS replication event is NOT in table above, validate the
vertical Jet database stack
If the 2108 event logs a jet error NOT cited in the table, use the Microsoft
Exchange Server Error Code Look-up utility to resolve the jet error to its
symbolic and friendly error string using the syntax "err <jet error>". It is critical
that you add the leading "-" prefix character when resolving jet errors using
ERR.EXE. (for example, "c:\>err -1018").
The event message text in NTDS Replication event 2108 contains a partial user
action for the NTDS Replication 1084 event.
The NTDS Replication 2108 user action is documented in the linked KB article
MSKB 837932 . If the user action for your event isn't cited in the table above,
execute a modified version of the action plan in MSKB 837932 by validating the
vertical jet database stack from the bottom up (proceeding up to the next layer
only when the underlying layer checks out "good"), just like you do with TCP.
ノ Expand table
+
+
NTDSUTIL -> Offline Defrag
ESENTUTL / D
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution for AD operations that fail
with Win32 error 8240: "There is no such object on the server."
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2680976
Symptoms
Symptom 1
Output of the Repadmin /ShowReps command:
Symptom 2
When you try to force replication in the Active Directory Sites and Services console
(dssite.msc) by using the Replicate now option, you receive the following error message:
The following error occurred during the attempt to synchronize naming context
<Naming Context> from Domain Controller <Source-DC-Name> to Domain
Controller <Destination-DC-Name>:
There is no such object on the server. This operation will not continue.
Symptom 3
When you try to remove Active Directory from a domain controller, you receive the
following error message in the Active Directory installation wizard:
Active Directory could not transfer the remaining data in directory partition
<Naming-Contentxt> to domain controller <Domain-Controller>."There is no such
object on the server."
Symptom 4
You receive NTDS General event 1126 in Directory Service on Domain Controller with
error 8240:
Additional Data
Error value:
8240 There is no such object on the server.
Internal ID:
3200ba0
Cause
Error 8240 (0x2030) means ERROR_DS_NO_SUCH_OBJECT. This indicates that the
specific object couldn't be found in directory. This error may be encountered in the
following two situations.
Situation 1: During AD replication
When a change occurs to an object in Active Directory on the source domain controller,
the source domain controller propagates this change to other domain controllers by
notifying its replication partners to retrieve this change. Destination domain controllers
pull the change from the source domain controller when they receive the change the
notification. After the change is retrieved, destination domain controllers try to transact
the change into the local database.
The destination domain controller has to look up the changed object in the local
database so that the change can be applied to that object. If the target object can't be
located for some reason, Active Directory reports error 8240.
When a change occurred to an object on the source domain controller but this
object was cleaned by the garbage-collection process
When AD replication recovers after it fails for a time that exceeds the tombstone
lifetime (TSL), deletion may not be propagated before the tombstone is cleaned
When the change-originating domain controller has Active Directory removed
before the domain controller has an opportunity to propagate the deletion to
other domain controllers that host a writable partition for that domain and the
change is replicated to global catalog
Resolution
1. Determine the problematic domain controller that has the inconsistent object. This
error means that the local domain controller finds that an inconsistent object exists
in its incoming partner (for the specific replication connection) but not local AD
database.
2. Determine whether you want to remove the objects or leave those objects as they
are, as follows:
If you want to remove the objects, you can use the Repadmin.exe command
together with the RemoveLingeringObjects switch to remove those
inconsistent objects from the source domain controller. For more
information, go to the following Microsoft TechNet website:
7 Note
If you want to keep those objects, you can create the following objects on the
destination domain controller:
Sub-Key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
Sub-Key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
Sub-Key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
7 Note
1. Check whether there's any specified global catalog in the forest. If there's not,
configure a GC.
7 Note
After you mark a domain controller as GC, it may take time for KCC to
calculate a new replication topology, build the global catalog, and GC ready
announcement. How long depends on the replication schedule, the time that
is used to replicate the required read-only NCs, and the interval of KCC actvity.
2. Check whether you can obtain a domain controller from DNS through the
command lTest.exe /DnsGetDC:<DomainName> /GC /Force. If you can't GC record
in DNS, take the following two actions:
3. Check whether you can connect to the GC over TCP 3268 through ldp.exe.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
More information
For more information, click the following article numbers to view the articles in the
Microsoft Knowledge Base:
Feedback
Was this page helpful? Yes No
This article provides a solution to an error 8409 after you restore or undelete AD objects.
Symptoms
Assume that you have a Windows Active Directory forest that has Domain Controllers in
Windows Server 2016, and the Recycle Bin optional feature is not enabled. Assume also
that you restore a deleted object through an NTDSUTIL authoritative restore operation,
or you undelete it through an LDAP command or a commercial recovery tool.
After the update replicates, the Active Directory replication fails and returns error 8409.
7 Note
The failure occurs at every replication attempt for the affected naming context for
all inbound partners. However, the failure stops occurring after several hours.
Additionally, the following events are logged in the Windows NT Directory Services
(NTDS) event log on the domain controller in Windows Server 2016:
Additional Data
Error value:
5 000020D9: SvcErr: DSID-030F2534, problem 5001 (BUSY), data 0
Log Name: Directory Service
Source: Microsoft-Windows-ActiveDirectory_DomainService
Event ID: 1084
Task Category: Replication
Description:
Internal event: Active Directory Domain Services could not update the following
object with changes received from the following source directory service. This is
because an error occurred during the application of the changes to Active Directory
Domain Services on the directory service.
Object:
CN=user,OU=users,DC=contoso,DC=com
Object GUID: GUID
Source directory service:
GUID._msdcs.contoso.com
Synchronization of the directory service with the source directory service is blocked
until this update problem is corrected.
User Action
Restart the local computer if this condition appears to be related to low system
resources (for example, low physical or virtual memory).
Additional Data
Error value:
8409 A database error has occurred.
Log Name: Directory Service
Source: Microsoft-Windows-ActiveDirectory_DomainService
Event ID: 2108
Task Category: Replication
Description:
This event contains REPAIR PROCEDURES for the 1084 event which has previously
been logged. This message indicates a specific issue with the consistency of the
Active Directory Domain Services database on this replication destination. A
database error occurred while applying replicated changes to the following object.
The database had unexpected contents, preventing the change from being made.
Object:
CN=user,OU=users,DC=contoso,DC=com
Object GUID: GUID
Source directory service:
GUID._msdcs.contoso.com
User Action
...
Additional Data
Primary Error value:
8409 A database error has occurred.
Secondary Error value:
0 The operation completed successfully.
Cause
When NTDS is started in Windows Server 2008 R2 or a later version, DS starts an internal
task to check all writable NCs for the need to assign a value of TRUE to the IsRecycled
attribute of the deleted objects.
Until this task is completed, the status of the Recycle Bin optional feature is disabled. In
this state, the replication engine does not allow undeleting or restoring of Active
Directory objects. Therefore, this does not interact with the addition of the isRecycled
attribute.
This task is completed in a few seconds if the objects already have the attribute value of
TRUE. In Windows Server 2016, the task is deferred during a startup to improve the DS
startup time, and it's rescheduled to begin six hours later. Therefore, you can't replicate
any AD object restore process for the first six hours of the DS uptime.
NTDS diagnostics logging for six Garbage Collection at level 2 would enable you to see
the "2406" event that indicates the start of the task and the "2405" event that indicates
the end of the task.
If the AD replication has the top priority, you can delete the objects again and then
restore them again later. Or, you can wait for six hours until the task is completed. If you
restart the domain controller, you start another six-hour interval with this issue.
Resolution
To fix this issue, enable the Recycle Bin optional feature to allow the undelete or restore
operations to finish. After you do this, there is no task started that will disable the
optional feature.
More information
When the directory service starts, it tracks the progress of the task through events that
are logged in the NTDS event log. The events for managing the disabling of the Recycle
Bin optional feature are as follows:
Disabling state:
Disabled state:
Log Name: Directory Service
Source: Microsoft-Windows-ActiveDirectory_DomainService
Event ID: 2405
Task Category: Internal Configuration
Level: Information
Description:
This Active Directory Domain Services server does not support the "Recycle Bin
Feature" optional feature.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article helps fix an issue where Active Directory replication doesn't work and event
IDs 1865 and 1311 are logged.
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019
Original KB number: 944351
Symptoms
You have multiple sites in the forest. On some sites, you find that AD replication isn't
working.
On the Inter-Site Topology Generator (ISTG) Domain Controllers, the following events
are logged every 15 minutes.
Sites: CN=<sitename>,CN=Sites,CN=Configuration,DC=<domain>,DC=com
Directory partition:
CN=Configuration,DC=<domain>,DC=com
Cause
This may happen when there are connectivity issues between the ISTG servers. For
example, if a firewall has blocked the ports, the issue would occur.
Resolution
Use the portqry tool to troubleshoot the connectivity issues to the Bridgehead servers of
the sites that are listed in Event 1865. If the ports are blocked by the firewall, configure
the firewall to open the ports.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes an issue where Active Directory Replications fail with error 1818:
The remote procedure call was cancelled (RPC_S_CALL_CANCELLED).
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2694215
Symptoms
This article describes the symptoms, cause, and resolution steps when Active Directory
replication fails with error 1818: The remote procedure call was cancelled
(RPC_S_CALL_CANCELLED).
ノ Expand table
ノ Expand table
cancelled.
1173 with Internal event: Active Directory has encountered the following
NTDS error exception and associated parameters. Exception: e0010002
Replication status Parameter: 0 Additional Data Error value: 1818 Internal ID:
1818 5000ede
NTDS 1085 with Internal event: Active Directory could not synchronize the
Replication error following directory partition with the domain controller at the
status following network address.
1818 Directory partition: <NC>
Network address: <GUID-based DC name>
If this error continues, the Knowledge Consistency Checker (KCC)
will reconfigure the replication links and bypass the domain
controller.
User Action
Verify that the network address can be resolved with a DNS
query.
Additional Data Error value: 1818 The remote procedure call was
cancelled.
DC=Contoso,DC=com
===================
<Sitename>\<DC name>
DC Options: IS_GC
DC invocationID: <InvocationID>
DC=Contoso,DC=com
Can't retrieve message string 1818 (0x71a), error 1815. 123 consecutive
4. DCPromo may fail while promoting a new domain controller and you'll see the
following error on the DCPROMO GUI
The Operation Failed because: Active Directory could not replicate the
directory partition
CN=Configuration....from the remote domain controller "server name"
" The remote procedure call was cancelled "
1818 (0x71a)>
Cause
The issue occurs when the destination DC performing inbound replication doesn't
receive replication changes within the number of seconds specified in the "RPC
Replication Timeout" registry key. You might experience this issue most frequently in
one of the following situations:
You promote a new domain controller into the forest by using the Active Directory
Installation Wizard (Dcpromo.exe).
Existing domain controllers replicate from source domain controllers that are
connected over slow network links.
The default value for the RPC Replication Timeout (mins) registry setting on Windows
2000-based computers is 45 minutes. The default value for the RPC Replication Timeout
(mins) registry setting on Windows Server 2003-based computers is 5 minutes. When
you upgrade the operating system from Windows 2000 to Windows Server 2003, the
value for the RPC Replication Timeout (mins) registry setting is changed from 45
minutes to 5 minutes. If a destination domain controller that is performing RPC-based
replication doesn't receive the requested replication package within the time that the
RPC Replication Timeout (mins) registry setting specifies, the destination domain
controller ends the RPC connection with the non-responsive source domain controller
and logs a Warning event.
Some specific root causes for Active Directory logging 1818 \ 0x71a \
RPC_S_CALL_CANCELLED include:
1. An old Network Interface Card driver installed on Domain Controllers could cause
failure of a few network features like Scalable Networking Pack (SNP)
2. Low bandwidth or network packets drops between source and destination domain
controllers.
3. The networking device between source and destination device dropping packets.
7 Note
A speed and duplex mismatch between the NIC and switch on a domain controller
could cause dropped frames, resets, duplicate acknowledgments, and retransmitted
frames.
Resolution
1. Increase replication time-out adding the key RPC Replication Timeout (mins) on
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Type RPC Replication Timeout (mins), and then press ENTER to name the new
value.
In the Value data box, type the number of minutes that you want to use for
the RPC timeout for Active Directory replication, and then click OK.
You must restart the computer to activate any changes that are made to RPC
Replication Timeout (mins)
To manually disable RSS and TCP Offload yourself, follow these steps:
Click Start, click Run, type regedit, and then click OK.
7 Note
You must restart the computer to activate any changes that are made to
EnableTCPChimney.
3. Enable PMTU Black Hole Detection on the Windows-based hosts that will be
communicating over a WAN connection. Follow these steps:
On the Edit menu, click Add Value, and then add the following registry value:
c. Click the Bindings tab. In the Show Bindings For box, click All Services.
f. Under each protocol, there's a number of network adapter icons. Click the icon
for your network adapter, and then click Move Up until the network adapter is
at the top of the list. Leave the "Remote Access WAN Wrapper" entries in any
order under the network adapter(s).
7 Note
If you have more than one network adapter, place the internal adapter
(with Internet Protocol [IP] address 10.0.0.2 by default on a Small Business
Server network) at the top of the binding order, with the external
adapter(s) directly below the internal adapter.
h. After you've verified the settings for each service, click All Protocols in the Show
Bindings For box. The entry for "Remote Access WAN Wrapper" doesn't have a
network adapter listed. Skip this item. Repeat steps 4 through 6 for each
remaining protocol.
i. After you've verified that the bindings are set correctly for all services and
protocols, click OK. This initializes the rebinding of the services. When this is
complete, you're prompted to restart the computer. Click Yes.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
More information
Active Directory changes do not replicate
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution of situations in which Active Directory
replication fails with error 5: Access is denied.
Symptoms
You may encounter one or more of the following symptoms when Active Directory replications fail with
error 5.
Symptom 1
The Dcdiag.exe command-line tool reports that the Active Directory replication test fails with error
status code (5). The report resembles the following:
Symptom 2
The Dcdiag.exe command-line tool reports that the DsBindWithSpnEx function fails with error 5 by
running the DCDIAG /test:CHECKSECURITYERROR command.
Symptom 3
The REPADMIN.exe command-line tool reports that the last replication attempt failed with status 5.
The REPADMIN commands that frequently cite the five status include but aren't limited to the
following:
REPADMIN /KCC
REPADMIN /REPLICATE
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
Sample output from the REPADMIN /SHOWREPL command follows. This output shows incoming replication
from DC_2_Name to DC_1_Name failing with the "Access is denied" error.
Site_Name\DC_1_Name
DSA Options: IS_GC
Site Options: (none)
DSA object GUID: GUID
DSA invocationID: invocationID
Symptom 4
NTDS KCC, NTDS General, or Microsoft-Windows-ActiveDirectory_DomainService events with the five
status are logged in the Directory Services log in Event Viewer.
The following table summarizes Active Directory events that frequently cite the 8524 status.
ノ Expand table
1655 NTDS Active Directory tried to communicate with the following global catalog and the attempts
General were unsuccessful.
1925 NTDS KCC The attempt to establish a replication link for the following writable directory partition
failed.
1926 NTDS KCC The attempt to establish a replication link to a read-only directory partition with the
following parameters failed.
Symptom 5
When you right-click the connection object from a source domain controller in Active Directory Sites
and Services and then select Replicate Now, the process fails, and you receive the following error:
Replicate Now
The following error occurred during the attempt to synchronize naming context %directory
partition name% from Domain Controller Source DC to Domain Controller Destination DC: Access
is denied.
Workaround
Use the generic DCDIAG command-line tool to run multiple tests. Use the DCDIAG
/TEST:CheckSecurityErrors command-line tool to perform specific tests. (These tests include an SPN
registration check.) Run the tests to troubleshoot Active Directory operations replication failing with
error 5 and error 8453. However, be aware that this tool does not run as part of the default execution of
DCDIAG.
Solution
1. Disable the Restrictions for Unauthenticated RPC clients policy setting that restricts the
RestrictRemoteClients registry value to 2.
7 Note
See Restrictions for Unauthenticated RPC Clients: The group policy that punches your domain in the
face .
Active Directory domain controllers are especially prone to maximum-capacity security logs when
auditing is enabled and the size of the security event log is constrained by the Do not overwrite events
(clear log manually) and Overwrite as needed options in Event Viewer or their Group Policy
equivalents.
Solution
) Important
Follow the steps in this section carefully. Serious problems might occur if you modify the registry
incorrectly. Before you modify it, back up the registry for restoration in case problems occur.
1. Clear the security event log, and save it to an alternative location as required.
2. Reevaluate any size constraints on the security event log. This includes policy-based settings.
3. Delete and then re-create a CrashOnAuditFail registry entry as follows:Registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA
Value Name: CrashOnAuditFail
Value Type: REG_DWORD
Value Data: 1
4. Restart the destination domain controller.
Cause 3: Invalid trust
If Active Directory replication fails between domain controllers in different domains, you should verify
the health of trust relationships along the trust path.
You can try the NetDiag Trust Relationship test to check for broken trusts. The Netdiag.exe utility
identifies broken trusts by displaying the following text:
For example, if you have a multi-domain forest that contains a root domain ( Contoso.COM ), a child
domain ( B.Contoso.COM ), a grandchild domain ( C.B.Contoso.COM ), and a tree domain in same forest
( Fabrikam.COM ) and if replication is failing between domain controllers in the grandchild domain
( C.B.Contoso.COM ) and the tree domain ( Fabrikam.COM) , you should verify trust health between
C.B.Contoso.COM and B.Contoso.COM , between B.Contoso.COM and Contoso.COM , and then finally
If a shortcut trust exists between the destination domains, you don't have to validate the trust path
chain. Instead, you should validate the shortcut trust between the destination and source domain.
Check for recent password changes to the trust by running the following command:
Console
Verify that the destination domain controller is transitively inbound replicating the writable domain
directory partition where trust password changes may take effect.
Commands to reset trusts from the root domain PDC are as follows:
Console
Commands to reset trusts from the child domain PDC are as follows:
Console
In the context of Active Directory operations, the target server is the source domain controller that is
contacted by the destination domain controller. Every domain controller in an Active Directory forest
that is currently running the KDC service is a potential KDC. Therefore, you have to consider time
accuracy on all other domain controllers against the source domain controller. This includes time on the
destination domain controller itself.
You can use the following two commands to check time accuracy:
DCDIAG /TEST:CheckSecurityError
W32TM /MONITOR
You can find sample output from DCDIAG /TEST:CheckSecurityError in the "More information" section.
This sample shows excessive time skew on Windows Server 2003-based and Windows Server 2008 R2-
based domain controllers.
Look for LSASRV 40960 events on the destination domain controller at the time of the failing
replication request. Look for events that cite a GUID in the CNAME record of the source domain
controller with extended error 0xc000133. Look for events that resemble the following:
The time at the Primary Domain Controller is different than the time at the Backup Domain
Controller or member server by too large an amount
Network traces that capture the destination computer that connects to a shared folder on the source
domain controller (and also other operations) may show the "An extended error has occurred" on-
screen error, but a network trace displays the following:
-> KerberosV5 KerberosV5:TGS Request Realm: <- TGS request from source DC
<- Kerberosvs Kerberosvs:KRB_ERROR - KRB_AP_ERR_TKE_NVV (33) <- TGS response where
"KRB_AP_ERR_TKE_NYV
<- maps to "Ticket not yet valid" <- maps to "Ticket not yet valid"
The TKE_NYV response indicates that the date range on the TGS ticket is newer than the time on the
target. This indicates excessive time skew.
7 Note
W32TM /MONITOR checks time only on domain controllers in the test computers domain, so
you have to run this in each domain and compare time between the domains.
When the time difference is too great on Windows Server 2008 R2-based destination domain
controllers, the Replicate now command in DSSITE.MSC fails with the "There is a time and / or
date difference between the client and the server" on-screen error. This error string maps to
error 1398 decimal or 0x576 hexadecimal with the ERROR_TIME_SKEW symbolic error name.
For more information, see Setting Clock Synchronization Tolerance to Prevent Replay Attacks .
nltest /sc:query
netdom verify
On condition, reset the destination domain controller's password by using NETDOM /RESETPWD.
Solution
1. Disable the Kerberos Key Distribution Center (KDC) service on the domain controller that is
restarted.
2. From the console of the destination domain controller, run NETDOM RESETPWD to reset the password
for the destination domain controller as follows:
Console
3. Make sure that likely KDCs and the source domain controller (if these are in the same domain)
inbound replicate knowledge of the destination domain controller's new password.
4. Restart the destination domain controller to update Kerberos tickets and retry the replication
operation.
See How to use Netdom.exe to reset machine account passwords of a domain controller .
Cause 6: The "Access this computer from network" user right isn't
granted to a user who triggers replication
In a default installation of Windows, the default domain controller policy is linked to the domain
controller's organization unit (OU). The OU grants the Access this computer from network user right to
the following security groups:
ノ Expand table
Local policy Default domain controller policy
Administrators Administrators
Everyone Everyone
If Active Directory operations fail with error 5, you should verify the following points:
Security groups in the table are granted the Access this computer from network user right in the
default domain controller's policy.
Domain controller computer accounts are located in the domain controller's OU.
The default domain controller's policy is linked to the domain controller's OU or to alternative
OUs that are hosting computer accounts.
Group Policy is applied on the destination domain controller that currently logs error 5.
The Deny access this computer from network user right is enabled or doesn't reference direct or
transitive groups that the security context being used by the domain controller or user account
that triggering replication.
Policy precedence, blocked inheritance, Microsoft Windows Management Instrumentation (WMI)
filtering, or the like, isn't preventing the policy setting from applying to domain controller role
computers.
7 Note
Policy settings can be validated with the RSOP.MSC tool. However, GPRESULT /Z is the
preferred tool because it's more accurate.
Local policy takes precedence over policy that is defined in sites, domains, and the OU.
At one time, it was common for administrators to remove the "Enterprise domain controllers"
and "Everyone" groups from the "Access this computer from network" policy setting in the
default domain controller's policy. However, removing both groups is fatal. There's no reason
to remove "Enterprise domain controllers" from this policy setting, because only domain
controllers are a member of this group.
ノ Expand table
Microsoft HKEY_LOCAL_MACHINE\SYSTEM\CCS\Services\Lanmanworkstation\Parameters\Enablesecuritysignature
network client:
Digitally sign
Policy setting Registry path
communications
(if server agrees)
Microsoft HKEY_LOCAL_MACHINE\SYSTEM\CCS\Services\Lanmanworkstation\Parameters\Requiresecuritysignature
network client:
Digitally sign
communications
(always)
Microsoft HKEY_LOCAL_MACHINE\SYSTEM\CCS\Services\Lanmanserver\Parameters\Enablesecuritysignature
network server:
Digitally sign
communications
(if server agrees)
Microsoft HKEY_LOCAL_MACHINE\SYSTEM\CCS\Services\Lanmanserver\Parameters\Requiresecuritysignature
network server:
Digitally sign
communications
(always)
You should focus on SMB signing mismatches between the destination and source domain controllers.
The classic cases involve a setting that is enabled or required on one side but disabled on the other.
Solution
1. From the console of the destination domain controller, ping the source domain controller by its
fully qualified computer name to identify the largest packet supported by the network route. To
do this, run the following command:
Console
2. If the largest non-fragmented packet is less than 1,472 bytes, try one of the following methods (in
order of preference):
Change the network infrastructure to appropriately support large UDP frames. This may
require a firmware upgrade or configuration change on routers, switches, or firewalls.
Set maxpacketsize (on the destination domain controller) to the largest packet identified by
the PING -f -l command less 8 bytes to account for the TCP header, and then restart the
changed domain controller.
Set maxpacketsize (on the destination domain controller) to a value of 1 This triggers
Kerberos authentication to use a TCP. Restart the changed domain controller to make the
change take effect.
The KDCNames registry entry incorrectly contains the local Active Directory domain name.
The PolAcDmN registry key and the PolPrDmN registry key don't match.
Solutions
) Important
Follow the steps in this section carefully. Serious problems might occur if you modify the registry
incorrectly. Before you modify it, back up the registry for restoration in case problems occur.
3. For each <Fully_Qualified_Domain> under the subkey, verify that the value for the KdcNames
registry entry refers to a valid external Kerberos realm and not to the local domain or another
domain in the same Active Directory forest.
7 Note
This method is valid only for domain controllers that are running Windows 2000 Server.
1. Start Registry Editor.
3. On the Security menu, click Permissions to grant the Administrators local group full control of the
SECURITY hive and its child containers and objects.
5. In the right-side pane of Registry Editor, click the No Name: REG_NONE registry entry one time.
The domain name is displayed as a string on the right side of the Binary Data dialog box. The
domain name is the same as the Kerberos realm.
9. In the right-side pane of Registry Editor, double-click the No Name: REG_NONE entry.
10. In the Binary Editor dialog box, paste the value from the PolPrDmN registry subkey. (The value
from the PolPrDmN registry subkey is the NetBIOS domain name).
11. Restart the domain controller.If the domain controller isn't functioning correctly, see other
methods .
Cause 12: Service principal names are either not registered or not
present because of simple replication latency or a replication failure
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies
to" section.
More information
Active Directory errors and events such as those described in the "Symptoms" section can also fail with
error 8453 together with the following, similar error string:
Replication Access was denied.
The following situations can cause Active Directory operations to fail with error 8453. However, these
situations don't cause failures with error 5.
Naming context (NC) head isn't permitted with the Replicating Directory Changes permission.
The security principal starting replication isn't a member of a group that is granted the Replicating
Directory Changes permission.
Flags are missing in the UserAccountControl attribute. These include the
SERVER_TRUST_ACCOUNT flag and the TRUSTED_FOR_DELEGATION flag.
The read-only domain controller (RODC) is joined in the domain without the ADPREP /RODCPREP
command running first.
Sample DCDIAG /CHECKSECURITYERROR output from a Windows Server 2003-based domain controller
follows. This is caused by excessive time skew.
Sample DCDIAG /CHECKSECURITYERROR output follows. It shows missing SPN names. (The output
could vary from environment to environment.)
Data collection
If you need assistance from Microsoft support, we recommend you collect the information by following
the steps mentioned in Gather information by using TSS for Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes an issue where Active Directory Replications fail with error 8333:
Directory object not found (ERROR_DS_OBJ_NOT_FOUND).
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft Community .
Symptoms
This article describes the symptoms, cause, and resolution steps when Active Directory
replication fails with error 8333: Directory object not found
(ERROR_DS_OBJ_NOT_FOUND).
ノ Expand table
ノ Expand table
NTDS 2108 This event contains REPAIR PROCEDURES for the 1084 event that has
Replication previously been logged. This message indicates a specific issue with
the consistency of the Active Directory database on this replication
destination. A database error occurred while applying replicated
changes to the following object. The database had unexpected
Event Event Event String
Source ID
2031 The DS Service Configuration object is not found. It might have been
NTDS accidentally deleted. The Active Directory will be able to operate
General normally, but you will not be able to set certain service parameters,
such as LDAP limits, default query policies, and SPN mappings. DS
Service Configuration object: CN=Directory Service,CN=Windows
NT,CN=Services,CN=Configuration,DC=contoso,DC=com Error: 8333
(Directory object not found.) User Action: Try to restore the DS
Service Configuration object.
4. DCPromo may fail while promoting a new domain controller and you'll see the
following errors in the DCPROMO log
<DateTime> [INFO] Creating new domain users, groups, and computer objects
<DateTime> [INFO] Error - Active Directory is missing critical information after
installation and cannot continue. If this is a replica domain controller, rejoin
this server to the domain. (8333)
<DateTime> [INFO] NtdsInstall for contoso.com returned 8333
<DateTime> [INFO] DsRolepInstallDs returned 8333
<DateTime> [ERROR] Failed to install to Directory Service (8333)
7 Note
repadmin /rehost failed with DsReplicaAdd failed with status 8333 (0x208d)
Cause
The error status 8333 "Directory Object Not Found" has multiple root causes including:
1. Database corruption with additional associated errors logged in the event log of
the source domain controller:
ノ Expand table
NTDS Replication 2108 This event contains REPAIR PROCEDURES for the
1084 event that has previously been logged. This
message indicates a specific issue with the
consistency of the Active Directory Domain Services
database on this replication destination. A database
error occurred while applying replicated changes to
the following object. The database had unexpected
contents, preventing the change from being
made.Object:
CN=chduffey,OU=IT,OU=Corp,DC=contoso,DC=com
Object GUID: <GUID>
Source domain controller: c4efaf4e-d652-4630-
8623-afec5ebc8532._msdcs.contso.comAdditional
Data
Primary Error value: 8333 Directory Object Not
Found.
Microsoft-Windows- 1084 Internal event: Active Directory could not update the
ActiveDirectory_DomainService following object with changes received from the
following source domain controller. This is because
an error occurred during the application of the
changes to Active Directory on the domain
controller.
NTDS Replication 1699 The local domain controller failed to retrieve the
changes requested for the following directory
partition. As a result, it was unable to send the
change requests to the domain controller at the
Source Event Description
ID
ノ Expand table
8451 Repadmin, DcPromo, as subcode Refer to the troubleshooting guide for 8451 in
in Database Corruption Events the first instance if this error is identified.
2645996
ノ Expand table
NTDS 1388 Another domain controller (DC) has attempted to replicate into this
Replication DC an object that's not present in the local Active Directory
database. The object may have been deleted and already garbage
collected (a tombstone lifetime or more has past since the object
was deleted) on this DC. The attribute set included in the update
request isn't sufficient to create the object. The object will be re-
requested with a full attribute set and re-created on this DC.
ノ Expand table
Source Sources Description
8606 Repadmin, DCPromo, sub Refer to the troubleshooting guide for 8606 in
code in NTDS Replication the first instance if this error is identified.
events 2028495
1722 Repadmin, DCPromo, sub Refer to the troubleshooting guide for 1722 in
code in NTDS Replication the first instance if this error is identified.
events 2102154
3. Conflict Objects
4. Third-Party process
a. Antivirus
b. Directory synchronization software
Resolution
Investigation of the 8333 "Directory Object Not Found" error message should begin on
the source domain controller in the replication partnership. Referring to each of the
possible causes of the issue from the "cause" section of this document, a support
professional should begin their investigation on the source of the source/destination
replication partnership.
a. Review the Directory Services event log on the source and destination
replication partners for JET database corruption events. Possible events include:
ノ Expand table
NTDS Replication 2108 This event contains REPAIR PROCEDURES for the
1084 event that has previously been logged. This
message indicates a specific issue with the
consistency of the Active Directory Domain Services
database on this replication destination. A database
error occurred while applying replicated changes to
the following object. The database had unexpected
contents, preventing the change from being
made.Object:
CN=chduffey,OU=IT,OU=Corp,DC=contoso,DC=com
Object GUID: <GUID>
Source domain controller: c4efaf4e-d652-4630-
Source Event Description
ID
8623-afec5ebc8532._msdcs.contso.comAdditional
Data
Primary Error value: 8333 Directory Object Not
Found.
Microsoft-Windows- 1084 Internal event: Active Directory could not update the
ActiveDirectory_DomainService following object with changes received from the
following source domain controller. This is because
an error occurred during the application of the
changes to Active Directory on the domain
controller.
NTDS Replication 1699 The local domain controller failed to retrieve the
changes requested for the following directory
partition. As a result, it was unable to send the
change requests to the domain controller at the
following network address. 8446 The replication
operation failed to allocate memory
ノ Expand table
) Important
This section, method, or task contains steps that tell you how to modify the
registry. However, serious problems might occur if you modify the registry
incorrectly. Therefore, make sure that you follow these steps carefully. For
added protection, back up the registry before you modify it. Then, you can
restore the registry if a problem occurs. For more information about how to
back up and restore the registry, click the following article number to view
the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
c. Review the event logs for the new events that were generated from the
increased logging for error values that will give a definitive view of the Database
Corruption.
d. If database corruption has been detected, ensure that recent backups exist of
each domain in the forest.
If errors are detected they'll be displayed to the console and written to a log file
in the current working directory.
h. As a last option. You can demote the domain controller, and promote it again to
replace the database and replicate the contents from another server in the
domain.
7 Note
2. Check for the existence of and remove Lingering Objects on all domain controllers
in the forest.
There are multiple approaches to check for Lingering Objects including:
a. Check for the existence of the following Directory Services events on domain
controllers in the forest:
ノ Expand table
NTDS 1388 Another domain controller (DC) has attempted to replicate into
Replication this DC an object that's not present in the local Active Directory
database. The object may have been deleted and already garbage
collected (a tombstone lifetime or more has past since the object
was deleted) on this DC. The attribute set included in the update
request isn't sufficient to create the object. The object will be re-
requested with a full attribute set and re-created on this DC.
repldiag /RemoveLingeringObjects/AdvisoryMode
Directory Service event 1942 will be logged on each domain controller and will
indicate the number of lingering objects that were detected in each directory
partition.
The work being performed by repldiag may also be performed with the built-in
directory services replication tool: Repadmin.exe.
For an alternate approach to the removal of lingering objects, you can use the
built-in tool Repadmin.exe with the /removelingeringobjects switch. This approach
requires multiple commands, repldiag provides an aggregate of the commands
Repadmin.exe would use.
In most circumstances the 8333 error will indicate which directory partition(s)
should be evaluated for conflict objects. It's recommended that the configuration
partition is checked in all instances:
/atts:objectclass,whencreated,whenchanged
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
More information
Lingering Objects:
Database Corruption:
This article describes an issue where Active Directory Replications fail with error 8477:
"The replication request has been posted; waiting for reply".
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Symptoms
This article describes the symptoms, cause, and resolution steps involved in
troubleshooting Active Directory Replication error 8477: "The replication request has
been posted; waiting for reply".
The symptoms discussed in this article are commonly related to the occurrence of event
8477, however may also be observed with other events related to slow or delayed
replication. When troubleshooting such issues, consideration should be given to all
factors that may cause replication delays and be remediated accordingly.
7 Note
The occurrence of event 8477 when inbound replication requests are queuing is
generally observed following a preempted replication task. This event is indicated
by event 8461 - The replication operation was preempted.
7 Note
The output from dcdiag.exe described above is normal behavior during the
promotion of a new, replica domain controller into an environment. The occurrence
of 8477 in this case should be given time to clear through normal replication cycles
before remedial activities being considered or conducted.
ノ Expand table
NTDS 1580 A long-running Active Directory Domain Services inbound replication task
Replication has finished with the following parameters.
Elapsed time (minutes):
84
Operation:
Synchronize Replica
Options:
0x21000051
Parameter 1:
DC=Contoso,DC=com
Parameter 2:
<source DCs ntds settings object object guid>
Parameter 3:
Parameter 4:
A long-running replication task may also occur when a system has been
unavailable or a directory partition has been unavailable for an extended
period of time. A long running replication task may indicate a large
number of updates, or a number of complex updates occurring at the
source directory service. Doing these updates during non-critical times
may prevent replication delays.
Additional Data
Error value:
The operation completed successfully.
Cause
The 8477 (The replication request has been posted; waiting for reply) status is
informational and represents normal Active Directory replication operation, indicating
that replication is currently in progress from the source and hasn't yet been applied to
the destination Domain Controllers database replica.
The presence of this event for an extended period may, however, may be indicative of
issues with Active Directory Replication on the Destination Domain Controller. Possible
causes may include:
Resolution
Investigation of replication error 8477 should be conducted, at least initially, on the
Destination Domain Controller within the replication partnership. The resolution section
of this article will discuss techniques an Active Directory Administrator should use to
resolve the possible causes for error 8477 as per the "Cause" section.
As an initial step, an IT Professional should check Task Manager (and Resource Monitor
where appropriate) for overall CPU and Memory usage to determine if it's
uncharacteristically high or deviates from a predefined baseline. If no baseline exists,
Microsoft Best Practice suggests that sustained and repeated CPU usage greater than
80% would be considered high and should be investigated further.
Regarding disk usage, on Active Directory Domain Controllers the Ntds.dit and edb.log
files should be the most active files on the system. To determine whether this is the case,
performance logging and analysis (as per the below) should be conducted.
Low Bandwidth, High Latency, or Busy Network Connectivity may also cause error 8477
to occur on Active Directory Domain Controllers. Network Performance data metrics
should be collected from a Domain Controller utilizing Performance Monitor, Network
Monitor, or other such tools. Guidance around monitoring and measuring replication
traffic is detailed in Active Directory Replication Traffic .
WARNING
Details: The total physical memory on the system is not capable of handling the load.
Symptom: On directory servers, Ntds.dit and Edb.log should be the most active files. In this
case, C:\Windows\NTDS\ntds.dit has the highest I/O rate (84.622 operations/sec).
In the event that an IT Administrator isn't aware or not expecting a large number of
changes and is receiving error 8477, investigation should be conducted to determine
what changes are occurring in the environment and whether these are expected or the
result of an issue with an application or service. An effective means for performing this
task is to determine what objects are changing through the use of the uSNChanged
attribute, the highest uSNChanged value on a specific Domain Controller represents the
High-Watermark USN.
Running repadmin /showreps /verbose against a domain controller with event 8477
being displayed will show the current High-Watermark and is followed by /OU:
DC=Contoso,DC=com
Default-First-Site-Name\DomainController via RPC
DSA object GUID: <source DCs ntds settings object object guid>
Address: <source DCs ntds settings object object guid>._msdcs.Contoso.Com
DSA invocationID: <source DCs NTDS DB invocation id>
DO_SCHEDULED_SYNCS WRITEABLE COMPRESS_CHANGES
NO_CHANGE_NOTIFICATIONS PREEMPTED
USNs: 1158544/OU, 111052/PU
Last attempt @ <Date Time> was delayed for a normal reason, result 8477 (0x211d):
The replication request has been posted; waiting for reply.
Last success @ <Date Time>
Depending on the number of changes occurring, the highest USN present on a Domain
Controller may increment quickly, to determine the objects that are being updated, it's
suggested that on the Source Replication Partner, the below command is run for the
relevant Naming Context:
Specific Applications or Services, such as the Exchange Recipient Update Service may
make regular changes to Active Directory Attributes and may need to be tuned if
resulting replication traffic is unmanageable.
When a Domain is upgraded from a 2000 functional level, the memberships of any
groups carried are considered legacy and can still cause replication issues:
1. Forests before the 2003 functional level should divide the groups into smaller
groups that don't exceed 5,000 members. Group nesting can also be used,
providing the applications and services using the groups can support it.
2. Forests at the 2003 functional level can remove and reinstate group members to
make them LVR-enabled. Over time, as security principals are added and removed
from groups, the members are slowly enabled for LVR Note: Events 1479 and 1519
are also commonly logged in the Directory Service Event Log when large groups
are causing replication issues and delays.
3 entries.
Type Attribute Last Mod Time Originating DSA Loc.USN Org.USN Ver
======= ============ ============= =================
======= ======= ===
Distinguished Name
=============================
PRESENT member <Date Time> Default-First-Site-Name\DomainController 8203
8203 1
CN=Administrator,CN=Users,DC=Contoso,DC=Com
PRESENT member <Date Time> Default-First-Site-Name\DomainController 12398
12398 1
CN=Enterprise Admins,CN=Users,DC=Contoso,DC=Com
PRESENT member <Date Time> Default-First-Site-Name\DomainController 12378
12378 1
CN=Domain Admins,CN=Users,DC=Contoso,DC=Com
LEGACY member <Date Time> Default-First-Site-Name\DomainController 198458
198458 1 CN=mjordan,CN=Users,DC=Contoso,DC=Com
A recent modification to the Active Directory Schema
where a sizeable number of schema attributes have been
modified or indexed
Attribute definitions are stored in attributeSchema objects in the schema directory
partition. Changes to attributeSchema objects block other replication until the schema
changes are done. During replication of any directory partition other than the schema
directory partition, the replication system first checks to see whether the schema
versions of the source and the destination domain controllers are in agreement. If the
versions aren't the same, the replication of the other directory partition is rescheduled
until the schema directory partition is synchronized.
Modification of the schema through the use of LDIFDE or customized binaries included
with applications (that is, Microsoft Exchange, Operations Manager, and so on) may add
indexed attributes to the schema directory partition. Depending on the size of the
update, replication delays can be caused in large databases.
In cases such as these, the 8477 state may appear as a transient issue and should be
expected to self-resolve once the higher priority schema updates are successfully
replicated and all other replication catches up on backlogged changes within the
directory.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
More information
How the Active Directory Replication Model Works
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you change the replication
scope of an Active Directory integrated domain name system (DNS) zone.
Symptoms
When you try to change the replication scope of an Active Directory integrated DNS
zone, you may receive an error that is similar to the following error message:
Cause
This issue may occur if the system account does not have the SeSecurityPrivelige
permission that is provided by the built-in administrator account.
Resolution
To resolve this issue, you must add the built-in administrators group account to the
manage auditing and security log user permission. The manage auditing and security
log user permission is located in the default domain controller policy. After you add the
built-in administrators group account, change the replication scope of the required DNS
zone.
To add the built-in administrators group account to the manage auditing and security
log user permission, follow these steps:
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue that occurs when you delete Active
Directory objects that contain many forward links.
Summary
This article discusses an issue that occurs when you delete Active Directory objects that
contain many forward links. Here are some common examples:
The number of links where you start seeing problems may be as low as 50,000. On a
single object, there may be several millions of links.
The registry key that is discussed in this article should be applied only to domain
controllers (DCs) and Lightweight Directory Services (LDS) servers that are experiencing
the issue that is described in the "Symptoms" section. This issue is likely to occur on
Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 DCs. By
following the recommendations that are given here, you may decrease Active Directory
replication performance but increase the reliability of correctly processing the deletion
of such large objects.
Symptoms
When you delete Active Directory objects that contain many forward links, you may
encounter replication failure. For example, you delete groups with large membership
sets, or you demote and then delete RODC computer accounts that have many links to
users accounts that have their password exposed on the RODC.
The following conditions are the key indicators that this solution applies to the issue:
The forest functional level is Windows Server 2003 or later version of Windows
Server, so link value replication is used.
Event 2094 (replication delay) occurs several times, referencing the same deleted
object.
Events 1083 and 1955 (Write conflict) are logged in close time proximity to the
logging of the 2094 event referencing the same deleted object.
The affected domain controller (DC) may also report that the version store is
exhausted (Event ID 623). Exhaustion of version store doesn't always occur in this
scenario. Other factors that increase the likelihood of version store exhaustion
include a high rate of changes to Active Directory objects, both local and
replicated, as well as other long running operations such as deep queries.
Active Directory replication fails with error 8409, error "A database error has
occurred", or other events cite related status codes that are mentioned in the
following table:
ノ Expand table
If the Active Directory recycle bin is enabled, the replication errors may not occur
for 60 to 180 days (deleted object lifetime) after the object is deleted. The issues
occur when the object transitions from the deleted status to the recycled status.
More information
By default, when you delete an Active Directory object that has an exceptionally large
number of forward and backward links, 10,000 links are deleted at a time. During this
time, if other threads update the target objects of these links, the link deletion
transaction is suspended until the objects are available again. This suspension can cause
the whole deletion transaction to take a long time to finish. During this time, other
replication tasks are held up by this long-running task. For example, you may notice that
passwords and group membership updates aren't progressing throughout the forest.
While this update is pending, admins may see write conflicts and transaction failure
events. Also, as additional objects are processed by replication, more and more version
store is allocated because the pending large transaction doesn't release its allocated
versions store until the deletion transaction is finished. This can cause version store
errors and replication warnings events.
7 Note
For AD DS:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\Links process
batch size
For AD LDS:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<adam
Type: DWORD
Min Value: 100
Max Value: 10000
This value overrides the default value of 10,000 as the number of atomic links to process
at one time. You don't have to restart the NTDS or LDS instance service, or restart the
computer to make the setting effective.
After each atomic operation, the corresponding version store is released. The version
store is reacquired only during the next atomic operation that continues to process the
same object. You may have second thoughts about turning down the link batch size by a
great degree. You can combine it with an increase of the ESE version store. If maybe for
a reason that you have increased version store, you may decide to increase version store
some more or not decrease the Links process batch size value so much.
Workaround
To work around this issue, set the value of Links process batch size lower than 10,000.
This decreases the potential for an object access collision to occur. By doing this, you
make the replication process of large object deletion more reliable. Also, it now takes a
longer time to complete the whole transaction. This also helps you avoid version store
depletion.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
References
For more information, see the following articles:
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where changes that are made to security
groups or distribution groups aren't replicated to destination domain controllers when
you use link value replication.
Symptoms
Consider the following scenario. In a Windows Server 2003 environment, you set the
forest functional level in the forest to Windows Server 2003 or to a later version of
Windows. You do this to apply link value replication (LVR) changes to group
membership on LVR-enabled attributes. In this scenario, you may experience the
following symptoms:
Changes to the security group or distribution group that exists on the source
domain controller aren't replicated to the destination domain controllers. You
experience this symptom when the group membership change is initiated either by
an administrator or by a program.
When you run the repadmin /showreps command, you receive a message that
states that a Windows Server 2008-based or Windows Server 2003-based
destination domain controller can't replicate inbound changes to a directory
partition from one or more source domain controllers. In this situation, you also
receive a Win32 error 8451.
7 Note
7 Note
NTDS general event 1173 indicates a generic replication failure.
The additional data error value -1603 maps to a Currency not on a record
jet error and to the symbolic name errNoCurrentRecord. The misspelling of
currently in the Currency not on a record error text.
Exception e0010004 corresponds to error DSA_DB_EXCEPTION.
Internal ID 2050344 corresponds to a function in the database layer code
of NTDS. This number depends on the operating system, on the service
pack, and on the patching revisions.
7 Note
This event is logged when you enable diagnostic logging and set the value for
the 5 Replication Events registry entry to 1 or greater.
For more information about NTDS diagnostic logging, see How to configure Active
Directory and LDS diagnostic event logging.
These symptoms may occur when changes are made to any LVR-replicated object class
that has forward links. (These changes to the LVR-replicated object class are also to the
changes that are made to security and distribution groups.)
Cause
This issue occurs if Windows Server 2008-based or Windows Server 2003-based
destination domain controllers stop inbound replication when they receive LVR updates
of objects that don't exist in their local copies of Active Directory.
Specifically, this issue may occur if the following conditions are true:
The forest functional level is set to Windows Server 2003 Interim mode or a later
version.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
1. Run the following repadmin command on the primary domain controller (PDC) to
create a .csv file that contains the list of destination domain controllers:
Console
3. On the domain controllers that log the "Win32 error 8451" error message, make
sure that diagnostic logging for the 5 Replication Events registry entry is set to a
value of 1. To do this, follow these steps:
d. In the details pane, double-click 5 Replication Events, type 1 in the Value data
box, and then click OK.
4. On the destination domain controllers, verify that Directory Service event 1692 is
logged in the Directory Service log. The event displays changes to the member
attribute of the security group or to other LVR-replicated attributes and to the
lingering object GUIDs.
5. Remove the lingering objects from the Windows Server 2008-based or Windows
Server 2003-based destination domain controllers by using the repadmin
/removelingeringobjects command.
) Important
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you use the Distributed File
System Replication (DFSR) service to replicate the sysvol folder.
Symptoms
Consider the following scenario:
You use the Distributed File System Replication (DFSR) service to replicate the
sysvol folder.
All domain controllers (DC) are running Windows Server 2008 R2 or a later version.
You run the Domain Controller Diagnostics Tool (DCDiag) to generate a report
about the replication.
Console
When this problem occurs, DCDiag validates the reference object for DFSR. Also, the NT
File Replication Service (NTFRS) stops.
Cause
This problem occurs because there's no File Replication Service (FRS) reference in the
Active Directory database under the domain controller object when DFSR is used for
sysvol replication. Instead, there's only an object for DFSR.
This logic isn't included in earlier versions of DCDiag, such as DCDiag for Windows
Server 2008 or DCDiag installed together with Windows Server 2003 Support Tools. So
these versions search for the FRS member reference, and it generates a false error in
DCDiag.
Resolution
To resolve this problem, run Dcdiag.exe from %windir%\System32 . This folder contains
the latest version of DCDiag in Windows 2008 and Windows 2008 R2. By running the
latest version of DCDiag, the sysvol replication will pass the VerifyReferences test.
Instead, if the Windows Support Tools suite is installed on Windows Server 2008 R2,
uninstall it. Which resolves the problem and lets you run Dcdiag.exe from any location.
More information
Even if you use the latest DCDiag releases, the error that is mentioned in the Symptoms
section may still occur if the msDFSR-Flags attribute in the CN=
<DCNAME>,OU=Domain Controllers,DC=<DOMAIN>,DC=<COM> line in the DCDiag
entry is missing or doesn't match one of the following flags:
In this case, DCDiag assumes falsely that the File Replication Service (FRS) is still
configured for SYSVOL, and it tries to verify FRS objects and attributes in an Active
Directory database that doesn't exist. So you can expect the verification to fail.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
Symptoms
You may notice that Active Directory fails to replicate in the following conditions:
Cause
Active Directory Domain Services (AD DS) replication has the following dependencies:
Network connectivity over the ports and protocols that are used by the ADDS
service
DNS name resolution to resolve the name of a replication partner to its IP address
Authentication and authorization
Time accuracy within 5 minutes to support Kerberos authentication
The directory database
The Active Directory replication topology to build connection objects between
replication partners
The ADDS replication engine
Resolution
Use either of the following methods to view replications errors:
Download and run the Microsoft Support and Recovery Assistant tool .
In Windows 10, version 1809 and later version of Windows 10, you can install
the RSAT feature through Settings > Manage optional features.
On the Start menu, right-click Command Prompt, and then select Run as
administrator. If the User Account Control dialog box appears, provide Enterprise
Admins credentials, and then select Continue.
2. At the command prompt, type the following command, and then press Enter:
Console
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes how to disable the Knowledge Consistency Checker from
automatically creating replication topology.
Summary
The Knowledge Consistency Checker (KCC) is a Microsoft Windows 2000 and Microsoft
Windows Server 2003 component that automatically generates and maintains the intra-
site and inter-site replication topology. You can disable the KCC's automatic generation
of intra-site or inter-site topology management, or both.
More information
In some situations you may want to manually create replication connections to tailor the
replication topology, but this increases the workload for monitoring for changes in the
network topology described in Active Directory or replication failures occurring on
domain controllers.
The KCC runs at regular intervals to adjust the replication topology for changes that
occur in Active Directory, such as adding new domain controllers and new sites that are
created. At the same time, the KCC reviews the replication status of existing connections
to determine if any connections are not working. If a connection is not working, after a
threshold is reached, KCC automatically builds temporary connections to other
replication partners (if available) to insure that replication is not blocked.
7 Note
2. Run Ldp.exe
4. Type the server name of a domain controller in the enterprise, verify that the port
setting is 389, click to clear the connectionless check box, and then click OK. After
the connection is complete, server-specific data is displayed in the right pane.
5. On the Connection menu, click Bind. Type the user name, password, and domain
name (in DNS format) in the appropriate boxes (you may need to click to select the
Domain check box), and then click OK. If the binding is successful, you should
receive a message in the right pane that is similar to the following example:
Authenticated as dn: YourUserID
7. In the BaseDN box, type the distinguished name of the site object in the
configuration container of the forest. For example, for the Default-First-Site-Name
site in the Mydomain.com forest, the domain name would look like the following
example:
CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=MYDOMAIN,DC=COM
If this object is located, LDP should display the object in the left pane.
8. Expand the view. One of the child objects should begin with CN=NTDS Site
Settings. Double-click this object. In the right pane, LDP should output the current
settings for the attributes for this object. Each attribute is preceded by a number
and then an angle bracket (>). The number represents the number of values the
attribute contains.
9. Look for the "options" attribute. If it is not present, this is normal and makes
modifying the value easier.
7 Note
If the "options" attribute is present and the value is not 0, you need to
determine the current flags that are set and use the values below to construct
the new value before continuing to the next step.
10. In the right-hand pane, locate the beginning of the output for the NTDS Site
Settings object. It looks similar to the following example:
11. Copy the string of data from the ">> Dn" portion of the LDP output.
12. On the Browse menu, click Modify. In the Dn box, paste the string you copied in
the previous step.
15. In the Operation box, click Replace, click Enter, and then click Run.
16. In the right pane, the output should look similar to the following example if the
operation is successful:
To re-enable KCC generation, delete the value that you entered in step 14 in this
section.
To determine if these values are set correctly, you can use Active Directory Replication
Monitor (also included with the Support Tools installation) to generate a report on the
site configuration. Included in this information is output similar to the following
example:
7 Note
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
Provide product feedback
Duplicate Active Directory replication
connections are created
Article • 02/19/2024
This article provides a solution to an issue where duplicate Active Directory replication
connections are created for one or more domain controllers across one or more sites.
Symptoms
In Active Directory Sites and Services, duplicate Active Directory replication connections
are created for one or more domain controllers across one or more sites.
Cause
This issue is caused by either a lack of network connectivity or by another problem that
disrupts replication on the Intersite Topology Generator (ISTG) in the site. If the ISTG
can't reach other domain controllers, it tries to create new (duplicate) Active Directory
replication connections for domain controllers in the same site.
7 Note
Data collection
To collect the relevant data for this issue, follow these steps.
7 Note
5. If repadmin /bind fails to connect, take a network trace by using netsh on both
domain controllers, as follows:
a. Run netsh trace start capture=yes tracefile=c:\%computername%.etl .
b. Run repadmin /bind <DCNAME> .
c. Connect by using the FQDN instead of the host name, if possible.
d. Run netsh trace stop .
6. Run repadmin /showrepl * /csv >showrepl.csv .
7. Run repadmin /viewlist * >DCs.txt .
8. Run repadmin /istg >istg.txt .
Resolution
To resolve this issue, open ports in the site to allow the ISTG to connect to the domain
controllers. After the connectivity issue is resolved, delete the duplicate connection
objects, and then rerun KCC on the ISTG.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
More information
For more information about this issue, see How Active Directory replication topology
works. Particularly focus on the KCC and topology generation section and the "Excluded
nonresponding servers" subtopic.
Feedback
Was this page helpful? Yes No
) Important
As of June 2nd, 2023, the Active Directory Replication Status Tool is no longer
available for download. The following article is provided for historical purposes
only.
This article introduces the Active Directory Replication Status Tool (ADREPLSTATUS). This
tool helps administrators identify, prioritize, and fix Active Directory replication errors on
a single domain controller (DC) or any DCs in an Active Directory domain or forest.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4469274
Features
Auto-discovery of the DCs and domains in the Active Directory forest to which the
computer that is running ADREPLSTATUS is joined.
"Errors only" mode lets administrators focus only on DCs that report replication
failures. For more information, see below.
When ADREPLSTATUS detects replication errors, the tool relies on its integration
with resolution content on Microsoft TechNet to display the resolution steps for
the top AD replication errors. For more information, see below.
Rich sorting and grouping of result output by clicking any single column header
(sort) or by dragging one or more column headers to the filter bar. Use one or
both options to arrange output by last replication error, last replication success
date, source DC naming context, replication success date, and so on.
Export replication status data so that it can be imported and viewed by source
domain admins, destination domain admins, or support professionals in Microsoft
Excel or ADREPLSTATUS.
Choose which columns that you want displayed and their display order. These
settings are saved as a preference on the ADREPLSTATUS computer.
7 Note
ADREPLSTATUS is a read-only tool and makes no changes to the configuration of,
or objects in, an Active Directory forest.
More information
The ADREPLSTATUS user interface consists of a toolbar and Microsoft Office-style ribbon
to expose different features. The Replication Status Viewer tab displays the replication
status for all DCs in the forest. The following screenshot shows ADREPLSTATUS
highlighting a DC that hasn't replicated in Tombstone Lifetime number of days
(identified here by the black color-coding).
Error only
By using the Errors Only button (upper-right of image below), you can filter out healthy
DCs to focus on destination DCs that are reporting replication errors:
Replication error analysis
The Replication Error Guide has a Detected Errors Summary view that records each
unique replication error that occurs on the set of DCs that are targeted by the
administrator.
Selecting any of the replication error codes loads the recommended troubleshooting
content for that error. For example, the following is a screenshot for when the TechNet
Article for Active Directory Replication Error 1256 is displayed:
The goals for this tool are to help administrators identify and fix Active Directory
replication errors before they cause user and application failures or outages, or lingering
objects cause short or long-term replication failures, and to give administrators more
insight into the operation of Active Directory replication in their environments.
Known issues
ADREPLSTATUS won't work when the following security setting is enabled in
Windows - System cryptography: Use FIPS 140 compliant cryptographic algorithms,
including encryption, hashing and signing algorithms.
An additional check mark appears at the bottom of the column chooser when you
right-click a column header.
7 Note
The time that's needed to provide a solution depends on the team's workload as
well as problem complexity and cause. Code defects in the ADREPLSTATUS tool can
typically be resolved relatively quickly. Tool failures due to external causes may take
longer, unless a workaround can be found.
The ADREPLSTATUS team can't fix Active Directory replication errors that are
identified by the ADREPLSTATUS tool. Contact your support provider to fix the
issue. You may also submit and research replication errors at this TechNet
Windows Server forum .
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article lists the hotfixes that are currently available for users who have installed Distributed File
System (DFS) technologies on a Windows Server 2012-based computer or a Windows Server 2012 R2-
based computer.
Summary
This Microsoft Knowledge Base articles that are listed in this article describe the available fixes. If you have
installed DFS technologies on a Windows Server 2012-based computer or a Windows Server 2012 R2-
based computer, we recommend that you review and install the hotfixes that are described in More
information.
Note. The two technologies in DFS are DFS Namespaces (DFS-N) and DFS Replication (DFS-R).
A servicing approach of installing the monthly rollups provides customers with a consistent model for
staying current and secure. You may substitute a more recent monthly rollup for an older monthly rollup.
The remainder of the updates in this list are still required because some components in those updates
were released prior to October 2016 and aren't included in a more recent monthly rollup. For more
information about this servicing approach, see Simplified servicing for Windows 7 and Windows 8.1: the
latest improvements .
More information
7 Note
Some of the following tables contain blank cells to accommodate information that will be supplied
later.
DFS namespaces
ノ Expand table
April 4056895 January 8, 2018- This monthly rollup Included in January 3, 2018-
15, KB4056895 (Monthly contains the KB4056898 (Security-only
2020 Rollup) 6.3.9600.18895 version update) .Included in January 8,
of Dfsc.sys. (client-side). 2018-KB4056895 (Monthly Rollup)
and later monthly rollups.
Mar 06, 3046481 DFS Namespaces This hotfix contains the To install this update, you must
2015 deployment causes slow most current version of have Windows Server 2012 R2
access or access time-out Dfssvc.exe for Windows installed.
when you access DFS Server 2012 R2.
share in Windows Server
2012 R2.
ノ Expand table
Date Knowledge Title Why we recommend this hotfix Hotfix type and availability
added Base article
April 3192406 October 2016 This monthly rollup contains the Included in October 2016
15, Preview of Monthly 6.2.9200.21968 version of Dfssvc.exe Preview of Monthly Quality
2020 Quality Rollup for and the 6.2.9200.21976 version of Rollup for Windows Server
Windows Server Dfsc.sys for Windows Server 2012. 2012 and later monthly
2012 rollups.
DFS replication
Windows Server 2012 R2
ノ Expand table
April 15, 4038774 September 19, 2017- This monthly rollup contains Included in September 19,
2020 KB4038774 (Preview of the 6.3.9600.18776 version of 2017-KB4038774 (Preview
Monthly Rollup) Dfsrs.exe for Windows Server of Monthly Rollup) and
2012 R2. later monthly rollups.
Not This hotfix contains the most To install this hotfix, you
applicable current version of Dfsrro.sys must have Windows
for Windows Server 2012 R2. Server 2012 R2 installed.
August 2996883 DFSR stops replication after This hotfix contains the most To apply this hotfix, you
31, 2014 an unexpected shutdown in current versions of must be running
a Windows 8.1 or Windows Dfsrdiag.exe and Dfsrmig.exe Windows Server 2012 R2
Server 2012 R2 environment for Windows Server 2012 R2. and April 2014 Update
2919355 .
ノ Expand table
February 2884176 Large backlogs on Windows-based This hotfix contains To install this hotfix, you
14, 2015 DFSR servers the most current must have Windows Server
version of Dfsrs.exe 2012 installed. This hotfix is
and Dfsrress.dll for available for individual
Windows Server download.
2012.
Jan-10 3121255 0x00000024 Stop error in This hotfix contains To install this hotfix, you
2016 FsRtlNotifyFilterReportChange and an update for must have Windows Server
VSS backup of PI Data server fails in Ntfs.sys for 2012 installed. This hotfix is
Windows Windows Server available for individual
2012. download. This hotfix is also
included in July 11, 2017-
KB4025331 (Monthly Rollup)
and later monthly rollups.
ノ Expand table
Date Knowledge Title Why we recommend this hotfix Hotfix type and availability
added Base article
Not applicable This hotfix contains the most current versions To install this hotfix, you must
of Dfsrdiag.exe and Dfsrmig.exe for Windows have Windows Server 2012
Server 2012. installed.
Robocopy
ノ Expand table
Date Knowledge Title Why we recommend this hotfix Hotfix type and
added Base article availability
18- 3000850 November 2014 update This hotfix contains the most To install this update rollup,
Nov- rollup for Windows RT current version of Robocopy.exe. you must have Windows
2014 8.1, Windows 8.1, and Server 2012 R2 installed
Windows Server 2012 Robocopy can be used to pre- and April 2014 Update
R2 seed data for new replicated 2919355 .
folders and is also used during
the migration of Sysvol from FRS
to DFSR.
ノ Expand table
Date Knowledge Title Why we recommend this hotfix Hotfix type and
added Base article availability
May 16, 2962407 Windows RT, This hotfix contains the most current To install this hotfix, you
2014 Windows 8, and version of Robocopy.exe. must have Windows 8 or
Windows Server 2012 Windows Server 2012
update rollup: June Robocopy can be used to pre-seed installed.
2014 data for new replicated folders and is
also used during the migration of
Sysvol from FRS to DFSR.
ノ Expand table
Data collection
If you need assistance from Microsoft support, we recommend you collect the information by following
the steps mentioned in Gather information by using TSS for Active Directory replication issues.
References
KB 968429: List of currently available hotfixes for Distributed File System (DFS) technologies in
Windows Server 2008 and in Windows Server 2008 R2
KB 2473205: List of currently available hotfixes for the File Services technologies in Windows Server
2008 and in Windows Server 2008 R2
KB 2899011: List of currently available hotfixes for the File Services technologies in Windows Server
2012 and in Windows Server 2012 R2
Feedback
Was this page helpful? Yes No
This article describes how to restrict Active Directory (AD) replication remote procedure
calls (RPC) traffic to a specific port in Windows Server.
Summary
By default, Active Directory replication remote procedure calls (RPC) occur dynamically
over an available port through the RPC Endpoint Mapper (RPCSS) by using port 135. An
administrator can override this functionality and specify the port that all Active Directory
RPC traffic passes through. This procedure locks down the port.
When you specify ports to use by using the registry entries in More information, both
Active Directory server-side replication traffic and client RPC traffic are sent to these
ports by the endpoint mapper. This configuration is possible because all RPC interfaces
supported by Active Directory are running on all ports on which it's listening.
7 Note
More information
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
When you connect to an RPC endpoint, the RPC runtime on the client contacts the
RPCSS on the server at a well-known port (135). And it obtains the port to connect to for
the service supporting desired RPC interface. It assumes that the client doesn't know the
complete binding. It's the situation with all AD RPC services.
The service registers one or more endpoints when it starts, and has the choice of a
dynamically assigned port or a specific port.
If you configure Active Directory and Netlogon to run at port x as in the following entry,
it becomes the ports that are registered with the endpoint mapper in addition to the
standard dynamic port.
Use Registry Editor to modify the following values on each domain controller where the
restricted ports are to be used. Member servers aren't considered to be logon servers.
So static port assignment for NTDS has no effect on member servers.
Member servers do have the Netlogon RPC Interface, but it's rarely used. Some
examples may be remote configuration retrieval, such as nltest
/server:member.contoso.com /sc_query:contoso.com .
Registry key 1
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Registry value: TCP/IP Port
Value type: REG_DWORD
Value data: (available port)
Registry key 2
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
Registry value: DCTcpipPort
Value type: REG_DWORD
Value data: (available port)
Restart the Netlogon service for the new setting to become effective.
7 Note
When you use the DCTcpipPort registry entry, and you set it to the same port as the
TCP/IP Port registry entry, you receive Netlogon error event 5809 under
NTDS\Parameters . This indicates that the port configured is in use, and you should
You'll receive the same event when you have a unique port, and you restart the
Netlogon service on the domain controller. This behavior is by design. It occurs because
of the way the RPC runtime manages its server ports. The port will be used after the
restart, and the event can be ignored.
Administrators should confirm that the communication over the specified port is
enabled if any intermediate network devices or software is used to filter packets
between the domain controllers.
Frequently, you must also manually set the File Replication Service (FRS) RPC port
because AD and FRS replication replicate with the same Domain Controllers. The FRS
RPC port should use a different port.
Don't assume that clients only use the Netlogon RPC services and thus only the setting
DCTcpipPort is required. Clients are also using other RPC services such as SamRPC,
LSARPC, and also the Directory Replication Services (DRS) interface. You should always
configure both registry settings and open both ports on the firewall.
Known issues
After you specify the ports, you may encounter the following issues:
Long logon time after you set a specific static port for NTDS and Netlogon in a
Windows Server 2008 R2-based domain environment
AD replication fails with an RPC issue after you set a static port for NTDS in a
Windows-based domain environment
Logon fails after you restrict client RPC to DC traffic in Windows Server 2012 R2 or
Windows Server 2008 R2
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides some information about lingering objects in a Windows Server
Active Directory forest.
Summary
This article contains information about lingering objects in an Active Directory forest.
Specifically, the article describes the events that indicate the presence of lingering
objects, the causes of lingering objects, and the methods that you can use to remove
lingering objects.
INTRODUCTION
Lingering objects can occur if a domain controller does not replicate for an interval of
time that is longer than the tombstone lifetime (TSL). The domain controller then
reconnects to the replication topology. Objects that are deleted from the Active
Directory directory service when the domain controller is offline can remain on the
domain controller as lingering objects. This article contains detailed information about
the events that indicate the presence of lingering objects, the causes of lingering
objects, and the methods that you can use to remove lingering objects.
More information
ノ Expand table
7 Note
The existing TSL value does not change when a domain controller is upgraded to
Windows Server 2003 with Service Pack 1 (SP1). The existing TSL value is
maintained until you manually change it.
After the tombstone is permanently deleted, the object deletion can no longer be
replicated. The TSL defines how long domain controllers in the forest retain information
about a deleted object. The TSL also defines the time during which all direct and
transitive replication partners of the originating domain controller must receive a unique
deletion.
Replication problems occur when the object on the source domain controller is updated.
In this case, when the destination partner tries to inbound-replicate the update, the
destination domain controller responds in one of two ways:
If the destination domain controller has Strict Replication Consistency enabled, the
controller recognizes that it cannot update the object. The controller locally stops
inbound replication of the directory partition from the source domain controller.
If the destination domain controller has Strict Replication Consistency disabled, the
controller requests the full replica of the updated object. In this case, the object is
reintroduced into the directory.
Wide area network (WAN) connections are unavailable for long periods. For
example, a domain controller on board a cruise ship may be unable to replicate
because the ship is at sea for longer than the TSL.
The reported event is a false positive because an administrator shortened the TSL
to force the garbage collection of deleted objects.
The reported event is a false positive because the system clock on the source or on
the destination domain controller is incorrectly advanced or rolled back. Clock
skews are most common following a system restart. Clock skews may occur for the
following reasons:
There is a problem with the system clock battery or with the motherboard.
An administrator advances or rolls back the system clock to extend the useful
life of a system state backup or to accelerate the garbage collection of deleted
objects. Make sure that the system clock reflects the actual time. Also, make
sure that event logs do not contain invalid events from the future or from the
past.
Even when there is no noticeable effect, the presence of lingering objects can cause
problems. These problems are most likely to occur if a lingering object is a security
principal.
ノ Expand table
1862 The local domain controller has not recently received replication information from
several domain controllers (intersite).
1863 The local domain controller has not recently received replication information from
several domain controllers (intersite).
1864 The local domain controller has not recently received replication information from
several domain controllers (summary).
1311 The Knowledge Consistency Checker (KCC) was not able to build a spanning tree
topology.
2042 It has been too long since this server last replicated with the named source server.
Events that indicate that lingering objects are present in the forest
ノ Expand table
1388 This destination system received an update for an object that should have been
present locally but was not.
1311 Another domain controller replicated an object not present on this domain controller.
7 Note
Lingering objects are not present on domain controllers that log Event ID 1988. The
source domain controller contains the lingering object.
ノ Expand table
Multiple copies of an object appear in the object picker or in the GAL for an object
that should be unique in the forest. You sometimes see duplicate objects that have
changed names. These duplicate objects cause confusion on directory searches.
For example, if the relative distinguished name of two objects cannot be resolved,
conflict resolution appends CNF:GUID to the name. In this example, * represents a
reserved character, CNF is a constant that indicates a conflict resolution, and GUID
represents the objectGUID attribute value.
E-mail messages are not delivered to a user whose Active Directory account
appears to be current. After an outdated domain controller or global catalog server
is reconnected, both instances of the user object appear in the global catalog.
Because both objects have the same e-mail address, e-mail messages cannot be
delivered.
A new object or Exchange mailbox cannot be created. But you do not see the
object in Active Directory. An error message reports that the object already exists.
Searches that use attributes of an existing object may incorrectly find multiple
copies of an object of the same name. One object has been deleted from the
domain. But that object remains in an isolated global catalog server.
For more information about how to remove lingering objects in a Windows 2000-based
domain, click the following article number to view the article in the Microsoft
Knowledge Base:
314282 Lingering objects may remain after you bring an out-of-date global catalog
server back online
The data type for this entry is REG_DWORD. If you set the value to 1, the entry is
enabled. Inbound replication of the specified directory partition from the source is
stopped on the destination. If you set the value to 0, the entry is disabled. The
destination requests the full object from the source domain controller. The lingering
object is revived in the directory as a new object.
The default value for the Strict Replication Consistency registry entry is determined by
the conditions under which the domain controller was installed in the forest.
7 Note
Raising the functional level of the domain or the forest does not change the
replication consistency setting on any domain controller.
By default, the value of the Strict Replication Consistency registry entry on domain
controllers that are installed in a forest is 1 (enabled) if the following conditions are true:
By default, the value of the Strict Replication Consistency registry entry on domain
controllers is 0 (disabled) if the following conditions are true:
If you have a domain controller that is running Windows Server 2003 with SP1, you do
not have to modify the registry to set the value of the Strict Replication Consistency
registry entry. Instead, you can use the Repadmin.exe tool to set this value for one
domain controller in the forest or for all the domain controllers in the forest.
For more information about how to use Repadmin.exe to set Strict Replication
Consistency, visit the following Microsoft Web site:
https://technet.microsoft.com/library/cc780362(WS.10).aspx
1. Click Start, click Run, type cmd, and then click OK.
10. On the heading of the Last Success column, click the down arrow, and then click
Sort Ascending.
11. On the heading of the src DC column, click the down arrow, and then click
Custom.
12. In the Custom AutoFilter dialog box, click does not contain.
13. In the box to the right of does not contain, type del.
7 Note
This step prevents deleted domain controllers from appearing in the results.
14. On the heading of the Last Failure column, click the down arrow, and then click
Custom.
15. In the Custom AutoFilter dialog box, click does not equal.
Increase the TSL to 180 days by using the Adsiedit tool. To do it, follow these steps:
Increase the TSL to 180 days by using the Adsiedit tool. To do it, follow these steps:
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes procedures for cleaning up objects that are reintroduced to AD
after you bring an offline DC back online.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 314282
Symptoms
You bring a domain controller (DC) or global catalog server online after it has been
offline for a long time. After it comes online, you observer one or more of the following
issues:
E-mail messages are not delivered to a user whose user object was moved
between domains. After you bring the outdated DC or global catalog server back
online, both instances of the user object appear in the global catalog. Both objects
have the same e-mail address, so e-mail messages cannot be delivered.
A user account that no longer exists still appears in the global address list.
A universal group that no longer exists still appears in a user's access token.
Other DCs or global catalog servers log events such as EventID 1084, There is no
such object on the server. Further replication is blocked on the affected DCs or
global catalog servers.
Cause
These problems may occur if the DC or global catalog server has been offline for longer
than the value of the Tombstone-Lifetime attribute of user objects.
The Tombstone-Lifetime attribute defines the number of days before a deleted object is
removed from the directory services. This assists in removing objects from replicated
servers and preventing restores from reintroducing a deleted object. The default value is
180 days. After that time, Active Directory no longer needs to remember the change.
If a DC or a global catalog server is offline for longer than the value of the Tombstone-
Lifetime attribute, its copy of Active Directory (or the global catalog) may contain
objects that have been deleted on the other DCs. However, the other DCs no longer
remember that the objects have been deleted. When you bring the offline DC online, it
synchronizes its copy of Active Directory with the rest of the domain. Because the
information about the deletions has been discarded, the DC replicates the affected
objects (referred to as lingering objects) back to the rest of the domain.
DCs and global catalog servers can also use a strict replication consistency model. Under
this model, when the DC receives a replicated object that does not already exist in the
local DIT, the DC stops receiving or sending replicated data and logs events such as
Event ID 1084, "There is no such object on the server." For more information about strict
replication consistency, including the circumstances under which DCs may use this
model by default, see KB 910205, Information about lingering objects in a Windows
Server Active Directory forest . For more information about tombstone issues, see
KB216993 Useful shelf life of a system-state backup of Active Directory .
It is easy to remove lingering objects for read/write naming contexts. In Windows Server
2003 and later versions, you can remove lingering objects by using the command
repadmin /removelingeringobjects . For information about how to use RepAdmin, see
This article describes how to remove lingering objects that have already appeared in
read-only naming contexts such as directory partitions on global catalog servers or
Read-Only Domain Controllers (RODCs). The functionality discussed in the More
information section still exists in newer operating systems and might still be useful to
troubleshoot unexpected RepAdmin behavior.
More information
This procedure requires the objectGUID of a DC that has a read/write copy of the
object, and the objectGUID of the object itself. If you must remove more than one
object, determine whether any of the objects are in a parent/child relationship (you can
determine this from the objects' distinguished names). If this is the case, order the
deletions so that all of the child objects are deleted before their parent objects.
This procedure has three mains steps, which you have to perform on a computer that
has access to the forest (and you have to use a user account that has administrative
permissions on the forest):
) Important
Each global catalog server on which you intend to run the delete operations (step
3) must have network connectivity to the domain controller that you identified
(step 2).
1. Start Ldp.exe.
In most versions of Windows, select Start > Run and enter ldp.exe. In older
versions of Windows (such as Windows Server 2003 SP1) this tool is available as
one of the Support Tools.
2. Select Connection > Connect. In the Server box, type the name of a global catalog
server. In the Port box, type 3268, and then select OK.
3. Select Connection > Bind. Type valid credentials if your current credentials are not
sufficient to query all of the global catalog contents. Select OK.
4. Select View > Tree. Enter the distinguished name of the forest root and then select
OK.
5. In the tree list, right-click the forest root and then select Search.
6. In the Filter box, type a filter that uses the <attribute> = <value> format.
In the filter text, <attribute> represents the object attribute to be searched, and
<value> represents the criteria for which you are searching. You can use ***** as a
wildcard character in the value, and you can use an expression.
For information about Lightweight Directory Access Protocol (LDAP) filter syntax,
see Search Filter Syntax.
For example, to find objects for which the sAMAccountName attribute has a value
of testuser, type (sAMAccountName = testuser) in the Filter box. To search for a
user object, the following attributes are most useful:
cn
userPrincipalName
sAMAccountName
name
mail
sn
To search for a group object, the following attributes are most useful:
cn
sAMAccountName
name
8. Select the Attributes box and then select the end of the attribute string. Type
;objectGUID at the end of the string.
In some versions of Ldp, you have to select Options to see the Attributes box.
10. Determine which, if any, of the objects that are listed in the results should be
removed from the global catalog. One indication that you have found a bad object
is that the object does not exist on a read/write copy of the naming context.
11. If the objects that you are looking for are not included in the query results,
rephrase the filter and run the search again.
12. If you have identified a lingering object, note the values of its DN and objectGUID
attributes. You will need those values later.
1. Check the dc= portions of the DN value. Combine the dc= portions to obtain the
domain name.
2. To locate a DC (or a global catalog server) in this domain, open Active Directory
Users and Computers, open the domain container, and then open the Domain
Controllers container.
3. Open an elevated Command Prompt window and enter repadmin /showreps dc-
name .
7 Note
In this command, dc-name represents the computer name of the DC that you
identified in step 2.
4. Note the value of the DSA object GUID. This is the objectGUID value of the DC.
3. Select Connection > Bind. Leave all of the boxes empty (you are already signed in
as an Enterprise Administrator).
c. In the Values box, type a value that uses the following format:
<GUID=dcGUID>: <GUID=objectGUID>
In this value, dcGUID represents the GUID of the DC that you identified in step 2
of this section, and objectGUID represents the GUID of the lingering object that
you identified in step 1 of this section.
<GUID=<GUID>>: <GUID=<GUID>>
) Important
In the value, do not omit the spaces before and after the colon.
e. Select Run.
The results appear in the main Ldp window, and should resemble the following.
1. Create a new folder, and in that folder create new files that have the following
names:
Walkservers.cmd
Walkobjects.cmd
Modifyrootdse.vbs
Server-list.txt
Object-list.txt file
Console
vbs
'********************************************************************
'*
'* File: MODIFYROOTDSE.VBS
'* Created: January 2002
'* Version: 1.0
'*
'* Main Function: Writes Active Directory information to clean up
'* objects as per: Q314282.
'* Usage: Modifyrootdse.vbs <TargetServer> <GUID PAIR>
'* Parameter are fed into the script using a pair of batch files.
'*
'* Copyright (C) 2002 Microsoft Corporation '*
'********************************************************************
OPTION EXPLICIT
ON ERROR RESUME NEXT
Dim objDomain
Dim ObjValue, strServerName, adsLdapPath
Dim i
strServerName = Wscript.arguments.item(0)
ObjValue = Wscript.arguments.item(1)
WScript.Quit
7 Note
5. Create a list of all of the fully qualified domain names of the global catalog servers
and DCs that contain the lingering objects, and then paste the list into Server-
list.txt. Use the fully qualified domain names to avoid DNS suffix searches.
6. For each lingering object, identify a DC in the object domain that does not have a
copy of the lingering object. Usually this is a DC that has a read/write naming
context in which you manually deleted the lingering object. As described
elsewhere in this article, use RepAdmin to obtain the objectGUID value of each DC.
<GUID=dcGUID>: <GUID=objectGUID>
7 Note
In this value, dcGUID represents the GUID of the DC that does not have a
copy of the lingering object, and objectGUID represents the GUID of the
lingering object.
<GUID=<GUID>>: <GUID=<GUID>>
) Important
In the value, do not omit the spaces before and after the colon.
Because the lingering objects may not exist on every listed server, errors in the log files
do not necessarily indicate a problem. However, error messages of the form operation
refused or operation error indicate that there is a problem with the GUIDs or with the
syntax of the value. If these errors occur, verify the following:
Make sure that the DC GUIDs are the correct GUIDs for domain controllers that
contain a read/write naming context of the domain that contains the object.
Make sure that the object GUIDs identify lingering objects in read-only naming
contexts (global catalog servers or RODCs).
This error occurs when the script runs against the GUID of a DC that does not contain a
read/write naming context that corresponds to the naming context that contains the
lingering object. Verify the location of lingering object by the Ldp.exe tool.
Example
The following search produces multiple objects that represent the same user (Joe), and
lists their objectGUID values.
<GUID=<GUID>> : <GUID=<GUID>>
The first GUID is the GUID of the domain controller in the corp.company.local domain.
The second GUID is the GUID of the lingering object. After this change, the Walk-
servers.cmd script runs successfully.
This error might occur when you find objects are in fact not appearing on all DCs that
host the naming context, but repadmin /removelingeringobjects does not remove them.
This can be a situation when a hub DC replicates new objects it created with global
catalog servers, but not with read/write replica DCs in its own domain.
For an example of the second case, consider a global catalog server that has the
following metadata:
Loc.USN Originating DC Org.USN Org.Time/Date Ver Attribute
======= =============== ========= ============= ===
=========
143543261 d20f71f3-6147-4f80-a0c2-470541ef09e6 104742409 <DateTime>
objectClass
Up-To-Dateness Vector of a RW-replica: d20f71f3-6147-4f80-a0c2-470541ef09e6 @
USN 104583382 @ Time <DateTime>
Up-To-Dateness Vector of a GC: d20f71f3-6147-4f80-a0c2-470541ef09e6 @ USN
104762881 @ Time <DateTime>
In this case the DC created the object after replication with the DCs in its own domain
started failing, but it still replicated with global catalog servers in other domains.
To resolve this issue, let these objects become real lingering objects (aged beyond TSL)
and then remove them using the script in this article. To make sure that the data
continues to replicate, set Allow Replication With Divergent and Corrupt Partner on all
DCs in the forest.
If you cannot resolve the errors in the log files by using these methods, you may be
experiencing a different problem. Contact Microsoft Product Support Services for
additional assistance.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you manually replicate data
between domain controllers.
7 Note
This article applies to Windows 2000. Support for Windows 2000 ends on July 13,
2010. The Windows 2000 End-of-Support Solution Center is a starting point for
planning your migration strategy from Windows 2000. For more information, see
the Microsoft Support Lifecycle Policy.
Symptoms
When you use the Active Directory Sites and Services snap-in to manually replicate data
between Windows 2000 domain controllers, you may receive one of the following error
messages:
Or
Access is denied
In addition, the following event ID messages may be logged in the system log:
Output
Output
Resolution
To resolve this issue, first determine which domain controller is the current primary
domain controller (PDC) Emulator operations master role holder. To do this, use either
of the following methods:
Install the Netdom.exe utility from Windows 2000 Support Tools, and then run the
following command:
Console
Start the Active Directory Users and Computers snap-in, right-click the domain,
and then click Operations Masters. Click the PDC tab; the current role holder is
displayed in the Operations Master window. On this tab, you can change the
operations master role to the current computer in the second window (if this
computer is not the current holder).
Use the Ntdsutil.exe utility (that is included in Windows 2000), and the Resource Kit
command-line utility. However, these interfaces are recommended for more
advanced users. For additional information, see How to find servers that hold
flexible single master operations roles.
On domain controllers that are experiencing this issue, disable the Kerberos Key
Distribution Center service (KDC):
1. Click Start, point to Programs, click Administrative Tools, and then click Services.
2. Double-click KDC, set the startup type to Disabled, and then restart the computer.
After the computer restarts, use the Netdom utility to reset the secure channels between
these domain controllers and the PDC Emulator operations master role holder. To do so,
run the following command from the domain controllers other than the PDC Emulator
operations master role holder:
Console
Where server_name is the name of the server that is the PDC Emulator operations
master role holder.
After you reset the secure channel, restart the domain controllers. Even if you attempt to
reset the secure channel using the Netdom utility, and the command does not complete
successfully, proceed with the restart process.
If only the PDC Emulator operations master role holder is running, the KDC forces the
other domain controllers to resynchronize with this computer, instead of issuing
themselves a new Kerberos ticket.
After the computers have finished restarting, start the Services program, restart the KDC
service, and then attempt replication again.
More information
If there are multiple domain controllers in the domain, the error message that you
receive when this issue occurs varies depending on which way replication is being
attempted, and if one of the domain controllers that is involved is also the PDC Emulator
operations master role holder.
In some cases, when you use the net view \\computername to attempt to connect to the
domain controller that has the PDC Emulator operations master role from another
domain controller, you may receive an "Access denied" error message. However, if you
use the Internet protocol (IP) address, the command may succeed.
When this problem occurs, numerous errors may be reported in the event logs. These
errors vary depending on any of the following conditions:
The domain controller was not fully functional before the problem occurred.
The domain controller did not successfully completed the Active Directory
Installation Wizard process.
The Sysvol folder on the domain controller was not shared out.
The domain controller did not have the full file structure under the Domain_name
folder and the Policies folder that is located in
%SystemRoot%\Sysvol\Sysvol\Domain_name\Policies. The following event is an
example of an event that may be reported:
Output
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes how to modify the default intra-site domain controller replication
interval.
More information
When a domain controller writes a change to its local copy of the Active Directory, a
timer is started that determines when the domain controller's replication partners
should be notified of the change. By default, this interval is 15 seconds in Windows
Server 2003 and later versions. When this interval elapses, the domain controller initiates
a notification to each intra-site replication partner that it has changes that need to be
propagated. Another configurable parameter determines the number of seconds to
pause between notification. This parameter prevents simultaneous replies by the
replication partners. By default, this interval is 3 seconds in Windows Server 2003 and
later versions, when the forest functional level is Windows Server 2003 or a higher
functional level. Both of these intervals can be modified by editing the registry.
2 Warning
This article contains information about how to modify the registry. Make sure that
you back up the registry before you modify it. Make sure that you know how to
restore the registry if a problem occurs. For more information about how to back
up, restore, and modify the registry, see Windows registry information for
advanced users.
To change the delay between the change to the Active Directory and first replication
partner notification, use Registry Editor to change the value data for the "Replicator
notify pause after modify (secs)" DWORD value in the following registry key:
Path: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
Key: Replicator notify pause after modify (secs)
Value: REG_DWORD
To change the notification delay between domain controllers, use Registry Editor to
change the value data for the "Replicator notify pause between DSAs (secs)" DWORD
value in the following registry key:
Path: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
Key: Replicator notify pause between DSAs (secs)
Value: REG_DWORD
7 Note
A setting also applies to Active Directory Application Mode (ADAM) and Active
Directory Lightweight Directory Services (AD LDS). For ADAM and for AD LDS, the
registry key is in the ADAM instance "Parameters" registry key.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
Symptoms
When troubleshooting another issue, we found NTDS warning event ID 1093.
Object:
CN=user01,OU=OU1,OU=OU2,OU=Users,DC=contoso,DC=com
Object GUID:
<GUID>
Attribute:
24 (userCertificate)
The current value (without changes) of the attribute on this domain controller will
replicate to all other domain controllers. This will counteract the change to the rest
of the replicated forest. The reversal values may be recognized as follows:
Version:
10277
Time of change:
<DateTime>
Update sequence number:
614514713
For more information, see Help and Support Center at
https://go.microsoft.com/fwlink/events.asp .
This warning event ID 1093 indicates that the incoming change will not be replicated on
the current domain controller and it will be reversed. That is, the incoming updates on
the related object will be aborted to complete the AD replication. This warning will not
influence the AD replication.
Cause
The userCertificate attribute of the identified user (user01) holds a large number of
certificates, which is exceeding the maximum object record size.
Resolution
To solve the issue, the unwanted certificates need to be removed from userCertificate
attribute of the user object in Active Directory.
To identify which certificates are unwanted, you can refer to the method in the following
section.
More information
You may use this method to export the user data of the user object who reach the
maximum object size. Then identify the related certificates by the scripts and decide
which unwanted certificates can be deleted from this user object.
1. Export the user data by running the command on one of the domain controllers:
(output user_data.txt)
Console
VB
Option explicit
Const strVBSfile = "LDF2Certs.vbs"
Const ForReading = 1
Const StatusLookingForStart = 0
Const StatusLookingForEnd = 1
Dim strLDFFile
Call CommandParser()
WScript.Echo "!Open the input LDF file " & strLDFFile
Dim oFS
Set oFS = CreateObject("Scripting.FileSystemObject")
Dim objLDFFile
Set objLDFFile = oFS.OpenTextFile(strLDFFile, ForReading, False)
Dim strReadLine, lngStatus, objCertFile, lngCertNumber, strCertFile
lngStatus = StatusLookingForStart
lngCertNumber = 0
Do While objLDFFile.AtEndOfStream <> True
strReadLine = objLDFFile.ReadLine
If lngStatus = StatusLookingForEnd Then
If Not IsNull(strReadLine) Then
If InStr(strReadLine,":") > 0 Then
objCertFile.Close
Set objCertFile = Nothing
lngCertNumber = lngCertNumber + 1
lngStatus = StatusLookingForStart
Else
objCertFile.Write strReadLine
End If
End If
End If
If lngStatus = StatusLookingForStart Then
If Not IsNull(strReadLine) Then
If InStr(strReadLine,"userCertificate::") > 0 Then
WScript.Echo "!Found " & (lngCertNumber + 1) & " certificate"
strCertFile = "Cert" & Right("0000" & CStr(lngCertNumber), 4) &
".cer"
Set objCertFile = oFS.CreateTextFile(strCertFile, True, False)
lngStatus = StatusLookingForEnd
End If
End If
End If
Loop
objLDFFile.Close
Set objLDFFile = Nothing
Dim WshShell
Set WshShell = WScript.CreateObject("WScript.Shell")
Sub CommandParser()'Glable variables: strLDFFile
If WScript.Arguments.Named.Exists("LDFFile") = True Then
strLDFFile = WScript.Arguments.Named.Item("LDFFile")
WScript.Echo "CommandParser: the LDF file name: " & strLDFFile
Else
Call ShowUsage()
End If
End Sub
Sub ShowUsage()
WScript.Echo " "
WScript.Echo "Usage: CScript " & strVBSfile & " /LDFFile:<Input LDF
file name, such as input.txt>"
WScript.Quit
End Sub
Console
4. Put two scripts (LDF2Certs.vbs and doit.bat) and the user data (user_data.txt) in the
same folder and run script doit.bat. After running the script, text file allcerts.txt will
be generated, which contains all the certificates in the user data with detailed
information. Meanwhile, all the certificates will be dumped as .cer files in the same
folder as well.
7 Note
It may take some time as there are lots of certificates need to be dumped.
5. You can identify the certificates with their text or UI format and decide with
certificates can be removed from this user object.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides help to fix an issue that occurs if a change that is made on the local
domain controller is also made on the domain controller that holds the PDC operations
master role.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 306091
Summary
Simultaneous changes against Active Directory object attributes on different domain
controllers may cause an Active Directory collision for the update. When this occurs,
NTDS replication warnings 1083 or 1061, or SAM error ID 12294 may be logged.
More information
The following events may be logged if immediate replication is triggered (for example,
by an urgent replication for a user lockout condition) and collides with the local Active
Directory update:
This indicates that the unsuccessful attempt of the remotely triggered update that will
be retried later:
Event Type: Warning
Event Source: NTDS Replication
Event Category: Replication
Event ID: 1061
Description:
Internal error: The directory replication agent (DRA) call returned error 8438.
(decimal 8438 / hex 0x20f6: ERROR_DS_DRA_BUSY, winerror.h)
If advanced NTDS logging is enabled, the following error ID may also be logged:
If NTDS logging is set to 4 (Verbose) or higher in the Replication Events entry of the
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Diagnostics\ subkey, the
following error ID may also be logged:
If the remotely triggered update wins against the local update, the following system
event may be logged for a user account lockout:
You must analyze the error data to receive the correct error condition. DWord data
hexadecimal 0xc00002a5 = decimal -1073741147: STATUS_DS_BUSY, ntstatus.h).
After the warnings, an NTDS information event is logged that reports that the queued
update has already been made (with the same version ID) and is be ignored as
redundant:
When this condition exists, no replication error has occurred. Active Directory is
consistent and you can safely ignore the resulting event logs.
On a computer that is running Microsoft Windows Server, you can also determine
whether a replication error has occurred by exporting the replication meta-data of the
object. To do this, run the following command at a command prompt:
Console
7 Note
In the output that this command generates, match the last update times of the attribute
to the times that the events were logged. From this information, you can determine
which attribute caused the replication error.
Generally, you experience this problem with the lockoutTime attribute or with one of the
password attributes. In these cases, you can safely ignore the events. The events occur
because the change that occurs on the primary domain controller (PDC) is also written
to the local domain controller. At the same time, the change is replicated among the
domain controllers. For lockoutTime, the change is replicated urgently in the site of the
PDC.
Because of the short replication notification intervals that you can have in Microsoft
Windows Server, you may experience a replication collision in the same site of the PDC.
Password changes are one example of a scenario in which you may experience a
replication collision. This behavior occurs because a domain controller forwards new
passwords to the PDC. Both the PDC and the local domain controller then replicate the
changed password information. Therefore, a replication collision may occur on another
domain controller in the same site. For more information about replication notification,
click the following article number to view the article in the Microsoft Knowledge Base:
214678 How to modify the default intra-site domain controller replication interval
To help reduce the generation of replication collision events, configure the PDC in a site
that does not have other domain controllers or client computers. In this scenario, the
PDC does not urgently replicate updates that it receives. Therefore, you may reduce the
risk of replication collisions. In a large domain, you can use this method to help reduce
the load on the PDC.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
Provide product feedback
NTFRS deprecation intentionally blocks
the installation of Windows Server
version 1709 replica DCs
Article • 02/19/2024
Symptom
When you use the Install-ADDSDomainController cmdlet to install a replica-domain
controller that's running Windows Server version 1709 to a NTFRS-enabled domain, the
installation fails, and you receive the following error message:
The specified domain %1 is still using the File Replication Service (FRS) which is
deprecated. This server does not support FRS and cannot be promoted as a replica
into the specified domain. You should migrate the specified domain to use DFS
Replication by using the DFSRMIG command before continuing.
If the Windows Server version is earlier than Windows Server version 1709, you receive
the following message:
The File Replication Service (FRS) is deprecated. To continue replicating the SYSVOL
folder, you should migrate to DFS Replication by using the DFSRMIG command. If
you continue to use FRS for SYSVOL replication in this domain, you might not be
able to add domain controllers running a future version of Windows Server.
Cause
This behavior is intended and by design and consistent with previous announcements
about the deprecation of NTFRS in future versions of Windows. Windows Server 2016 is
the initial release that ends support of NTFRS.
Resolution
Use the steps in the following article to migrate sysvol replication from FRS to DFSR:
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes an issue where Active Directory Replications fail with Win32 error
1753: "There are no more endpoints available from the endpoint mapper."
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft Community .
Symptoms
This article describes symptoms, cause, and resolution steps for AD operations that fail
with Win32 error 1753: "There are no more endpoints available from the endpoint
mapper."
1. DCDIAG reports that the Connectivity test, Active Directory Replications test, or
KnowsOfRoleHolders test has failed with error 1753: "There are no more endpoints
available from the endpoint mapper."
2. REPADMIN.EXE reports that replication attempt has failed with status 1753.
REPADMIN commands that commonly cite the 1753 status include but aren't
limited to:
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
The following sample output from REPADMIN /SHOWREPS shows that inbound
replication from CONTOSO-DC2 to CONTOSO-DC1 fails with the "replication
access was denied" error:
Default-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID:
DSA invocationID:
DC=contoso,DC=com
Default-First-Site-Name\CONTOSO-DC2 via RPC
DSA object GUID:
Last attempt @ <date> <time> failed, result 1753 (0x6d9):
There are no more endpoints available from the endpoint mapper.
<#> consecutive failure(s).
Last success @ <date> <time>.
3. The "Check Replication Topology" command in Active Directory Sites and Services
returns "there are no more endpoints available from the endpoint mapper."
The following error occurred during the attempt to contact the domain
controller: There are no more endpoints available from the endpoint mapper.
OK
4. The "replicate now" command in Active Directory Sites and Services returns "there
are no more endpoints available from the endpoint mapper."
Dialog message text: The following error occurred during the attempt to
synchronize naming context <directory partition name> from Domain
Controller <Source DC> to Domain Controller <Destination DC>: There are no
more endpoints available from the endpoint mapper
Buttons in Dialog: OK
ノ Expand table
NTDS 1655 Active Directory attempted to communicate with the following global
General catalog and the attempts were unsuccessful.
NTDS 1925 The attempt to establish a replication link for the following writable
KCC directory partition failed.
Cause
The diagram below shows the Remote Procedure Call (RPC) workflow. The workflow
starts with the registration of the server application with the RPC Endpoint Mapper
(EPM) in step 1. It ends with the passing of data from the RPC client to the client
application in step 7.
Steps 1 through 7 map to the following operations:
1. Server app registers its endpoints with the RPC Endpoint Mapper (EPM).
2. Client makes an RPC call on behalf of a user, OS, or application-initiated operation.
3. Client-side RPC contacts the target computers EPM and asks for the endpoint to
complete the client call.
4. Server Machine's EPM responds with an endpoint.
5. Client-side RPC contacts the server app.
6. Server app executes the call, returns the result to the client RPC.
7. Client-side RPC passes the result back to the client app.
Failure 1753 is generated by a failure between steps 3 and 4. Specifically, error 1753
means that the RPC client (destination DC) could contact the RPC Server (source DC)
over port 135, but the EPM on the RPC Server (source DC) couldn't locate the RPC
application of interest and returned server-side error 1753. The error indicates that the
RPC client (destination DC) received the server-side error response from the RPC Server
(AD replication source DC) over the network.
a lack of network connectivity between the RPC client (destination DC) and RPC
Server (source DC) over port 135.
a lack of network connectivity between the RPC server (source DC) using port 135
and the RPC client (destination DC) over the ephemeral port.
a password mismatch or the inability by the source DC to decrypt a Kerberos
encrypted packet.
Resolution
Stale NTDS Settings objects and bad name to IP mappings in DNS, WINS, Host, and
LMHOST files may cause the RPC client (destination DC) to connect to the wrong RPC
Server (Source DC). Furthermore, the bad name to IP mapping may cause the RPC client
(destination DC) to connect to a computer that doesn't even have the RPC Server
Application of interest (the Active Directory role in this case) installed. For example, a
stale host record for DC2 contains the IP address of DC3 or a member computer.
the object GUID for the source DC that exists in the destination DCs' copy of Active
Directory
the source DC object GUID stored in the source DCs' copy of Active Directory.
If there's a discrepancy, use repadmin /showobjmeta on the NTDS settings object to see
which one corresponds to last promotion of the source DC. Compare the following date
stamps:
You may have to use the last modify / create date of the DCPROMO.LOG file itself. If the
object GUIDs aren't identical, the destination DC may have a stale NTDS Settings object
for the source DC whose CNAME record refers to a host record with a bad name to IP
mapping.
On the destination DC, run IPCONFIG /ALL to determine which DNS Servers the
destination DC is using for name resolution:
Console
c:\>ipconfig /all
On the destination DC, run NSLOOKUP against the source DCs fully qualified DC CNAME
record:
Console
c:\>nslookup -type=cname \<fully qualified cname of source DC> <destination
DCs primary DNS Server IP >
c:\>nslookup -type=cname \<fully qualified cname of source DC> <destination
DCs secondary DNS Server IP>
Verify that the IP address returned by NSLOOKUP "owns" the host name / security identity
of the source DC.
OR
b) Sign in to the console of the source DC, run IPCONFIG from the CMD prompt and
verify that the source DC owns the IP address returned by the NSLOOKUP command
above.
Console
If the tests above or a network trace doesn't show a name query returning an invalid IP
address, consider stale entries in HOST files, LMHOSTS files, and WINS Servers. DNS
Servers can also be configured to perform WINS fallback name resolution.
DNS Server 53 √ √
Kerberos 88 √ √
Microsoft-DS 445 √ √
Active Directory and other applications also register services that receive dynamically
assigned ports in the RPC ephemeral port range. Such RPC server applications are
dynamically assigned TCP ports between 1024 and 5000 on Windows 2000 and
Windows Server 2003 computers. They are dynamically assigned TCP ports between
49152 and 65535 range on Windows Server 2008 and Windows Server 2008 R2
computers. The RPC port used by replication can be hard-coded in the registry using the
steps documented in MSKB 224196 . Active Directory continues to register with the
EPM when configured to use a hard-coded port.
Verify that the RPC Server application of interest has registered itself with the RPC
endpoint mapper on the RPC Server (the source DC in the case of AD replication).
There are many ways to accomplish this task. One is to install and run PORTQRY from
an admin privileged command prompt on the console of the source DC:
Console
In the portqry output, note the port numbers dynamically registered by the "MS NT
Directory DRS Interface" (UUID = 351...) for the ncacn_ip_tcp protocol. The snippet
below shows a sample output from a Windows Server 2008 R2 DC and the UUID /
protocol pair used by Active Directory highlighted in bold:
Other causes
1. Verify that the source DC is booted in normal mode. And verify that the OS and DC
role on the source DC have fully started.
2. Verify that the Active Directory Domain Service is running. If the service is currently
stopped or wasn't configured with default startup values, reset the default startup
values. Reboot the modified DC, and then retry the operation.
3. Verify that the startup value and service status for RPC service and RPC Locator is
correct for OS version of the RPC Client (destination DC) and RPC Server (source
DC). If the service is currently stopped or wasn't configured with default startup
values, reset the default startup values. Reboot the modified DC, and then retry the
operation.
ノ Expand table
Windows Server 2003, Server 2008, Server 2008 R2 Startup Value Service Status
4. Verify that the size of the dynamic port range hasn't been constrained. The
Windows Server 2008 and Windows Server 2008 R2 NETSH syntax to enumerate
the RPC port range is shown below:
Console
5. Review KB 224196 . Ensure that the hard-coded port falls within the ephemeral
port range for the source DC's OS version.
Console
More information
At frame 10, the destination DC queries the source DCs' end-point mapper over port 135
for the Active Directory replication service class UUID {E351...}
In frame 11, the source DC, in this case a member computer, doesn't yet host the DC
role. So it hasn't registered the {E351...} UUID for the Replication service with its local
EPM. The source DC responds with symbolic error EP_S_NOT_REGISTERED. This error
maps to decimal error 1753, hex error 0x6d9, and friendly error "there are no more
endpoints available from the endpoint mapper".
Later, the member computer with IP address x.x.1.2 gets promoted as a replica
"MayberryDC" in the contoso.com domain. Again, the "replicate now" command is used
to trigger replication, but this time fails with the on-screen error "the target principal
name is incorrect". The computer whose NIC owns the IP address x.x.1.2 is a domain
controller. It's currently booted into normal mode, and has registered the {E351...}
replication service UUID with its local EPM. But it doesn't own the name / security
identity of DC2, and can't decrypt the Kerberos request from DC1. So the request fails
with error "The target principal name is incorrect.". This error maps to decimal error
-2146893022, hex error 0x80090322.
Such invalid host-to IP mappings could be caused by stale entries in host / lmhost files,
host A / AAAA registrations in DNS or WINS.
Summary:
Example 1 failed because of an invalid host to IP mapping (in the HOST file in this
case). It caused the destination DC to resolve to a "source" DC that didn't have the
AD service running (or even installed for that matter). So the replication SPN wasn't
yet registered, and the source DC returned error 1753.
In the second case, an invalid host to IP mapping (again in the HOST file) caused
the destination DC to connect to a DC that had registered the {E351...} replication
SPN. But that source had a different hostname and security identity than the
intended source DC, so the attempts failed with error -2146893022: The target
principal name is incorrect.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Related Content
Service overview and network port requirements for the Windows Server system
Restricting Active Directory replication traffic and client RPC traffic to a specific
port
How to configure RPC dynamic port allocation to work with firewall
How RPC works
How to server prepares for a connection
How the client establishes a connection
Registering the interface
Making the Server available on the network
Registering endpoints
Listening for client calls
How the client establishes a connection
224196 Restricting Active Directory replication traffic and client RPC traffic to a
specific port
SPN for a target DC in AD DS
Feedback
Was this page helpful? Yes No
This article describes symptoms, cause, and resolution steps for AD operations that fail
with Win32 error 8524:
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft Community .
Symptoms
1. DCDIAG reports that Active Directory Replications test has failed with status 8524:
2. REPADMIN reports that a replication attempt has failed with status 8524.
REPADMIN commands that commonly cite the 8524 status include, but aren't
limited to:
REPADMIN /REPLSUM
REPADMIN /SHOWREPS
REPADMIN /SHOWREPL
3. One of the following events with the 8524 status are logged in the directory
service event log:
Active Directory events that commonly cite the 8524 status include but aren't
limited to:
ノ Expand table
4. Domain controllers log NTDS Replication event 2087 and NTDS Replication event
2088 in their Directory Service event log:
Active Directory Domain Services couldn't resolve the following DNS host
name of the source domain controller to an IP address. This error prevents
additions, deletions, and changes in Active Directory Domain Services from
replicating between one or more domain controllers in the forest. Security
groups, group policy, users, and computers and their passwords will be
inconsistent between domain controllers until this error is resolved. It
potentially affects logon authentication and access to network resources.
You should immediately resolve this DNS configuration error so that this
domain controller can resolve the IP address of the source domain controller
using DNS.
Cause
Error Status 8524 maps to the following error string:
It's a catch-all error for all possible DNS failures affecting Active Directory on post
Windows Server 2003 SP1 domain controllers.
other Active Directory events that cite the 8524 status if an Active Directory domain
controller is unable to resolve a remote DC by its fully qualified CNAME record (<object
guid for source DCs NTDS Settings object>._msdcs.<forest root domain>) using DNS.
domain controller is successfully resolved by its NetBIOS name but such name
resolution fallback only occurs when DNS name resolution fails.
1. The source DC is offline, or no longer exists, but its NTDS Settings object still exist
in the destination DCs' copy of Active Directory.
2. The source DC failed to register the CNAME or host records on one or more DNS
Servers because of the following reasons:
3. DNS client settings on the destination DC don't point to DNS Servers that either
host, forward or delegate the DNS zones containing the CNAME or host records
for the source DC
4. CNAME and host records registered by the source DC don't exist on DNS servers
queried by the destination DC because of the following reasons:
6. DNS Servers used by destination DC, source DC, or intermediate DNS Servers
aren't functioning properly.
Resolution
If the 8524 error/event refers to an inactive DC, remove the stale metadata for that DC
from the destination DCs' copy of Active Directory. An inactive DC is a DC install that no
longer exists on the network, but its NTDS Settings object still exists in the destination
DCs' copy of Active Directory -
Microsoft support regularly finds stale metadata for nonexistent DCs, or stale metadata
from previous promotions of a DC with the same computer name that hasn't been
removed from Active Directory.
1. Start the Windows Server 2008 or Windows Server 2008 R2 Active Directory Sites
and Services snap-in (DSSITE.MSC).
It can also be done by starting the Active Directory Sites and Services on a
Windows Vista or Windows 7 computer that has been installed as part of the
Remote Server Administration Tools (RSAT) package.
2. Focus the DSSITE.MSC snap-in on the destination DCs' copy of Active Directory.
After starting DSSITE.MSC, right-click the "Active Directory Sites and Services [<DC
Name>]
Select the destination DC that's logging the 8524 error/event from the list of DCs
visible in the "Change Domain Controller..." list
3. Delete the source DCs NTDS Settings object referenced in the 8524 errors and
events. Active Directory Users and Computers (DSA.MSC) snap-in and delete either
the source DCs NTDS Settings object.
Below the Sites, Site Name, Servers container, and %server name% container
Above the inbound connection object displayed in the right pane of Active
Directory Sites and Services.
The red highlight in the screenshot below shows the NTDS Settings object for
CONTOSO-DC2 located below the Default-First-Site-Name site.
Right-click the stale NTDS Settings object you want to remove, then select
"Delete."
Metadata cleanup can also be done from the W2K8 / W2K8 R2 Active Directory
Users and Computers snap-in as documented in TECHNET .
controller. This test isn't run as part of the default execution of DCDIAG.
1. Sign in with Enterprise Admin credentials to the console of the destination domain
controllers that log the 8524 events.
2. Open an administrative privileged CMD prompt, and then run DCDIAG /TEST:DNS
/F on the DC logging the 8424 status and the source DC that the destination DC is
replicating from.
To run DCDIAG against all DCs in a forest, type DCDIAG /TEST:DNS /V /E /F:<File
name.txt> .
To run DCDIAG TEST:DNS against a specific DC, type DCDIAG /TEST:DNS /V /S:<DC
NAME> /F:<File name.txt> .
3. Locate the summary table at the end of the DCDIAG /TEST:DNS output. Identify and
reconcile warning or failure conditions on the relevant DCs of the report.
4. If DCDIAG doesn't identify the root cause, take "the long way around" using the
steps below.
Check Active Directory Name Resolution using PING
Destination DCs resolve source DCs in DNS by their fully qualified CNAME records that
are derived from the object GUID of the remote DCs NTDS Settings object (the parent
object to connection objects visible in the Active Directory Sites and Services snap-in).
You can test a given DCs' ability to resolve a source DC fully qualified CNAME record
using the PING command.
1. Locate the objectGUID of the source DCs NTDS Settings object in the source DCs'
copy of Active Directory.
From the console of the source DC logging the 8524 error/event, type:
error (event)>
The "DSA Object GUID" field in the header of the repadmin /SHOWREPl command
contains the objectGUID of the source DCs current NTDS settings object. Use the
source DCs' view of its NTDS Settings Object in case replication is slow or failing.
The header of the repadmin output will look something like:
Default-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID: 8a7baee5-cd81-4c8c-9c0f-b10030574016 <- right click +
copy this string to the Windows
<- clipboard & paste into it the PING command in
<- step 4
2. Locate the ObjectGUID of the source DC in the destination DCs' copy of Active
Directory.
From the console of the destination DC logging the 8524 error/event, type:
REPADMIN /SHOWREPL output is shown below. The "DSA Object GUID" field is listed
Console
If the object GUIDS are the same, then the source DC and destination DC know
about the same instantiation (the same promotion) of the source DC. If they're
different, then figure which one was created later. The NTDS setting object with
the earlier create date is likely stale and should be removed.
From the console of the destination DC, test Active Directory's name resolution
with a PING of the source DCs fully qualified CNAME record:
Using our example of the 8a7baee5... objectGUID from the repadmin /showreps
output above from the contoso-dc1 DC in the contoso.com domain, the PING
syntax would be:
If ping works, retry the failing operation in Active Directory. If PING fails, proceed
to the "Resolve the 8524 DNS lookup failure" but retrying the PING test after each
step until it resolves.
The source DC
The destination DC
The DNS Servers used by the source and destination DCs
The source DC has registered the CNAME and host records with a valid DNS.
The destination DC points to valid DNS Servers.
The records of interest registered by source DCs are resolvable by destination DCs.
The error message text in DS RPC Client event 2087 documents a user action for
resolving the 8524 error. A more detailed action plan follows:
On the source DC, verify that DNS Client settings point exclusively to operational
DNS Severs that either host, forward or delegate the_msdcs.<forest root domain>
zone (that is, All DCs in the contoso.com forest register CNAME records in
the_msdcs.contoso.com zone)
AND
The DNS zone for the Active Directory domain (that is, a computer in the
contoso.com domain would register host records in contoso.com zone).
AND
The computers primary DNS suffix domain if different from the Active Directory
domain name (see Technet article Disjoint Namespace ).
Options to validate that a DNS Server hosts, forwards, or delegates (that is, "can
resolve") such zones include.
Start the DNS management tool for your DNS and verify the DNS Servers to
which the source DC points for name resolution host the zones in question.
Use NSLOOKUP to verify that all of the DNS Servers that the source DC points
to can resolve queries for the DNS zones in question.
Console
c:\>ipconfig /all
…
DNS Servers . . . . . . . . . . . : 10.45.42.99 <- Primary DNS
Server IP>
10.45.42.101<-
Secondary DNS Server IP>
Console
Console
Notes:
The SOA query for the _mscs.contoso.com zone will resolve correctly if the
targeted DNS has a good forwarder or delegation or for the_msdcs.<forest
root zone>. It won't resolve correctly if the _msdcs.<forest root zone> on the
DNS Server being queried is a non-delegated subdomain of <forest root
zone> that is the zone relationship created by Windows 2000 domains.
CNAME records are always registered in the _msdcs.<forest root zone>, even
for DC in non-root domains.
Configuring the DNS client of a DC or member computer to point to an ISP
DNS Server for name resolution is invalid. The only exception is that ISP has
been contracted (that is, paid), and is currently hosting, forwarding, or
delegating DNS queries for your Active Directory forest.
ISP DNS Servers typically don't accept dynamic DNS updates so CNAME,
Host, and SRV records may have to be manually registered.
Use step 1 from "Check Active Directory Name Resolution using PING" to locate
the current CNAME of the source DC.
Run ipconfig /all on the console of the source DC to determine to which DNS
Servers the source DC points for name resolution.
Console
c:\>ipconfig /all
…
DNS Servers . . . . . . . . . . . : 10.45.42.99
<primary DNS Server IP
10.45.41.101
<secondary DNS Server IP
Use NSLOOKUP to query the current DNS Servers for the source DCs' CNAME
record (found via the procedure in "Check Active Directory Name Resolution using
PING").
Console
In the example, the NTDS Settings objectGUID for contoso-dc2 in the contoso.com
domain is 8a7baee5-cd81-4c8c-9c0f-b10030574016. It points to "10.45.42.99" as
primary for DNS name resolution. The NSLOOKUP syntax would be:
Console
If the source DC hasn't registered its CNAME record on the DNS Servers it points
to for name resolution, run the following command from the source DC. Then
recheck the registration of the CNAME record:
Console
Notes:
CNAME records are always registered in the _msdcs.<forest root zone>, even
for DC in non-root domains.
CNAME records are registered by the NETLOGON Service during OS startup,
NETLOGON service startup, and recurring intervals later.
Each promotion of a DC with the same name may create a new NTDS
Settings object with a different objectGUID that therefore registers a different
CNAME record. Verify registration of the CNAME record based the last
promotion of the source DC vs. the objectGUID for the NTDS Settings object
on the destination DC if the source has been promoted more than 1x.
Timing issues during OS startup can delay successful Dynamic DNS
registration.
If a DC's CNAME record was successfully registered, but later disappears,
check KB953317 . Duplicate DNS zones in different replication scopes or
overly aggressive DNS scavenging by the DNS Server.
If the CNAME record registration is failing on the DNS servers to which the
source DC points for name resolution, review NETLOGN events in the SYSTEM
event log for DNS registration failures.
From the console of the source DC, run ipconfig /all to determine to which DNS
Servers the source DC points for name resolution.
Console
c:\>ipconfig /all
…
DNS Servers . . . . . . . . . . . : 10.45.42.99 <- Primary DNS Server
IP>
10.45.42.101<- Secondary DNS
Server IP>
Use NSLOOKUP to query the current DNS Servers for the host record.
Console
Continuing the example for the hostname for contoso-dc2 in the contoso.com
domain is 8a7baee5-cd81-4c8c-9c0f-b10030574016 and points to self (127.0.0.1)
as primary for DNS name resolution, the NSLOOKUP syntax would be:
Console
Repeat the NSLOOKUP command against the source DCs secondary DNS Server IP
address.
To dynamically register host "A" records, type the following command from the
console of the computer:
Console
c:\>ipconfig /registerdns
Notes:
Windows 2000 through Windows Server 2008 R2 computers all register IPv4
host "A" records.
Windows Server 2008 and Windows Server 2008 R2 computers all register
IPv6 host "AAAA" records.
Host "A" and "AAAA" records are registered in the computers primary DNS
suffix zone.
Disable NICs that don't have network cables attached.
Disable host record registration on NICs that aren't accessible to DCs and
member computers on the network.
It isn't supported to disable the IPv6 protocol by unchecking the IPv6
checkbox in the network card properties.
4. Verify that the destination DC points to valid DNS Servers
On the destination DC, verify that DNS Client settings point exclusively to currently
online DNS Severs that either host, forward and delegate the _msdcs.<forest root
domain> zone (that is, all DCs in the contoso.com forest register CNAME records
in the_msdcs.contoso.com zone).
AND
The DNS zone for the Active Directory domain (that is, a computer in the
contoso.com domain would register host records in contoso.com zone).
AND
The computers primary DNS suffix domain if different from the Active Directory
domain name (see Technet article Disjoint Namespace ).
Options to validate that a DNS Server hosts, forwards, or delegates (that is, "can
resolve") such zones include:
Start the DNS management tool for your DNS and verify the DNS Servers to
which the source DC points for name resolution host the zones in question.
OR
Use NSLOOKUP to verify that all of the DNS Servers that the source DC points
to can resolve queries for the DNS zones in question.
Console
c:\>ipconfig /all
…
DNS Servers . . . . . . . . . . . : 10.45.42.102 <- Primary DNS
Server IP>
Run the following NSLOOKUP queries from the console of the destination DC:
Console
Console
Notes:
The SOA query for the _mscs.contoso.com zone will resolve correctly if the
targeted DNS has a good forwarder or delegation or for the_msdcs.<forest
root zone>. It won't resolve correctly if the_msdcs.<forest root zone> on the
DNS Server being queried is a non-delegated subdomain of <forest root
zone> that is the zone relationship created by Windows 2000 domains.
CNAME records are always registered in the _msdcs.<forest root zone>, even
for DC in non-root domains.
Configuring the DNS client of a DC or member computer to point to an ISP
DNS Server for name resolution is invalid. The only exception is that ISP has
been contracted (that is, paid) and is currently hosting, forwarding, or
delegating DNS queries for your Active Directory forest.
ISP DNS Servers typically don't accept dynamic DNS updates, so CNAME,
Host, and SRV records may have to be manually registered.
The DNS resolver on the Windows computers is by-design "sticky". It uses
DNS servers that are responsive to queries, regardless of whether such DNS
Servers host, forward, or delegate the required zones. Restated, the DNS
resolver won't fail over and query another DNS server as long as the active
DNS is responsive, even if the response from the DNS Server is "I either don't
host the record you're looking for or even host a copy of the zone for that
record".
5. Verify that the DNS Server used by the destination DC can resolve the source
DCs CNAME and HOST records
From the console of the destination DC, run ipconfig /all to determine the DNS
Servers to which destination DC points for name resolution:
Console
c:\>ipconfig /all
…
DNS Servers . . . . . . . . . . . : 10.45.42.102 <- Primary DNS
Server IP>
10.45.42.103<- Secondary
DNS Server IP>
From the console of the destination DC, use NSLOOKUP to query the DNS Servers
configured on the destination DC for the source DCs CNAME and host records:
Console
Console
6. Review the relationship between the DNS Servers used by the source and
destination DCs
If the DNS Servers used by the source and destination host AD-integrated copies
of the _msdcs.<forest root> and <primary DNS suffix> zones, check for:
Replication latency between the DNS where the record was registered and
the DNS where the record is being queried.
A replication failure between the DNS where the record is registered and the
DNS being queried.
The DNS zone hosting the record of interest stays in different replication
scopes and therefore different contents, or is CNF / conflict-mangled on one
or more DCs.
If the DNS zones used by the source and destination DC are stored in primary and
secondary copies of DNS zones, check for:
The "allow zone transfers" checkbox isn't enabled on the DNS that hosts the
primary copy of the zone.
The "Only the following servers" checkbox is enabled, but the IP address of
the secondary DNS hasn't been added to the allowlist on the primary DNS.
The DNS zone on the Windows Server 2008 DNS hosting the secondary copy
of the zone is empty because of KB953317 .
If the DNS servers used by the source and destination DC have parent / child
relationships, check for:
Invalid delegations on the DNS that owns the parent zone that is delegating
to the subordinate zone.
Invalid forwarder IP addresses on the DNS server trying to resolve the
superior DNS zone (example: a DC in child.contoso.com trying to resolve host
records in conto.com zone staying on DNS Servers in the root domain).
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where an orphaned child domain controller
can't be replicated to other domain controllers.
Symptoms
A Microsoft Windows Server-based child domain is orphaned from the rest of the forest.
This child domain can receive changes that are replicated by domain controllers in the
parent (root) domain, but no domain controllers in the root domain or any other child
domains have knowledge of the domain controllers in the affected child domain.
When an administrator tries to view the domain controllers in the orphaned child
domain from another domain, no domain controllers are displayed. For example, no
domain controllers are displayed in the following configuration naming context:
CN=Servers,CN= Site_Name,CN=Sites,CN=Configuration,DC= Domain_Name,DC=com
In this case, Site_Name and Domain_Name are attributes of the orphaned domain.
Cause
This issue may occur if the child domain is orphaned from the parent domain.
Resolution
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
To resolve this issue, you must create a replication link and then enable one-way
authentication instead of two-way authentication. To do this, follow these steps:
1. On a domain controller in the root domain, add the Replicator Allow SPN Fallback
registry value. To do this, follow these steps on the domain controller.
a. Select Start > Run, and then enter regedt32.
b. Select the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Console
repadmin /options
fully_qualified_domain_name_(FQDN)_of_the_root_domain_controller
+DISABLE_NTDSCONN_XLATE
repadmin /add CN=Configuration,DC=Domain_Name,DC=Domain_Name
FQDN_of_the_root_domain_controller FQDN_of_the_child_domain_controller
repadmin /showreps
7 Note
4. Remove the Replicator Allow SPN Fallback registry entry. To do this, follow these
steps:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
b. Right-click Replicator Allow SPN Fallback, select Delete, and then select OK.
5. Force replication between all domain controllers in the root domain. To do this,
follow these steps:
a. On a domain controller in the root domain, select Start > Programs >
Administrative Tools > Active Directory Sites and Services.
b. Expand Sites > Servers, expand your Server_Name folder, and then select NTDS
Settings.
c. If there are other domain controllers in your environment to replicate, they will
be listed in the right pane. Right-click the first domain controller in the list,
select All Tasks, and then select Check Replication Topology to start the
Knowledge Consistency Checker (KCC).
6. Allow replication to occur throughout the forest. Then, run the repadmin /showreps
command on the root domain controller and on the child domain controllers. This
step makes sure that Active Directory Directory Service (AD DS) replication is
successful.
The Replication Allow SPN Fallback registry entry enables the domain controller to use
one-way authentication if two-way authentication cannot be performed because of a
failure to resolve a Service Principal Name (SPN) to a computer account.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article helps fix the error 1722 of Active Directory replication.
Symptoms
This article describes the symptoms, cause, and resolution for resolving Active Directory
replication failing with Win32 error 1722: The RPC server is unavailable.
Output
2. DCDIAG reports that the Active Directory Replications test has failed with error
1722: The RPC Server is unavailable.
Output
3. REPADMIN.EXE reports that replication attempt has failed with status 1722 (0x6ba).
REPADMIN commands that commonly cite the -1722 (0x6ba) status include but are
not limited to:
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
Sample output from REPADMIN /SHOWREPS and REPADMIN /SYNCALL depicting The
RPC server is unavailable error is shown below:
Console
Sample output of REPADMIN /SYNCALL depicting The RPC server is unavailable error
is shown below:
Console
C:\>repadmin /syncall
CALLBACK MESSAGE: Error contacting server \<object guid of NTDS
Settings object>._msdcs.\<forest root domain>.\<top level domain>
(network error): 1722 (0x6ba):
The RPC server is unavailable.
4. The replicate now command in Active Directory Sites and Services returns The RPC
server is unavailable.
Right-clicking on the connection object from a source DC and choosing replicate
now fails with The RPC server is unavailable. The on-screen error message is
shown below:
Active Directory events that commonly cite the 1722 status include but are not
limited to:
ノ Expand table
Cause
RPC is an intermediate layer between the network transport and the application
protocol. RPC itself has no special insight into failures but attempts to map lower layer
protocol failures into an error at the RPC layer.
Resolution
Basic troubleshooting steps to identify the problem.
Verify the startup value and service status are correct for
RPC, RPC Locator, and Kerberos Key Distribution Center
Verify the startup value and service status are correct for the Remote Procedure Call
(RPC), Remote Procedure Call (RPC) Locator and Kerberos Key Distribution Center.
The OS version will determine the correct values for the source and destination system
that is logging the replication error. Use the following table to help validate the settings.
ノ Expand table
Not started /
Manual(Member
Servers)
If you make any changes to match the settings above, restart the machine. Verify both
the startup value and service status match the values documented in the table above.
ノ Expand table
If the ClientProtocols key or any of the four default values are missing, import the key
from a known good server.
The DCDIAG /TEST:DNS command can validate DNS health of Windows 2000 Server
(SP3 or later), Windows Server 2003, and Windows Server 2008 family domain
controllers. This test was first introduced with Windows Server 2003 Service Pack 1.
Authentication (Auth)
Basic ( Basc )
Delegations (Del)
Sample output:
Output
Output
Domain: fragale.contoso.com
DC1 PASS PASS FAIL PASS PASS PASS n/a
Domain: child.fragale.contoso.com
DC2 PASS PASS n/a n/a n/a PASS n/a
The summary provides remediation steps for the more common failures from
this test.
Explanation and additional options for this test can be found at Domain
Controller Diagnostics Tool (dcdiag.exe).
domain controller location rather than using the cache. You can also specify
options such as /gc or /pdc to locate a Global Catalog or a primary domain
controller emulator. For finding the Global Catalog, you must specify a tree name,
which is the DNS domain name of the root domain.
Sample output:
Output
DC: [\DC.fabrikam.com]
Address: \\<IP Address>
Dom Guid: 5499c0e6-2d33-429d-aab3-f45f6a06922b
Dom Name: fabrikam.com
Forest Name: fabrikam.com
Dc Site Name: Default-First-Site-Name
Our Site Name: Default-First-Site-Name
Flags: PDC GC DS LDAP KDC TIMESERV WRITABLE DNS_DC DNS_DOMAIN
DNS_FOREST CLOSE_SITE
The command completed successfully
Netdiag -v
Can be used with Windows 2003 and earlier versions to gather specific information
for networking configuration and error. This tool takes some time to run when
executing the -v switch.
Output
ping -a <IP_of_problem_server>
It's a simple quick test to validate the host record for a domain controller is
resolving to the correct machine.
dnslint /s IP /ad IP
DNSLint is a Windows utility that helps you to diagnose common DNS name
resolution issues. The output is an htm file with much information including:
Output
IP Address: 127.0.0.1
UDP port 53 responding to queries: YES
TCP port 53 responding to queries: Not tested
Answering authoritatively for domain: NO
Output
Alias (CNAME) and glue (A) records for forest GUIDs from server:
CNAME: 98d4aa0c-d8e2-499a-8f90-9730b0440d9b._msdcs.fabrikam.com
Alias: DC.fabrikam.com
Glue: <IP Adress>
CNAME: a2c5007f-7082-4adb-ba7d-a9c47db1efc3._msdcs.fabrikam.com
Alias: dc2.child.fabrikam.com
Glue: <IP Address>
ノ Expand table
* This is the range in Windows Server 2008, Windows Vista, Windows 7, and Windows
2008 R2.
Portqry can be used to identify if a port is blocked from a Dc when targeting another
DC. It can be downloaded at PortQry Command Line Port Scanner Version 2.0 .
Example syntax:
If the Dynamic Port range has ports being blocked, use the below links to configure a
port range that is manageable for the customer.
Additional important links for configuration and working with Firewalls and Domain
Controllers:
For more information, see How to force Kerberos to use TCP instead of UDP in
Windows .
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Paramet
ers and
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters
Additional Troubleshooting:
If the above don't provide a solution to the 1722, use the following Diagnostic logging
to gather more information:
Output
Windows Server 2003 SP2 computers logs extended RPC Server info in NTDS
Replication events 1960, 1961, 1962 and 1963.
Crank up NTDS Diagnostic logging
1 = basic, 2 and 3 add continually verbose info and 5 logs extended info.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
References
RPC Return Values
Understanding Extended Error Information
Extended error information detection locations
Enabling Extended error information
Network Connectivity
Feedback
Was this page helpful? Yes No
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, please ask the Microsoft
Community .
Summary
This error occurs when the source domain controller doesn't decrypt the service ticket
provided by the destination (target) domain controller.
Top cause
The destination domain controller receives a service ticket from a Kerberos Key
Distribution Center (KDC). And the KDC has an old version of the password for the
source domain controller.
Top resolution
1. Stop the KDC service on the destination domain controller. To do it, run the
following command at a command prompt:
Console
Using repadmin :
Console
Console
3. Start the Kerberos KDC service on the destination domain controller by running the
following command:
Console
If it doesn't resolve the issue, see the Resolution section for an alternative solution in
which you use the netdom resetpwd command to reset the computer account password
of the source domain controller. If these steps don't resolve the problem, review the rest
of this article.
Symptoms
When this problem occurs, you experience one or more of the following symptoms:
DCDIAG reports that the Active Directory replications test has failed and returned
error -2146893022: The target principal name is incorrect.
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
Sample output from REPADMIN /SHOWREPS and REPADMIN /SYNCALL that indicate
the target principal name is incorrect error is as follows:
Console
Active Directory events that commonly cite the -2146893022 status include but
aren't limited to the following ones:
ノ Expand table
NTDS Inter-site Messaging 1373 The Intersite Messaging service could not
receive any messages for the following
service through the following transport. The
query for messages failed.
Cause
The -2146893022\0x80090322\SEC_E_WRONG_PRINCIPAL error code isn't an Active
Directory error. It may be returned by the following lower layer components for different
root causes:
RPC
Kerberos
SSL
LSA
NTLM
A bad name-to-IP mapping in DNS, WINS, HOST, or LMHOST file. It caused the
destination domain controller to connect to the wrong source domain controller in
a different Kerberos realm.
The KDC and source domain controller have different versions of the source
domain controller's computer account password. So the Kerberos target computer
(source domain controller) couldn't decrypt Kerberos authentication data sent by
the Kerberos client (destination domain controller).
The KDC couldn't find a domain to look for the source domain controller's SPN.
Resolution
Run dcdiag /test:checksecurityerror on the source DC
other errors.
Run this command on the console of all source domain controllers that fail
outbound replication with the SEC_E_WRONG_PRINCIPAL error.
You can check SPN registration against a specific location by using the following
syntax:
Console
Verify that Kerberos encrypted network traffic reached the intended Kerberos
target (name-to-IP mapping)
The domain controllers query the active DNS server for a matching DC GUIDED
CNAME record. Then it's mapped to a host A/AAAA record that contains the
source domain controller's IP address.
The following situations can all cause a destination domain controller to submit
Kerberos-encrypted traffic to the wrong Kerberos target:
To check for this condition, either take a network trace or manually verify that name
DNS/NetBIOS name queries resolve to the intended target computer.
ノ Expand table
1 DC1 DC2 MSRPC MSRPC:c/o Request: unknown Call=0x5 Dest DC RPC call to
Opnum=0x3 Context=0x1 Hint=0x90 EPM on source DC
over 135
4 DC2 DC1 MSRPC MSRPC:c/o Bind Ack: Call=0x2 Assoc RPC Bind response
Grp=0x9E62 Xmit=0x16D0
Recv=0x16D0
F# SRC DEST Protocol Frame Comment
ノ Expand table
MSRPC MSRPC:c/o Alter Cont: MSRPC:c/o Alter Cont DC1 connects to AD Replication
UUID{E3514235-4B06-11D1- Resp: Call=0x2 Assoc Service on DC2 over the port
AB04-00C04FC2DCD2} Grp=0xC3EA43 Xmit=0x16D0 returned by the EPM on DC2.
DRSR(DRSR) Call=0x2 Recv=0x16D0
Ipv4: Src = x.x.x.245, Dest = Ipv4: Src = x.x.x.35, Dest Verify that AD replication source DC
x.x.x.35, Next Protocol = TCP, = x.x.x.245, Next Protocol (referred to as the Dest computer in
Packet ID =, Total IP Length = = TCP, Packet ID = 31546, the first column and Src computer in
0 Total IP Length = 278 column 2 owns the IP address cited
in the trace. It's x.x.x.35 in this
example.
ping 6f3f96d3-dfbf-4daf-9236-
4d6da6909dd2._msdcs.contoso.com
ノ Expand table
Command Comment
REPADMIN Note value of DSA Object GUID. It denotes the object GUID for the source
/SHOWREPS |MORE domain controllers NTDS Settings Object in the source domain controllers
copy of active Directory.
ノ Expand table
Command Comment
NSLOOKUP -type=CNAME <object guid of source DCs NTDS Verify that IP returned matches the IP
Settings object>._msdcs.<forest root DNS name> address of target DC listed above
<primary DNS Server IP> recorded from the console of the
source DC.
Repeat for each additional DNS Server IP configured on
the destination DC. Repeat for all DNS Servers IPs
configured on destination DC.
example: c:\>nslookup -type=cname 8a7baee5-cd81-
4c8c-9c0f-b10030574016._msdcs.contoso.com
152.45.42.103
nslookup -type=A+AAAA <FQDN of source DC> <DNS Check for duplicate host A records on
Server IP> all DNS Server IPs configured on the
destination DC.
nbtstat -A <IP address of DNS Server IP returned by Should return name of the source DC.
nslookup>
7 Note
The Kerberos target can't decrypt Kerberos authenticated data because of a password
mismatch.
This issue can occur if the password for the source domain controller differs between
the KDC and source domain controller's copy of the Active Directory directory. The
destination domain controller's copy of the source domain controller computer account
password may be stale if it's not using itself as the KDC.
Replication failures can prevent domain controllers from having a current password
value for domain controllers in a given domain.
Every domain controller runs the KDC service for their domain realm. For same realm
transactions, a destination domain controller favors getting Kerberos tickets from itself.
However, it may get a ticket from a remote domain controller. Referrals are used to get
Kerberos tickets from other realms.
The NLTEST /DSGETDC:<DNS domain of target domain> /kdc command that's run at an
elevated command prompt in close time proximity to a SEC_E_WRONG_PRINCIPAL
error can be used to quickly identify which KDC a Kerberos client is targeting.
The definitive way to determine which domain controller a Kerberos client got a ticket
from is to take a network trace. The lack of Kerberos traffic in a network trace may
indicate:
Kerberos tickets for the logged-on user account can be purged at an elevated command
prompt by using the KLIST purge command.
Kerberos tickets for the system account that are used by Active Directory replication can
be purged without a restart by using KLIST -li 0x3e7 purge .
Domain controllers can be made to use other domain controllers by stopping the KDC
service on a local or remote domain controller.
Console
Console
The netdom resetpwd /server:<DC to direct password change to> /userd:<user name>
/passwordd:<password> command that's run at an elevated command prompt on the
console of the domain controller that requires a password reset can be used to reset
domain controller machine account passwords.
2. Stop the KDC on \\DC1 and \\DC2 to force off-box Kerberos traffic that can
be observed in a network trace. End-to-end replication occurs without errors.
3. Create a Host file entry for \\DC2 that points to the IP address of a DC in a
remote forest. It's to simulate a bad host-to-IP mapping in a host A/AAAA
record, or perhaps a stale NTDS Settings object in the destination domain
controller's copy of the Active Directory directory.
4. Start Active Directory Sites and Services on the console of \\DC1. Right-click
\\DC1's inbound connection object from \\DC2 and note the target account
name is incorrect replication error.
Repro steps for a source domain controller password mismatch between KDC and
the source domain controller.
2. Stop the KDC on \\DC1 and \\DC2 to force off-box Kerberos traffic that can
be observed in network trace. End-to-end replication occurs without error.
4. Reset the computer account password on \\DC2 three or more times so that
\\DC1 and \\DC2 both have the current password for \\DC2.
5. Start Active Directory Sites and Services on the console of \\DC1. Right-click
on \\DC1's inbound connection object from \\DC2 and note the target
account name is incorrect replication error.
Kerberos workflow
The client contacts the KDC with its TGT and requests a TGS Ticket for the target
domain controller.
The KDC searches the Global Catalog for a source (either e351 or hostname) in
the destination domain controller's realm.
If the target domain controller is in a different realm, the KDC provides the
client a referral ticket.
The client contacts a KDC in the target domain controller's domain and requests
a service ticket.
If the source domain controller's SPN doesn't exist in the realm, you receive a
KDC_ERR_S_PRINCIPAL_UNKNOWN error.
The destination domain controller contacts the target and presents its ticket.
If the target domain controller owns the name in the ticket and can decrypt it,
the authentication works.
If the target domain controller hosts the RPC server service UUID, the on-wire
Kerberos KRB_AP_ERR_NOT_US or KRB_AP_ERR_MODIFIED error is remapped
to the following one:
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a resolution to solve the Active Directory replication error (8452).
This article is only intended for technical support agents and IT professionals. If you're a
home user and looking for help with a problem, visit ask the Microsoft Community .
Symptoms
1. DCDIAG reports that Active Directory Replications test has failed with error status
code (8452): The naming context is in the process of being removed or is not
replicated from the specified server.
2. REPADMIN.EXE reports that the last replication attempt has failed with status 8452.
REPADMIN commands that commonly cite the five statuses include but aren't
limited to:
REPADMIN /SHOWREPS
REPADMIN /REPLSUM
REPADMIN /SYNCALL
Console
Default-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID: b6dc8589-7e00-4a5d-b688-045aef63ec01
DSA invocationID: b6dc8589-7e00-4a5d-b688-045aef63ec01
DC=contoso,DC=com
Default-First-Site-Name\CONTOSO-DC2 via RPC
DSA object GUID: 74fbe06c-932c-46b5-831b-af9e31f496b2
Last attempt @ <date> <time> failed, result 8452 (0x2104):
The naming context is in the process of being removed or is not
replicated from the specified server.
<#> consecutive failure(s).
Last success @ <date> <time>.
3. The replicate now command in Active Directory Sites and Services returns the
following error:
Dialog title text: Replicate Now Dialog message text: The following error
occurred during the attempt to synchronize naming context <%directory
partition name%> from Domain Controller <Source DC> to Domain Controller
<Destination DC>: The naming context is in the process of being removed or
is not replicated from the specified server.
ノ Expand table
NTDS 1586 The checkpoint with the PDC was unsuccessful. The checkpointing
General process will be retried again in four hours. A full synchronization of the
security database to downlevel domain controllers may take place if
this machine is promoted to be the PDC before the next successful
checkpoint. The error returned was: The naming context is in the
process of being removed or is not replicated from the specified
server.
Cause
This error most commonly occurs when the following replication topologies are
different:
The error naturally occurs when the replication topology in an Active Directory forest is
being modified by:
New partitions being added or removed from the forest. For example, the
promotion or demotion of the first/last DC in a domain. Or the addition/removal of
an application partition including default DNS application partitions.
The addition or removal of directory partitions on existing DCs (that is, the
promotion/demotion of global catalog or addition/removal of an application
partition).
The error can be persistent when replication failures prevent the end-to-end replication
of topology changes in the forest.
Windows 2000 domain controllers are particularly prone to this error during GC
demotion as they're slow to remove objects from read-only partitions. Object removal
during GC demotion improved dramatically on Windows Server 2003 and later OS
versions.
The primary domain controller (PDC) Flexible Single Master Operation (FSMO) role for
the domain has been seized or transferred to a domain controller that wasn't a direct
replication partner of the previous role holder.
In rare conditions, the error can be caused by corruption in attributes like hasMasterNCs
or msds-hasMasterNCs .
The More information section of this article contains explanations as to why the
diagnostic and administrative tools listed in the Symptoms section of this article
generate the 8452 error.
1. When DC1 <- DC2 replication is started for a Naming Context (NC), on DC1 there's
no replica link for the NC from DC2.
2. When DC1 <- DC2 replication in started for an NC, the NC is in the process of
being removed on DC2.
3. In mixed domain environment, the PDC FSMO role is transferred from DC2 to DC1,
but on DC1 there's no replica link from DC2.
Resolution
1. Wait. As mentioned, this condition is transient and doesn't normally warrant
troubleshooting.
Assume that replication topology changes of the type listed in the Cause section
are taking place in your Active Directory forest. In this situation, wait for the error
condition to correct itself with time.
2. Avoid the use of the repadmin /syncall command and equivalents until domain
controllers starting replication and the destination DCs being replicated to agree
source DCs and directory partitions being replicated.
4. Push and Pull changes connection object and partition changes around as
required.
5. Go Direct.
If the replicate now command from \DC3 to \DC2 when the DSSITE.MSC snap-in is
run from the console of \DC1 but focused on \DC4, cut out the middle men.
If the error is caused by root cause no. 3, then after the user gives the correct
input, the error won't happen. For example, in case no. 1 of scenario no. 3, if the
user input a correct <src DC> such that on <dest DC> there's a replica link from
<src DC> for <the NC>, the repadmin /replicate command will be executed
successfully.
7. REPADMIN /REPLICATE.
For NTDS Replication event 1586, transfer the DPC role to an Active Directory
domain controller that currently a direct replication partner of the previous domain
PDC.
More information
repadmin /syncall
The repadmin /syncall operation will cause a DC to start replication from all of its
source replication partners and make the source replication partners start replication
from all of their source replication partners, and so on.
For example, suppose we have a replication topology DC1 <- DC2 <- DC3. repadmin
/syncall on DC1 will start the following replication: DC2 <- DC3, and DC1 <- DC2.
There are two cases where error 8452 might be observed in this scenario:
Case 1: Change the replication topology to make DC2 inbound replicate from DC4 so
that the current topology becomes DC1 <- DC2 <- DC4.
If we call repadmin /syncall on DC1 before knowledge of the DC2 <- DC4 topology
change inbound replicates to DC1, the syncall operation will start DC2 <- DC3
replications because DC1 still has the old replication topology stored locally. On DC2 at
this moment, KCC has created a replica link from DC4 and has deleted the replica link
from DC3. So the replication from DC2 <- DC3 can't be executed and the operation logs
error 8452.
Case 2: Suppose an NC on DC3 is being removing while we call repadmin /syncall <the
NC> on DC1. DC2 <- DC3 replication will be started as before. Because the NC on DC3 is
in the process of being removed, it isn't a valid replication source, the error 8452 will be
observed.
Given the replication topology DC1 <- DC2 <- DC3, a connection object exists under
DC2's NTDS Settings object. This connection object represents the route for DC2 to
inbound replicate an NC (or multiple NCs) from DC3. If we right-click on this connection
object and select replicate now, we will start a DC2 <- DC3 replication on DC2.
As in the REPAMIN /SYNCALL example, there are also two cases where we might observe
error 8452.
Starting the Active Directory Sites and Services UI focused on DC1s copy of Active
Directory still shows that DC2 has an inbound connection object from source DC3.
Right-clicking on DCs inbound connection object from DC2 and choosing replicate now
will start a DC2 <- DC3 replication on DC2. However, the KCC on DC2 already removed
the replica link inbound replicating to DC2 from DC3 and created a replica link to DC2.
Because the replication attempt DC2 <-> DC2 can't be executed, the request fails error
8452.
There are two cases that we'll trigger error 8452 when the repadmin /replicate (or
sync ) command is used to start a replication:
Case 1: the <src DC> parameter isn't a replication partner of <dest DC> for <replicated
NC>. For example, we have to replication topology DC1 <- DC2 <- DC3 in which DC2
syncs an NC from DC3. If we call repadmin /replicate DC2 DC1 the NC, a replication
DC2 <- DC1 will be started. Because on DC2 we don't have a replica link from DC1 for
the NC, this replication can't be executed, and we'll get error 8452.
Case 2: the NC is being removed on src DC when we call repadmin /replicate <dest DC>
<src DC> <the NC> , so <src DC> isn't a valid replication source. So we'll see error 8452.
DCDIAG
The showrepl (or showreps ) command of repadmin reports the replication status for
each source DC from which the destination DC has an inbound connection object. The
replications test of dcdiag checks for timely replication between DCs. If error 8452 is in
repadmin /showrepl or dcdiag /test:replications report, the reason is that the
replicated NC is being removed on the source DC when the last replication happened.
the single point for replication to NT4 BDCs in a common domain. The PDC maintains a
checkpoint for each BDC representing the most recent replicated change. If the PDC
FSMO role is transferred to another Active Directory DC in the domain, the information
about each individual BDC's checkpoint must be replicated to the new PDC FSMO role.
So, the new PDC FSMO role holder must have a direct replication relationship with the
old PDC FSMO role holder. If the new PDC doesn't replicate directly with the old PDC
(that is, on the new PDC there's no replica link from old PDC), then we'll see error 8452
in event 1586.
Demotion
There's another scenario that DRAERR_NoReplica error will be returned. When we
demote a DC, it will use DC locator to find a DC to replicate local changes to. If the
found DC doesn't replicate directly with the being-deleted DC, DRAERR_NoReplica will
be returned and DC locator will be called to find a destination DC. In this scenario, the
error isn't logged so it isn't observed.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Related Links
How the Active Directory Replication Model Works
RepsFrom
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot a problem where Active Directory replication
fails and generates error 8453: Replication access was denied.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Summary
This error 8453 has the following primary causes:
7 Note
Top cause
For period or scheduled replication, if the destination domain controller is a Read-only
Domain Controller (RODC):
The Enterprise Read-Only Domain Controllers security group doesn't have Replicating
Directory Changes permissions on the root of the naming context (NC) for the partition
that doesn't replicate and returns error 8453.
Top solution
On each NC that RODCs don't replicate and that returns error 8453, grant Replicating
Directory Changes permissions to the forest-root domain's Enterprise Read-only
Domain Controllers security group.
Example:
3. Open the properties of the dc=contoso,dc=com NC, and select the Security tab.
4. Select Add, and enter the following entry in the text box:
Contoso\Enterprise Read-Only Domain Controllers
7 Note
6. In the Permissions for Enterprise Read-Only Domain Controllers dialog box, clear
the Allow check boxes that are automatically selected:
Read
Read domain password & lockout policies
Read Other domain parameters
7. Select the Allow box next to Replicating Directory Changes, and then select OK.
If these steps don't resolve the problem, see the rest of this article.
Symptoms
When this problem occurs, you experience one or more of the following symptoms:
The DCDIAG Replication test ( DCDIAG /TEST:NCSecDesc ) reports that the tested
domain controller failed test replications and has a status of 8453: Replication
access was denied:
Output
The DCDIAG NCSecDesc test ( DCDIAG /TEST:NCSecDesc ) reports that the domain
controller that was tested by DCDIAG failed test NCSecDec and that one or more
permissions are missing on the NC head of one or more directory partitions on the
tested domain controller that was tested by DCDIAG:
Output
Output
The DCDIAG KCC event log test indicates the hexadecimal equivalent of Microsoft-
Windows-ActiveDirectory_DomainService event 2896:
B50 hex = 2896 decimal. This error may be logged every 60 seconds on the
infrastructure master domain controller.
Output
Event String:
A client made a DirSync LDAP request for a directory partition. Access
was denied due to the following error.
Directory partition:
<DN path of directory partition>
Error value:
8453 Replication access was denied.
User Action
The client may not have access for this request. If the client requires
it, they should be assigned the control access right "Replicating
Directory Changes" on the directory partition in question.
REPADMIN /KCC
REPADMIN /REHOST
REPADMIN /REPLICATE
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SHOWUTDVEC
REPADMIN /SYNCALL
Output
Default-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID:
DSA invocationID:
DC=contoso,DC=com
Default-First-Site-Name\CONTOSO-DC2 via RPC
DSA object GUID: 74fbe06c-932c-46b5-831b-af9e31f496b2
Last attempt @ <date> <time> failed, result 8453 (0x2105):
Replication access was denied.
<#> consecutive failure(s).
Last success @ <date> <time>.
The replicate now command in Active Directory Sites and Services (DSSITE.MSC)
returns a replication access was denied error.
Right-clicking the connection object from a source domain controller and then
selecting replicate now fails. And a replication access was denied error is returned.
The following error message is displayed:
Output
Dialog title text: Replicate Now
Dialog message text: The following error occurred during the attempt to
synchronize naming context <%directory partition name%> from Domain
Controller <Source DC> to Domain Controller <Destination DC>:
Replication access was denied
Active Directory events that commonly indicate the 8453 status include but aren't
limited to the following events:
ノ Expand table
NTDS KCC 1925 The attempt to establish a replication link for the
following writable directory partition failed.
Cause
Error 8453 (Replication Access was denied) has multiple root causes, including:
The default permissions don't exist on one or more directory partitions to allow
scheduled replication to occur in the operating system's security context.
The default or custom permissions don't exist on one or more directory partitions
to allow users to trigger ad-hoc or immediate replication by using DSSITE.MSC
replicate now, repadmin /replicate , repadmin /syncall , or similar commands.
The permissions that are required to trigger ad-hoc replication are correctly
defined on the relevant directory partitions. However, the user isn't a member of
any security groups that have been granted the replication directory changes
permission.
The user who triggers ad-hoc replication is a member of the required security
groups, and those security groups have been granted the Replicate Directory
Changes permission. However, membership in the group that's granting the
replicating directory changes permission is removed from the user's security token
by the User Account Control split user access token feature. This feature was
introduced in Windows Vista and Windows Server 2008.
7 Note
Don't confuse the User Account Control split token security feature that was
introduced in Vista and Windows Server 2008 with the UserAccountControl
attribute that's defined on domain controller role computer accounts that are
stored by the Active Directory service.
DCs that are running new operating system versions were added to an existing
forest where Office Communication Server has been installed.
You have Lightweight Directory Services (LDS) instances. And the NTDS Settings
object for the affected instances is missing from the LDS configuration container.
For example, you see the following entry:
CN=NtDs Settings,CN=Server1$ADAMINST1,CN=Server,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,CN={A560B9B8-6B05-4000-9A1F-
9A853DB6615A}
Active Directory errors and events, such as those mentioned in the Symptoms section,
may also occur and generate an error 5 message (Access is denied).
The steps for error 5 or error 8453 mentioned in the Resolution section won't resolve
replication failures on computers that are currently failing replication and generating the
other error message.
Common root causes for Active Directory operations failing that are generating error 5
messages include:
Resolution
To resolve this problem, use the following methods.
ノ Expand table
ノ Expand table
1. Start Active Directory Users and Computers (DSA.MSC) on the console of the
domain controller that was tested by DCDIAG.
4. On the domain controller machine account, select the Trusted this computer
for delegation to any service (Kerberos only) option.
Default permissions on Active Directory partitions don't allow the following operations
by default:
Members of the Built-in Administrators group in one domain can't start ad-hoc
replication to domain controllers in that domain from domain controllers in
different domains.
Users that aren't members of the Built-in Administrators group can't start ad-hoc
replication from any other domain controller in the same domain or forest.
By design, these operations fail until default permissions or group memberships are
modified.
Permissions are defined at the top of each directory partition (NC head), and are
inherited throughout the partition tree. Verify that explicit groups (groups that the user
is directly a member of) and implicit groups (groups that explicit groups have nested
membership of) have the required permissions. Also verify that Deny permissions
assigned to implicit or explicit groups don't take precedence over the required
permissions. For more information about default directory partitions, see Default
Security of the Configuration Directory Partition.
Verify that default permissions exist in the top of each directory partition that is
failing and returning replication access was denied
The following table shows the default permission that's defined on the schema,
configuration, domain, and DNS applications by various Windows versions.
ノ Expand table
DACL required on each directory partition Windows Server 2008 and later
Replication Synchronization X
The DCDIAG NcSecDesc test may report false positive errors when it's run
in environments that have mixed system versions.
Console
C:\>dsacls dc=contoso,dc=com
Console
c:\>dsacls \\contoso-dc2\dc=contoso,dc=com
Default permissions on Active Directory partitions don't allow the following operations:
Members of the Built-in Administrators group in one domain can't initiate ad-hoc
replication from domain controllers in different domains.
Users that aren't members of the built-in domain admins group to initiate ad-hoc
replication between domain controllers in the same domain or different domain.
Add users to existing groups that have already been the granted the required
permissions to replicate directory partitions. (Add the Domain administrators for
replication in the same domain, or the Enterprise Administrators group to trigger
ad-hoc replication between different domains.)
Create your own group, grant that group the required permissions on directory
partitions throughout the forest, and then add users to those groups.
For more information, see KB303972 . Grant the security group in question the same
permissions listed in the table in the Fix invalid default security descriptors section.
1. Log on by using the user account in which ad-hoc replication is failing and
returning replication access was denied.
Console
WHOAMI /ALL
3. Verify membership in the security groups that have been granted the replicating
directory changes permissions on the relevant directory partitions.
If the user was added to the permitted group that was changed after the last user
logon, log on a second time, and then run the WHOAMI /ALL command again.
If this command still does not show membership in the expected security groups,
open an elevated Command Prompt window, on the local computer, and run
WHOAMI /ALL at the command prompt.
If the group membership differs between the WHOAMI /ALL output that is generated
by elevated and non-elevated command prompts, see When you run an LDAP
query against a Windows Server 2008-based domain controller, you obtain a
partial attribute list .
RODC replication
If computer-initiated replication is failing on RODCs, verify that you have run ADPREP
/RODCPREP and that the Enterprise Read-Only Domain Controller group is granted the
7 Note
If you have added LDAPS support for the instance, you must configure the
certificate in the service store again, because uninstalling the instance also removes
the service instance.
Feedback
Was this page helpful? Yes No
This article provides the steps to troubleshoot Active Directory replication error 8614.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, please ask the Microsoft
Community .
Symptoms
1. DCDIAG reports that Active Directory Replications test failed with error status code
8614: Active Directory can't replicate with this server because the time since the
last replication with this server has exceeded the tombstone lifetime.
Output
2. REPADMIN.EXE reports that the last replication attempt failed with status 8614.
REPADMIN commands that commonly cite the 8614 status include but aren't
limited to:
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
Output
efault-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID:
DSA invocationID:
DC=contoso,DC=com
Default-First-Site-Name\CONTOSO-DC2 via RPC
DSA object GUID:
Last attempt @ <date> <time> failed, result 8614(0x21a6):
The Active Directory cannot replicate with this server because the time
since the last replication with this server has exceeded the tombstone
lifetime.
<#> consecutive failure(s).
Last success @ <date> <time>.
Active Directory events that commonly cite the 8524 status include but aren't
limited to:
ノ Expand table
NTDS KCC 1925 The attempt to establish a replication link for the following writable
directory partition failed.
4. NTDS Replication Event 2042 may be logged in the Directory Service event log:
Output
Event Type: Error
Event Source: NTDS Replication
Event Category: Replication
Event ID: 2042
User: NT AUTHORITY\ANONYMOUS LOGON
Computer: <name of DC that logged event>
Description:
It has been too long since this machine last replicated with the named
source
machine. The time between replications with this source has exceeded
the tombstone
lifetime. Replication has been stopped with this source.
The reason that replication is not allowed to continue is that the two
machine's views of deleted objects may now be different. The source
machine may still have copies of objects that have been deleted (and
garbage collected) on this machine. If they were allowed to replicate,
the source machine might return objects which have already been
deleted.
User Action:
Determine which of the two machines was disconnected from the forest
and is now out of date. You have three options:
5. The replicate now command in Active Directory Sites and Services returns the
following message:
Active Directory cannot replicate with this server because the time since the
last replication with this server has exceeded the tombstone lifetime.
Active Directory cannot replicate with this server because the time since the
last replication with this server has exceeded the tombstone lifetime.
The Active Directory cannot replicate with this server because the time since
the last replication with this server has exceeded the tombstone lifetime.
The operation will not continue
Cause
Active Directory domain controllers support multi-master replication. Any domain
controller that holds a writable partition can originate a create, modify, or delete of an
object or attribute (value). Knowledge of object/attribute deletion persists for
tombstone lifetime number of days. (See Information about lingering objects in a
Windows Server Active Directory forest .
Active Directory requires end-to-end replication from all partition holders to transitively
replicate all originating deletes for directory partitions to all partition holders. Failure to
inbound-replicate a directory partition in a rolling TSL number of days results in
lingering objects. A lingering object is an object that has been intentionally deleted by
at least one DC, but incorrectly exists on destination DCs which failed to inbound-
replicate the transient knowledge of all unique deletions.
Error 8614 is an example of logic added in domain controllers that are running Windows
Server 2003 or a later version. It quarantines the spread of lingering objects and
identifies long-term replication failures that cause inconsistent directory partitions.
Root causes for error 8614 and NTDS Replication Event 2042 include:
1. The destination DC that logs the 8614 error failed to inbound-replicate a directory
partition from one or more source DCs for tombstone lifetime number of days.
2. System time on the destination DC moved, or jumped, tombstone lifetime one or
more numbers of days in the future since the last successful replication. It gives the
appearance to the replication engine that the destination DC failed to inbound-
replicate a directory partition for tombstone lifetime elapsed number of days.
Time jumps can occur when the following conditions are true:
Or
Time jumps from current time to a date/time tombstone lifetime or more days in
the past, successfully inbound-replicates. Then it tries to inbound-replicate after it
adopts time TSL or more number of days in the future.
Basically, the cause and resolution for replication error 8614 apply equally to the cause
and resolution for NTDS replication event 2042.
Resolution
7 Note
There are two action plans to recover Active Directory domain controllers that log
error status 8614 or NTDS Replication event 2042. You can either force-demote the
domain controller, or use the action plan below that says, Check for required fixes,
look for time jumps, check for lingering objects, and remove them if present,
remove any replication quarantines, resolve replication failures, then put the DC
back into service. Force-demoting such DCs may be easier and faster, but can
result in the loss of originating updates (that is, data loss) on the domain controller
that's being force-demoted. Active Directory recovers gracefully from this condition
by following the steps below. Select the best solution for your scenario. Don't
assume that a force demotion is the only workable solution, especially when
replication failure is easy to resolve or is external to Active Directory.
Console
If the attribute isn't present in the showattr output, an internal default value is
being used.
2. Check for DCs that failed inbound replication for TSL number of days.
Run repadmin /showrepl * /csv parsed by using Excel as specified in the Verify
successful replication to a domain controller section. Sort the replsum output in
Excel on the last replication success column in the order from least current to the
most current date and time.
If the 8614 error occurred on a Windows Server 2003 RTM domain controller,
install the latest Windows Server 2003 service pack.
To determine whether a time jump occurred, check event and diagnostic logs
( repadmin /showreps , dcdiag logs) on destination DCs that are logging 8614 errors
for the following timestamps:
Date stamps that predate the release of an operating system. For example,
date stamps from Windows Server 2003 for an OS released in Windows
Server 2008.
Date stamps that predate the installation of the operating system in your
forest.
Date stamps in the future.
No events being logged in a given date range.
Microsoft Support teams have seen system time on production domain controllers
incorrectly jump hours, days, weeks, years, and even tens of years in the past and
future.
If system time was found to be inaccurate, correct it. Then try to determine why
time jumped, and what can be done to prevent inaccurate time going forward vs.
just correcting the bad time. Possible areas to investigate include:
Was the forest root PDC configured by using an external time source?
Are reference time sources online, available on the network, and resolvable in
DNS?
Was the Microsoft or third-party time service running and in an error-free
state?
Are DC-role computers configured to use NT5DS hierarchy to source time?
Was the time rollback protection described in How to configure the Windows
Time service against a large time offset in place?
Do system clocks have good batteries and accurate time in the BIOS?
Are virtual host and guest computers configured to source time according to
the hosting manufacturers recommendations?
This article How to configure the Windows Time service against a large time
offset documents steps to help protect domain controllers from listening to
invalid time samples. More information on MaxPosPhaseCorrection and
MaxNegPhaseCorrection is available in Windows Time Service.
The point of the 8614 error replication quarantine is to check for lingering objects
and remove them, if present, in each locally held partition before setting Allow
Replication with divergent and corrupt partner to 1 in the registry of the
destination DC, even if you think that all destination DCs in the forest are running
in strict replication consistency.
Removing lingering objects is beyond the scope of this article. For more
information, see the following articles:
ノ Expand table
Syntax Online help (Windows Server
2008 and later)
Path: HKEY_LOCAL_MACHINE\system\ccs\services\ntds\parameters
Setting: Strict Replication Consistency <- not case sensitive>
Type: reg_dword
Value: 0 | 1
Repadmin syntax for enabling and disabling strict replication on a single or multiple
DCs is as follows:
ノ Expand table
7. Set Allow replication with divergent and corrupt partner to 1 on the 8614 DC.
After any lingering objects are removed, disable the time-based replication
quarantine:
Registry method:
ノ Expand table
When the 8614 error status is logged on a destination DC, prior replication errors
that were logged in the previous TSL number of days are masked.
The fact that the 8614 error was reported by the destination DC doesn't mean that
the replication fault resides on the destination DC. Instead, the source of the
replication failure could lie with the network or DNS name resolution. Or, there
could be a problem with one of the following items:
authentication
jet database
topology
the replication engine on either the source DC or the destination DC
Review past Directory Service events and diagnostic output (dcdiag, repadmin logs)
that was generated by the source DC, by the destination DC, and by alternative
replication partners in the past to identify the scope and failure status that is
preventing replication between the destination DC and the source DC.
9. Delete Allow replication with divergent and corrupt partner or set Allow
replication with divergent and corrupt partner to 0 in the registry.
The source DC
The destination DC
The underlying network
Therefore, try to determine the cause and where the fault is before you take
preventive action.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
References
Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042)
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution steps for situations where AD
operations fail with error 5: Access is denied.
Symptoms
1. DCDIAG reports that Active Directory Replications test has failed with error status code
(5): access is denied.
Output
3. REPADMIN.EXE reports that the last replication attempt has failed with status 5.
REPADMIN commands that commonly cite the status 5 include but aren't limited to:
REPADMIN /KCC
REPADMIN /REPLICATE
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
Sample output from REPADMIN /SHOWREPS showing inbound replication from CONTOSO-
DC2 to CONTOSO-DC1 failing with the replication access was denied error is shown
below:
Output
Default-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID: b6dc8589-7e00-4a5d-b688-045aef63ec01
DSA invocationID: b6dc8589-7e00-4a5d-b688-045aef63ec01
DC=contoso, DC=com
Default-First-Site-Name\CONTOSO-DC2 via RPC
DSA object GUID: 74fbe06c-932c-46b5-831b-af9e31f496b2
Last attempt @ <date> <time> failed, result 5 (0x5):
Access is denied.
<#> consecutive failure(s).
Last success @ <date> <time>.
Active Directory events that commonly cite the 8524 status include but aren't limited to:
ノ Expand table
NTDS 1655 Active Directory attempted to communicate with the following global
General catalog and the attempts were unsuccessful.
NTDS KCC 1925 The attempt to establish a replication link for the following writable
directory partition failed.
NTDS KCC 1926 The attempt to establish a replication link to a read-only directory
partition with the following parameters failed.
5. The replicate now command in Active Directory Sites and Services returns Access is
denied.
Right-clicking on the connection object from a source DC and choosing replicate now
fails with Access is denied. The on-screen error message text and screenshot is shown
below:
The following error occurred during the attempt to synchronize naming context
<%directory partition name%> from Domain Controller <Source DC> to Domain
Controller <Destination DC>: Access is denied
Buttons in Dialog: OK
Cause
Valid root causes for error 5: access is denied include:
Active Directory errors and events like those cited in the symptoms section of this KB can also
fail with error 8453 with similar error string Replication Access was denied. The following
root cause reasons can cause AD operations to fail with 8453: replication access was denied
but don't cause failures with error 5: replication is denied:
4. RODC promoted into domain without having first run ADPREP /RODCPREP .
Resolution
AD Replication failing with error 5 has multiple root causes. Solve the problem initially using
tools like:
DCDIAG
DCDIAG /TEST: CheckSecurityError
NETDIAG that exposes common problems
If still unresolved, walk the known causes list in most common, least complex, least disruptive
order to least common, most complex, most disruptive order.
The RestrictRemoteClients registry value is set by the following group policy setting:
A registry value of 0x2 is applied if the policy setting is enabled and set to
Authenticated without exceptions.
This option allows only authenticated RPC clients to connect to RPC servers running
on the computer on which the policy setting is applied. It doesn't permit exceptions.
If you select this option, a system can't receive remote anonymous calls using RPC.
This setting should never be applied to a domain controller.
ノ Expand table
Administrators Administrators
Everyone Everyone
If Active Directory operations are failing with error 5: access is denied, verify that:
Security groups in the list above have been granted the access this computer
from network right in default domain controllers policy.
Domain controller computer accounts are located in the domain controllers OU.
Default domain controllers policy is linked to the domain controllers OU or
alternate OUs hosting computer accounts.
Group policy is applying on the destination domain controller currently logging
error 5.
Deny Access this computer from network user right hasn't been enabled or
doesn't reference failing direct or nested groups.
Policy precedence, blocked inheritance, WMI filtering, or the like, is NOT
preventing the policy setting from applying to DC role computers.
Policy settings can be validated with RSOP.MSC but GPRESULT /Z is the preferred tool
because it's more accurate.
7 Note
Local policy takes precedence over policy defined in Sites, Domains, and OU.
7 Note
At one time it was common for administrators to remove the enterprise domain
controllers and everyone groups from the access this computer from network
right in default domain controllers policy. Removing both is fatal. There is no
reason to remove enterprise domain controllers from this right as only DCs are a
member of this group.
3. CrashOnAuditFail = 2
Active Directory domain controllers are especially prone to maximum capacity security
logs when auditing has been enabled, and the size of the security event log has been
constrained by the Do not overwrite events (clear log manually) or Overwrite as
needed options in Event Viewer or group policy equivalents.
User Action:
If HKLM\System\CCS\Control\LSA\CrashOnAuditFail = 2:
Kerberos policy settings in the default domain policy allow for a 5-minutes difference
(default value) in system time between KDC domain controllers and a Kerberos target
server to prevent replay attacks. Some documentation states that time between the
client and the Kerberos target must have time within five minutes of each other. Others
state that in the context of Kerberos authentication, the time that matters is the delta
between the KDC used by the caller and the time on the Kerberos target. Also, Kerberos
doesn't care that system time on the relevant DCs matches current time. It only cares
that relative time difference between the KDC and target DC is inside the maximum
time skew (default five minutes or less) allowed by Kerberos policy.
In the context of Active Directory operations, the target server is the source DC being
contacted by the destination DC. Every domain controller in an Active Directory forest
(currently running the KDC service) is a potential KDC. So you'll need to consider time
accuracy on all other DCs against the source DC including time on the destination DC
itself.
Console
AND
Console
Look for LSASRV 40960 events on the destination DC at the time of the failing
replication request that cites a GUIDed CNAME record of the source DC with extended
error:
0xc000133: the time at the Primary Domain Controller is different than the time at
the Backup Domain Controller or member server by too large an amount.
The TKE_NYV response indicates that the date range on the TGS ticket is newer than
time on the target, indicating excessive time skew.
7 Note
W32TM /MONITOR only checks time on DCs in the test computers domain so you'll
need to run this in each domain and compare time between the domains.
7 Note
If system time was found to be inaccurate, make an effort to figure out why and
what can be done to prevent inaccurate time going forward. Was the forest root
PDC configured with an external time source? Are reference time sources online
and available on the network? Was the time service running? Are DC role
computers configured to use NT5DS hierarchy to source time?
7 Note
When the time difference is too great on Windows Server 2008 R2 destination DCs,
the replicate now command in DSSITE.MSC fails with the on-screen error There is a
time and / or date difference between the client and the server. This error string
maps to error 1398 decimal / 0x576 hex with symbolic error name
ERROR_TIME_SKEW.
The best compatibility matrix for SMB signing is defined by four policy settings and
their registry-based equivalents:
ノ Expand table
Microsoft HKLM\SYSTEM\CCS\Services\Lanmanworkstation\Parameters\Enablesecuritysignature
network client:
Digitally sign
communications
(if server agrees)
Microsoft HKLM\SYSTEM\CCS\Services\Lanmanworkstation\Parameters\Requiresecuritysignature
network client:
Digitally sign
communications
(always)
Microsoft HKLM\SYSTEM\CCS\Services\Lanmanserver\Parameters\Enablesecuritysignature
network server:
Digitally sign
communications
(if server agrees)
Microsoft HKLM\SYSTEM\CCS\Services\Lanmanserver\Parameters\Requiresecuritysignature
network server:
Digitally sign
communications
(always)
Focus on SMB signing mismatches between the destination and source domain
controllers with the classic cases being the setting enabled or required on one side but
disabled on the other.
7 Note
Internal testing showed SMB signing mismatches causing replication to fail with
error 1722: The RPC Server is unavailable.
Network routers and switches may fragment or completely drop large UDP formatted
network packets used by Kerberos and EDNS0 (DNS). Computers running Windows
2000 and Windows 2003 operating system families are vulnerable to UDP
fragmentation comparing to computers running Windows Server 2008 and 2008 R2.
User Action:
From the console of the destination DC, ping the source DC by its fully qualified
computer name to identify the largest packet supported by the network route.
Console
If the largest non-fragmented packet is less than 1,472 bytes, either (in order of
preference)
OR
Set maxpacketsize (on the destination DC) to the largest packet identified by
the PING -f -l command less 8 bytes to account for the TCP header and reboot
the modified DC.
OR
Set maxpacketsize (on the destination DC) to a value of "1" which triggers
Kerberos to use a TCP. Reboot the modified DC to make the change take effect.
Validate the secure channel with nltest /sc: query or netdom verify .
For more information about reset the destination DC's password with NETDOM /
RESETPWD , see How to use Netdom.exe to reset machine account passwords of a
User Action:
From the console of the destination DC, run NETDOM RESETPWD to reset the
password for the destination DC:
Console
Ensure that likely KDCs AND the source DC (if in the same domain) inbound
replicate knowledge of the destination DCs new password.
Reboot the destination DC to flush Kerberos tickets and retry the replication
operation.
2. Invalid trust
When able, use the NETDIAG Trust Relationship test to check for broken trusts.
NETDIAG identifies broken trusts with the following text:
If a short cut trust exists between the destination domains, the trust path chain doesn't
have to be validated. Instead validate the short cut trust between the destination and
source domain.
Check for recent password changes to the trust with Repadmin /showobjmeta * \<DN path
for TDO in question> Trusted Domain Object (TDO) verify that the destination DC is
transitively inbound replicating the writable domain directory partition where trust
password changes may take place.
Console
Console
3. Invalid Kerberos realm - PolAcDmN / PolPrDmN (no repro when article written)
User Action:
refers to a valid external Kerberos realm and NOT the local domain or another
domain in the same Active Directory forest.
User Action:
Data collection
If you need assistance from Microsoft support, we recommend you collect the information by
following the steps mentioned in Gather information by using TSS for Active Directory
replication issues.
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution for resolving Active Directory replication failing with
Win32 error 1396.
Symptoms
This article describes the symptoms, cause, and resolution for resolving Active Directory replication failing with
Win32 error 1396:
1. DCDIAG reports that the Active Directory Replications has failed with error 1396:
2. REPADMIN.EXE reports that replication attempt has failed with status 1396.
REPADMIN commands that commonly cite the 1396 status include but are not limited to:
REPADMIN /ADD
REPADMIN /REPLSUM*
REPADMIN /REHOST
REPADMIN /SHOWREPL
REPADMIN /SYNCALL
Sample output from REPADMIN /SHOWREPS depicting inbound replication from CONTOSO-DC2 to
CONTOSO-DC1 failing with the Logon Failure: The target account name is incorrect error is shown
below:
Default-First-Site-Name\CONTOSO-DC1
DSA Options: IS_GC
Site Options: (none)
DSA object GUID: <GUID>
DSA invocationID: <invocationID>
DC=contoso,DC=com
Default-First-Site-Name\CONTOSO-DC2 via RPC
DSA object GUID: <GUID>
Last attempt @ <date> <time> failed, result 1396 (0x574):
Logon Failure: The target account name is incorrect.
<#> consecutive failure(s).
Last success @ <date> <time>.
3. The replicate now command in Active Directory Sites and Services returns Logon Failure: The target
account name is incorrect.
Right-clicking on the connection object from a source DC and choosing replicate now fails with Logon
Failure: The target account name is incorrect. The on-screen error message is shown below:
Dialog message text: The following error occurred during the attempt to synchronize naming context
<partition DNS path> from domain controller <source DC> to domain controller <destination DC>:
Buttons in Dialog: OK
Active Directory events that commonly cite the 1396 status include but are not limited to:
ノ Expand table
Microsoft-Windows- 1125 The Active Directory Domain Services Installation Wizard (Dcpromo)
ActiveDirectory_DomainService was unable to establish connection with the following domain
controller.
NTDS Replication (This event lists 1645 Active Directory did not perform an authenticated remote procedure
the 3-part SPN) call (RPC) to another domain controller because the desired service
principal name (SPN) for the destination domain controller is not
registered on the Key Distribution Center (KDC) domain controller that
resolves the SPN.
Microsoft-Windows- 1655 Active Directory Domain Services attempted to communicate with the
ActiveDirectory_DomainService following global catalog and the attempts were unsuccessful.
NTDS KCC 1925 The attempt to establish a replication link for the following writable
directory partition failed.
NTDS KCC 1926 The attempt to establish a replication link to a read-only directory
partition with the following parameters failed.
OK
In this case, Event ID 1645, 1168, and 1125 are logged on the server that is being promoted.
Console
In this case, the server was also logging Event ID 333 in the system event log and using SQL Server was
using a high amount of virtual memory.
8. The KDC will not start on an RODC after a restore of the krbtgt account for the RODC, which had been
deleted. After the restore using third-party restore tools, error 1396 appears.
Cause
Multiple root causes exist. Known root causes include:
1. The SPN does not exist on the global catalog searched by the KDC on behalf of the client attempting to
authenticate using Kerberos.
In the context of Active Directory replication, the Kerberos client is the destination DC, the KDC
performing the SPN lookup is likely the destination DC itself but could be a remote DC.
2. The user or service account that should contain the service principal name being looked up does not exist
on the global catalog searched by the KDC on behalf of destination DC attempting to replicate.
In the context of Active Directory replication, the source DC computer account does not exist on the
global catalog searched by the DC on behalf of the destination DC performing inbound replication.
3. The destination DC lacks an LSA secret for the source DCs domain.
4. The SPN being looked up exists on a different computer account than the source DC.
5. For issues where replication is failing to an RODC, the RODC-specific KRBTGT account may have been
deleted.
Resolution
1. Check the Directory Service event log on the destination DC for NTDS Replication event 1645 and note
the following:
2. From the console of the KDC identified in step 1, type nltest /dsgetdc:<forest root DNS domain name >
/gc .
Run the NLTEST locator test immediately following a replication attempt that fails with the 1396 error on
the destination DC.
This should identify that GC that the KDC is performing SPN lookups against.
3. Search for the SPN discovered in step 1 on the the global catalog discovered in step 2.
Console
Or
Console
Verify that the source DCs AD Replication SPN is registered only on the source DCs computer account.
If the replication SPN is missing, determine if the source DC has registered its SPN with itself, and whether
the SPN is missing on the GC used by the KDC due to simple replication latency or a replication failure
ノ Expand table
The DC is not functioning and logs Event These problems In this case, you might need to apply the hotfix in KB939820.
ID 1925 and 1411 on Windows Server occur because
2008 domain controllers and Windows the version
Server 2003 domain controllers in the number of the
same domain that have been KRBTGT account
authoritatively restored. increases when
you perform an
authoritative
restoration. The
KRBTGT account
is a service
account that is
used by the
Kerberos Key
Distribution
Center (KDC)
service.
Map a drive using net use If the error To prevent the system logging the event 333 continually in future,
C:\Documents and Settings\wschong>net appears while please apply the hotfix 970054 on the server and set the following
use z: \<server_name>\c$ System error mapping a drive registry value to 1:
1396 has occurred. using net use, Location:
Logon Failure: The target account name is the cause could HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session
incorrect. be that the Non Manager
In this case, the server was logging Event Paged Memory Name: RegistryFlushErrorSubside
ID 333 and using high memory, with SQL or the Paged Type: REG_DWORD
Server using highest. Pool Memory is Value: 1 or 2
temporarily
insufficient. The
system keeps
recording such
events until the
computer is
restarted, or the
related hive is
unloaded, even
though the
temporary
memory
insufficiency
stops. For more
information
about SQL
Server
Symptom Cause Resolution
performance
problems, see
Troubleshooting
Performance
Problems in
SQL Server
2005.
The DC time is incorrect. The DC is a unchecked the option to sync time for virtual DC from VMWare host,
virtual machine so that it can sync time with the PDC.
that was set to
sync time with
the VMware
host, caused
events 1925,
1645.
Dcpromo fails with an onscreen error: During For dcpromo error where helper DC SPN is not valid, use SetSPN to
Active Directory Installation Failed. The dcpromo, the create new SPN on helper DC, in format
operation failed because: SPN on the GC/serverName.contoso.com
The Directory Service failed to create the helper DC (the
server object for CN=NTDS replication
Settings,CN=ServerBeingPromoted, source DC) is
CN=Servers,CN=Site, not valid.
CN=Sites,CN=Configuration,DC=contoso,
DC=com on server
ReplicationSourceDC.contoso.com.
Ensure the network credentials provided
have sufficient access to add a replica.
Logon Failure: The target account name is
incorrect.
More information
Other causes include:
1. Event ID 1925 can occur on Windows Server 2008 domain controllers and Windows Server 2003 domain
controllers in the same domain that have been authoritatively restored. In this case, you might need to
apply the hotfix 939820.
2. During dcpromo, the SPN on the helper DC (the replication source DC) is not valid.
3. If the error appears while mapping a drive using net use, the cause could be that the Non Paged Memory
or the Paged Pool Memory is temporarily insufficient. The system keeps recording such events until the
computer is restarted, or the related hive is unloaded, even though the temporary memory insufficiency
stops. For more information about SQL Server performance problems, see Troubleshooting Performance
Problems in SQL Server 2005.
4. The DC is a virtual machine that was set to sync time with the VMware host, caused events 1925, 1645.
5. For the RODC specific scenario where the KRBTGT account is deleted: authoritatively restore the
KRBTGT_##### account using NTDSUTIL and then import the LDIFDE file to correct backlinks. At
minimum, the msDS-KrbTgtLink attribute on the RODC's computer object will need to be updated to
point to the DN of the restored account.
Data collection
If you need assistance from Microsoft support, we recommend you collect the information by following the
steps mentioned in Gather information by using TSS for Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution steps for issues when Active
Directory replication fails with error 8446.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Symptoms
This article describes the symptoms, cause, and resolution steps for issues when Active
Directory replication fails with error 8446: "The replication operation failed to allocate
memory".
1. REPADMIN.exe reports that replication attempt has failed with error "8446" - The
Replication operation failed to allocate memory
DC=Contoso,DC=com
Default-First-Site-Name\DomainController via RPC
DC object GUID: <source DCs ntds settings object object guid>
Last attempt @ <Date Time> failed, result 8446 (0x20fe):
The replication operation failed to allocate memory.
1359 consecutive failure(s).
Last success @ <Date & Time>.
CN=Configuration,DC=Contoso,DC=com
Default-First-Site-Name\DomainController via RPC
DC object GUID: <source DCs ntds settings object object guid>
Last attempt @ <Date Time> failed, result 8446 (0x20fe):
The replication operation failed to allocate memory.
1358 consecutive failure(s).
Last success @ <Date & Time>.
Source: Default-First-Site-Name\DomainController
******* 1359 CONSECUTIVE FAILURES since <Date Time>
06/05 09:55:33 [INFO] Error - Active Directory could not replicate the directory
partition CN=Configuration,DC=contoso,DC=com from the remote domain
controller 5thWardDC1.contoso.com. (1130)
06/05 09:55:33 [INFO] NtdsInstall for domain.net returned 1130
06/05 09:55:33 [INFO] DsRolepInstallDs returned 1130
06/05 09:55:33 [ERROR] Failed to install to Directory Service (1130)
Non critical replication returned 1130
err.exe 1130
ERROR_NOT_ENOUGH_SERVER_MEMORY / Not enough server storage is
available to process this command.
3. NTDS Replication, NTDS General Events with the 8466 status are logged in the
directory service event log.
ノ Expand table
NTDS 1699 The local domain controller failed to retrieve the changes requested
Replication for the following directory partition. As a result, it was unable to
send the change requests to the domain controller at the following
network address. 8446 The replication operation failed to allocate
memory
NTDS 1079 Active Directory could not allocate enough memory to process
General replication tasks. Replication might be affected until more memory
is available Increase the amount of physical memory or virtual
memory and restart this domain controller
4. When you try to manually initiate replication using Repadmin or Active Directory
Sites and Services, you get the following error message:
The following error occurred during the attempt to synchronize naming
context Contoso.com from domain controller <Source DC > to domain
controller <Destination DC>:
The replication Operation failed to allocate memory. This operation will not
continue.
5. The domain controller may become unresponsive and a reboot will provide a
temporary workaround.
Cause
The 8446 (operation failed to allocate memory. This operation will not continue) status
can occur when the Active Directory replication engine cannot allocate memory to
perform Active directory replication.
The fixed component is made up of the code, the stacks, the heaps, and various fixed
size data structures (for example, the schema cache). The amount of memory that LSASS
uses may vary, depending on the load on the computer. As the number of running
threads increases, so does the number of memory stacks. Lsass.exe usually uses 100 MB
to 300 MB of memory. Lsass.exe uses the same amount of memory no matter how much
RAM is installed in the computer.
The variable component is the database buffer cache. The size of the cache can range
from less than 1 MB to the size of the entire database. Because a larger cache improves
performance, the database engine for AD (ESENT) attempts to keep the cache as large
as possible. While the size of the cache varies with memory pressure in the computer,
the maximum size of the cache is limited by both the amount of physical RAM installed
in the computer and by the amount of available virtual address space (VA). AD uses only
a portion of total VA space for the cache.
Resolution
Determine if there is depletion of following resources and fix the underlying cause:
Physical RAM
Paging File
Paged Pool or Non-Paged Pool Depletion
The fragmentation problem is not apparent on 64-bit systems since it has much larger
virtual address space 16 TB. Therefore, a solution is replacing 32-bit domain controllers
with DC's running 64-bit hardware and a 64-bit version of operation system.
Check the size of the NTDS.DIT file on the domain controller; if the size is beyond 2 GB
on a 32- bit domain controller, then a likely solution is to move to a 64-bit operating
system and hardware.
There are many cases where administrators have moved onto to x64 Bit hardware and
not faced a repeat of the 8446 (Replication failed to allocate memory) error.
For 32-bit operating systems, depending on the size of the NTDS.DIT, the /USERVA
boot.ini switch that increases the virtual mode address space on domain controllers may
provide relief, but this might cause kernel mode depletion as this reduces the size of the
kernel mode address space. Prior to implementing the /UserVA switch, it is best to
consult with a Windows memory performance tuning expert for an analysis of kernel
mode and user mode memory usage. Database cache consumes all available virtual
memory for the LSASS process.
Run Performance Monitor with database counters, review the following counters:
7 Note
By default you will not be able to view the database counters on a Windows 2003
Domain controller. Use the following steps to add the database counters on
Windows Server 2003.
These steps are not needed for Window Server 2008 and later.
1. Import the following registry settings: (copy the following text to notepad and save
as a .reg file, and then import the settings on the DC)
2. Run the following command from a command prompt to back up your existing
performance counters: Lodctr /s: backup.ini
3. Run the following command from a command prompt to register the database
counters: Lodctr c:\windows\system32\esentprf.ini
You should by now be able to view a new performance object in Perfmon called
Database.
Add the "Database Cache Size" counter. In the following example, the database
cache size grows at an increasing trend of Virtual Bytes and Working Set of the
LSASS Process eventually consuming all 2 GB of available virtual memory allocated
to the LSASS process. You will encounter the 8446 replication failure once this
virtual address space is consumed. Refer to the " LSASS ESE Database cache is not
limited by default" section of the article for detailed instructions on how to avoid
this condition.
You can use the "EDB max buffers" registry value for limiting ESE cache allocation
(number of pages is 8912 bytes) to prevent the conditions.
U Caution
Ensure that you set an optimal value to the registry value (EDB max buffers), if the
cache limit is too low then it might cause performance degradation. You may apply
the following values as start for an optimization, depending is the /3GB boot.ini
switch is use or not:
Without /3GB switch: "EDB max buffers", Reg_DWord: 157286 (1.2 GB); expected
LSASS consumption ~1.5 GB With /3GB switch: "EDB max buffers", Reg_DWord:
235929 (1.8 GB); expected LSASS consumption ~2.1 GB
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article helps you troubleshoot the Active Directory replication error 8464.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 3001248
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Symptoms
This article describes the symptoms, cause, and resolution for resolving issues in which
Active Directory replication fails and returns error 8464:
Directory partition:
DC=<name>,DC=<domain>,DC=com
Domain controller:
<fqdn>
This is a special replication cycle due to the addition of one or more attributes to the
partial attribute set.
7 Note
It is typical to see Active Directory replication status 8464 after you extend the
schema or after you add new attributes to the partial attribute set (PAS). This
message states that replication is delayed temporarily. Active Directory replication
status 8464 goes away after the PAS finishes the update process.
Cause
This issue occurs because PAS synchronization is triggered when an attribute is added to
the PAS.
Resolution
Because this is a standard part of PAS synchronization, resolution steps are not needed.
See the More Information section for troubleshooting steps if this replication status
persists in the environment for more than a week.
More information
When PAS synchronization occurs (that results from PAS extension), there is a
specialized task in the replication task queue. The DRS_SYNC_PAS flag identifies this
specialized task.
The following Repadmin commands typically cite the 8464 status. The commands include
but are not limited to:
REPADMIN /SHOWREPL
REPADMIN /REPLSUM
REPADMIN /REPLICATE
The following is a sample output from Repadmin /showrepl that shows incoming
replication from DC2 to DC1 being delayed:
Domain\DC2 DSA Options: IS_GC Site Options: (none) DSA object GUID: <GUID>
DSA invocationID: <ID>
DC=child,DC=root,DC=contoso,DC=com
Domain\DC1 via RPC DSA object GUID: <GUID> Last attempt @ 2014-08-28
04:50:44 was delayed for a normal reason, result 8464 (0x2110)
7 Note
1. Identify one destination domain controller for one partition logged Active
Directory replication status 8464. Use this domain controller and partition for these
steps (don't jump around between partitions and domain controllers).
7 Note
This step makes you to focus on updating the bridgehead servers and hub-
site domain controller first.
2. Collect the following data. Check replication status results for the destination
domain controller and source domain controller. Run the following commands to
export the results:
a. Compare the current PAS synchronization state among all global catalog
servers. Run the following command to export the result to a pas_domain.txt
file:
Console
b. Check replication status results for the destination and source domain
controllers. Run the following commands to export the results:
Console
c. List of all attributes in the PAS. This is useful for determining the current count.
Run the following command to export the result to a pas.txt file:
Console
d. Check event ID 1704 and 1702 as they indicate the PAS synchronization is
complete in the Directory Service event log. Here's an example of event ID 1702:
Directory partition:
DC=<name>,DC=<domain>,DC=com
Domain controller:
<fqdn>
3. Analyse the data based on the destination domain controller with outdated PAS or
source domain controller with outdated PAS.
If the destination domain controller doesn't have the updated PAS, do the
following:
a. Determine whether any source partners have the updated value.
b. Update destination and any source domain controllers that are out of date
to clear the status 8464.
c. Manually start replication with source domain controllers that are up to
date. Or, create and replicate source domain controllers if connections
don't exist.
d. When the destination domain controller is updated, status 8464 will be
logged for any source domain controllers that aren't updated.
If the destination domain controller has the updated PAS, but the source
domain controller doesn't, the status 8464 won't clear until the source is
updated. Or, you can update the source domain controller by manually
starting replication with a domain controller that is up to date.
Pas_domain.txt instructions
The value of interest in the output is listed after the v1.cAttrs = text. This numeric value
displays how many attributes are included in the PAS. Compare these values among
each global catalog (GC) for each partition. If all GCs display the same value, all GCs are
in-sync (they either all have the updated PAS, or they all don't). If all values are the same,
compare them with the values from output in other partitions or the dump schema, and
count the list of attributes in the PAS.
The following is a sample log, where DC1 hasn't updated the partial attribute set for the
CHILD partition. Also DC2 has completed the PAS update process. No data is logged for
ChildDC1, because the partialattributeset attribute has no data due to ChildDC1
containing a full copy of the Child domain partition.
Pas.txt Instructions
Console
repadmin /showattr fsmo_schema: ncobj:schema: /filter:"
(ismemberofpartialattributeset=TRUE)" /subtree /atts:dn >pas.txt
You can also use LDIFDE to achieve this data together with the count:
Console
To achieve a count of the attributes from the repadmin output, follow these steps:
To enable diagnostic logging for global catalog events, follow these steps:
1. Open Regedit.
2. Locate and then select the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics
7 Note
The domain controller that is selected for the PAS_Sync task can move to a different
source domain controller on the next replication interval (from the existing set of
replica partners).
New attempts to synchronize the PAS are based on the replication schedule. When a
different source is selected for the PAS_Sync task, replication will proceed usually with
the prior source domain controller. After the PAS is successfully updated, replication for
the same partition to the domain controller that is updated will fail from domain
controllers without the updated PAS. The same replication status is logged for this
scenario.
When the destination domain controller hasn't updated the PAS, one of the following
processes occurs:
Selects one replica source to update PAS. Then, event 1704 is logged when the
sync begins.
If source does not have the updated PAS itself, Active Directory replication status
8464 is logged, and event ID 1705 is logged if diagnostic logging is enabled.
If the PAS update task failed, and then a new source is selected, event ID 1706 is
logged if diagnostic logging is enabled.
Replication from other domain controllers for the same partition proceeds as usual
(status 0 is logged if there are no failures).
This section is a sample of the PAS synchronization cycle. The following table is the
domain controllers in the forest:
ノ Expand table
DC1 Root.contoso.com
Domain Controllers Domain
DC2 Root.contoso.com
ChildDC1 Child.root.contoso.com
ChildDC2 Child.root.contoso.com
TRDC1 Treeroot.fabrikam.com
Seven new attributes are added to the PAS by using Schema extension. Therefore,
the count for attributes in the PAS increases from 196 to 203.
This starts PAS synchronization. All GCs must now source the data for these seven
attributes in each GC partition.
This diagram shows the update of just one partition.
The replication interval in this environment is 15 minutes.
A pre-existing condition exists that blocks replication from a DC hosting a writable
copy of the partition.
In this scenario, the following processes occur:
a. DC1 selects DC2 for PAS_SYNC. Because DC2 also has the old PAS, Active
Directory replication status 8464 is logged.
b. TRDC1 wasn't selected for PAS_SYNC and it also has the old PAS, Active
Directory replication status 0 (Successful) is logged.
c. ChildDC1 holds a writable copy of the CHILD partition so that it has all
attributes for this partition. However, there's a pre-existing issue that causes
Active Directory replication to fail with error 8606.
2. The destination domain controller selects a new source (TRDC1) for the PAS_SYNC
task.
a. TRDC1 also has the old PAS so replication is delayed, and status 8464 is logged.
b. DC2 also has the old PAS. However, it isn't selected for PAS_Sync on this interval,
and replication is completed correctly. Therefore, status 0 is logged.
a. Replication proceeds as usual from DC2 and TRDC1 (these attempts are
completed before PAS_Sync).
a. Replication from DC2 and TRDC1 is now both delayed because the source
domain controllers are outdated. The same Active Directory replication status is
logged for this issue.
6. In between the previous replication interval and the next one, DC2's copy of the
partial attribute set for the CHILD domain is also updated (not pictured though).
a. Because both the destination domain controller (DC1) and source domain
controllers (DC2 and ChildDC1*) have the updated PAS, replication is completed
correctly.
*ChildDC1 has a full set of attributes for the partition (not just the PAS).
b. Replication is delayed from TRDC1 because it still has the old PAS.
7. In between the previous replication interval and the next one, TRDC1's copy of the
partial attribute set for the CHILD domain is also updated (not pictured though).
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Active Directory replication fails for one
or more partitions with the error 8545.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Symptoms
In Windows Server 2012 and Windows Server 2008, Active Directory replication fails for
one or more partitions and returns error 8545: "The replication update could not be
applied because either the source or the destination has not yet received information
regarding a recent cross-domain move operation."
Additionally, the following error is logged in the Directory Service log on the destination
domain controller:
Object:
CN=<User>,OU=Users,OU=Boulder,DC=na,DC=contoso,DC=com
Object GUID:
33555323-8e42-42dd-ab95-51693b54281f
Source directory service:
1126750c-e8ac-4355-8412-ccb287e48c23._msdcs.contoso.com
Synchronization of the directory service with the source directory service is blocked
until this update problem is corrected.
This operation will be tried again at the next scheduled replication.
User Action
Restart the local computer if this condition appears to be related to low system
resources (for example, low physical or virtual memory).
Additional Data
Error value:
8545 The replication update could not be applied because either the source or the
destination has not yet received information regarding a recent cross-domain move
operation.
7 Note
For more information about how to apply the values that are referenced in event ID
1084, see the tables in the "More Information" section.
Cause
This issue occurs if the object that's listed in event 1084 was migrated from one domain
to another domain in the same forest. The destination domain controller doesn't learn
of the object's new location (its partition). Therefore, the object is still present in the old
partition on the destination domain controller.
The source domain controller knows of the object's migration and locates it in the
object's new location.
Active Directory replication error 8545 is logged when the source domain controller tries
to send changes for this recently migrated object when the destination domain
controller finds the object present in a different partition.
Resolution
As a preventive measure, consider installing Microsoft Knowledge Base article
2682997 on all domain controllers that are still running Windows Server 2008 or
Windows Server 2008 R2. To do this, follow these steps:
1. Determine the distinguished name (DN) of the naming context (NC) / partition
where the object was migrated from. For more information about this, see the
"More Information" section.
2. On the destination domain controller, follow these steps to unhost this partition:
For example, if the destination domain controller is DC1, and the DN for the
partition where the object was migrated from is dc=corp,dc=contoso,dc=com,
the command would be Repadmin /unhost DC1 dc=corp,dc=contoso,dc=com.
7 Note
Monitor the Directory Service log on the domain controller for event ID
1660. Review the event text to make sure that it says the domain controller
no longer hosts the CORP NC.
b. Event ID 1659 indicates the status of the unhost operation. Do not readd the
partition until after you successfully sync the other partition.
3. On the destination domain controller, trigger replication with the source domain
controller (the one that was failing).
4. Rehost the partition from a domain controller that has a valid read/write copy of
the partition. To do this, run the following command line:
For example, assume that the destination domain controller is DC1, the partition
that you unhosted is dc=corp,dc=contoso,dc=com, and a domain controller that
has a read/write copy of the Corp partition is CorpDC1.corp.contoso.com . In this
situation, the command will be Repadmin /add dc=corp,dc=contoso,dc=com dc1
CorpDC1.corp.contoso.com /readonly . For more information about this specific
More information
The scenario that's described in the preceding sections can be confusing. Use the
following table style to document all the points of data that you need to resolve this
issue.
First, determine whether it's the source or destination domain controller that has a copy
of the object in the old location (the location from where the object was migrated).
ノ Expand table
Name Details
Object DN CN=JUSTINTU,OU=Users,OU=BOULDER,DC=na,DC=contoso,DC=com
ObjectGUID 33555323-8e42-42dd-ab95-51693b54281f
DC in source
domain without
object in NA
partition- name
DC in source
domain without
object in NA
partition
DSA_GUID
ノ Expand table
1750 2 com
By using the database dump file, you can see this object's current location in the
database on this domain controller:
CN=LostAndFound,DC=Corp,DC=Contoso,DC=com
You can see that the object was present in the LostAndFound container on the
corp.contoso.com NC. However, replication is blocked on this object except for the
NA.contoso.com NC. Because this object is already present in the database (but in the
old, incorrect NC), you must remove this partition from this domain controller in order
to dispose of the old object.
The Configuration object was migrated from the Corp partition to the NA partition.
However, the NA partition fails to replicate from NADC1.na.contoso.com to
DC1.la.contoso.com , and the attempt returns error 8545.
b. Monitor the Directory Service log on the domain controller for event ID 1660.
Review the event text to verify that the domain controller no longer hosts the
CORP NC.
2. Event ID 1659 indicates the status of the unhost operation. Do not readd the
partition until after you sync the NA partition, as follows:
a. Replicate the NA partition. After the partition is successfully removed from the
database: Initiate replication from CORPDC.na.contoso.com by running the
following command:
Console
Console
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article contains information and links to help you troubleshoot Active Directory
Replication errors. It is intended to provide Active Directory administrators with a
method to diagnose replication failures and to determine where those failures are
occurring.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Error codes
To troubleshoot specific errors, refer to the following table.
ノ Expand table
8464 This issue occurs because partial attribute set Active Directory replication
(PAS) synchronization is triggered when an error 8464: Synchronization
attribute is added to the PAS. attempt failed
8333 This error has multiple causes. They include the Troubleshooting AD
following: Replication error 8333:
Database corruption, with additional Directory Object Not Found
associated errors that are logged in the
event log of the source domain controller
Lingering objects that have associated
errors logged
Conflict objects
A third-party process
8446 This error can occur when the Active Directory Troubleshooting AD
replication engine cannot allocate memory to run Replication error 8446: The
Active Directory replication. replication operation failed
to allocate memory
8240 This error indicates that the specific object could Troubleshooting AD
not be found in the directory. This error may be Replication error 8240:
encountered in the following situations: There is no such object on
During AD replication the server
Reported 8240 in 1126 Event (NTDS)
1396 Known causes of this error include the following: Active Directory Replication
The service principal name (SPN) does not Error 1396: Logon Failure:
exist on the global catalog that is searched The target account name is
by the Kerberos Key Distribution Center incorrect.
(KDC) on behalf of the client that is trying
to authenticate by using the Kerberos
protocol.
The user or service account that should
contain the SPN that is being looked up
does not exist on the global catalog that is
searched by the KDC on behalf of the
destination domain controller that is trying
to replicate.
The destination domain controller lacks a
Local Security Authority (LSA) secret for the
source domain controller's domain.
The SPN that is being looked up exists on
the account of a different computer than
the source domain controller.
-2146893022 This error code is not returned by Active Active Directory replication
Directory. However, it may be returned by lower- error -2146893022: The
layer components. These include RPC, the target principal name is
Kerberos protocol, Secure Sockets Layer (SSL), incorrect
LSA, and NT LAN Manager (NTLM). The code is
returned for various reasons.
1753 Specific causes of this error include the following: Active Directory Replication
The server app never started. Error 1753: There are no
The server app started. However, there was more endpoints available
a failure during initialization that prevented from the endpoint mapper
the server app from registering with the
RPC Endpoint Mapper.
Replication Cause Related Knowledge Base
error code article
8606 Error 8606 is logged when the following Active Directory Replication
conditions are true: Error 8606: Insufficient
A source domain controller sends an attributes were given to
update to an object (instead of sending an create an object
originating object create request) that was
already created, deleted, and then
reclaimed by garbage collection from a
destination domain controller's copy of
Active Directory.
The destination domain controller was
configured to run in strict replication
consistency.
1127 Error 8606 is logged when the following Active Directory Replication
conditions are true: Error 1127: While accessing
A source domain controller sends an the hard disk, a disk
update to an object (instead of sending an operation failed even after
originating object create request) that was retries
already created, deleted, and then
reclaimed by garbage collection from a
destination domain controller's copy of
Active Directory.
The destination domain controller was
configured to run in strict replication
consistency. duplication of above?
8452 This error most frequently occurs when the The naming context is in the
replication topology in a domain controller that is process of being removed
starting replication differs from the replication or is not replicated from the
topology that is defined in the destination specified server
domain controller's copy of Active Directory.
Replication Cause Related Knowledge Base
error code article
8453 This Replication Access was denied error has Active Directory replication
multiple causes. error 8453: Replication
access was denied
8524 This is a catch-all error for all possible DNS Active Directory Replication
failures that affect Active Directory on post- Error 8524: The DSA
Windows Server 2003 SP1-based domain operation is unable to
controllers. proceed because of a DNS
lookup failure
8614 Causes of this error (and for NTDS Replication Troubleshoot Active
Event 2042) include the following: Directory replication error
The destination domain controller that is 8614
logging the 8614 error did not inbound-
replicate a directory partition from one or
more source domain controllers for
Tombstone lifetime number of days.
System time on the destination domain
controller moved, or jumped, Tombstone
lifetime one or more days into the future
after the last successful replication.
8545 This Active Directory replication error is logged Active Directory replication
when the source domain controller tries to send error 8545: Replication
changes for a recently migrated object when the update could not be applied
destination domain controller has the object
present in a different partition.
5 This Active Directory replication error has multiple Active Directory replication
causes. error 5 - Access is denied
Event IDs
To troubleshoot specific event IDs, refer to the following table:
ノ Expand table
Event ID Cause Related article
Event ID DNS lookup failure occurred with Event ID 2088: DNS lookup failure
2088 replication success occurred with replication success
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
References
Troubleshooting Active Directory Replication Problems
Feedback
Was this page helpful? Yes No
This article solves the error message "The remote procedure call failed and did not
execute". This error occurs during domain controller (DC) replication on Windows
Server.
Symptoms
This Active Directory (AD) replication error appears in one or more of the following
forms:
Decimal: 1727
Hex: 0x6bf
Symbolic: RPC_S_CALL_FAILED_DNE
Error message: The remote procedure call failed and did not execute.
Cause
This problem occurs because of one of the following reasons:
A network connectivity issue between the two domain controllers (DCs). See the
following sections for details.
A load-induced performance issue on the replication partner. This issue is less
common and is often transient in nature. See the following sections for details.
firewalls
routers
WAN optimizers
other intermediate network devices
network filter drivers
The server is backlogged and doesn't respond to the TCP ACK or the response
message. So, the sender abandons the TCP session.
The network is too slow or unreliable. It can't deliver the TCP ACK or the response
message.
Resolution
To resolve this problem, determine any recent changes that would affect the network
between the two DCs and undo those changes if possible. If there are no recent
changes, you must fully examine the RPC network connectivity between the two DCs. To
do so, follow either the high-level troubleshooting steps or the detailed troubleshooting
steps.
2. Examine the RPC conversation between the two DCs. Determine whether there's
ever a case in which the message that's sent from the requestor DC doesn't incur a
response from the replication partner.
7 Note
Occasionally, there is a partial response that includes the piggy-back TCP ACK for
the request message. But the traffic has been modified or the response doesn't
actually arrive at the requester DC. Therefore, the TCP stack doesn't receive an ACK.
1. Verify whether the source DC is listening on TCP port 135. To do so, run the
PortQry.exe -n -e 135 command.
If the port status is FILTERED, the AD replication failure is likely to fail and return
error 1722 instead. Try resolving error 1722, and then check whether the AD
replication succeeds. If the problem persists, restart the detailed troubleshooting
steps.
If the status isn't FILTERED, the commands return the RPC endpoint mapper
database. Search for MS NT Directory DRS Interface to find the upper-range port
in the endpoint mapper database that the source DC is listening on for AD
replication. You may get one or more entries. Make a note of the ports for
ncacn_ip_tcp.
For example, you get something that resembles the following example, which
presents two upper-range ports 49159 and 49160:
7 Note
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameter
s
Registry value: TCP/IP Port
Value type: REG_DWORD
Value data: (available port)
2. Test TCP port connectivity to the upper-range ports that you note. To do so, run
the following command:
Console
Console
If port status is FILTERED, review the network trace that you've captured to
determine where the packet is blocked.
3. Test DNS. Verify that the destination DC can resolve the CNAME and HOST records
of the source DC. And verify that the resolved IP address is the actual IP address of
the source DC. If DNS points to an old or invalid IP address, then RPC connection
attempt is made to an incorrect source DC.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot event ID 1311 messages in the Directory
Service event log on a Windows domain.
Applies to: Windows Server 2016, Windows Server 2019, Windows Server 2012 R2
Original KB number: 307593
Symptoms
The Knowledge Consistency Checker (KCC) constructs and maintains the replication
topology for Active Directory. To do this, the KCC examines the sum of all naming
contexts that reside in the forest and all administrator-defined constraints for site, site
link, and link cost.
Cause
This behavior occurs if one or more of the following conditions are true:
Site link bridging is enabled on a network that doesn't support physical network
connectivity between two domain controllers in different sites that are connected
by a KCC link.
Site links contain all sites, but the site links aren't interconnected. This condition is
known as disjoint site links.
Bridgehead domain controllers are online, but errors occur when they try to
replicate a required naming context between Active Directory sites.
Administrator-defined preferred bridgeheads are online, but they don't host the
required naming contexts.
The bridgehead server is overloaded either because the server is undersized, too
many branch sites are trying to replicate changes from the same hub domain
controller, or the site link schedules are too frequent.
KCC has built a different path around a site-to-site connection failure, but it retries
the failing connection every 15 minutes because it is in connection keeping mode.
The common causes of event ID 1311 messages fall into two categories: improper
logical configuration and infrastructure failure. Event ID 1311 messages are logged
when an improper logical configuration or a replication error occurs.
Infrastructure failure
Resolution
To troubleshoot event ID 1311 messages, use the following methods.
Determine if site link bridging is turned on and if the network is fully routed.
To determine the scope of the event, use one of the following methods:
Examine the Directory Service event logs of an appropriate number of ISTG domain
controllers in the forest.
Use the Eventcombmt.exe tool (available from Microsoft Product Support Services)
to search for event ID 1311 messages on an appropriate number of ISTG domain
controllers in the forest.
Site link bridging is enabled in Active Directory if the following conditions are true:
The Bridge all site links check box is selected for the IP protocol and the SMTP
protocol in the Active Directory Sites and Services snap-in.
The Options attribute for the IP protocol and the SMTP protocol is NULL or set to 0
(zero) for the following Domain Name (DN) paths:
CN=IP,CN=Inter-Site Transports,CN=Sites,CN=Configuration,DC= root domain
of forest
CN=SMTP,CN=Inter-Site Transports,CN=Sites,CN=Configuration,DC= root
domain of forest
To determine if a fully routed network connection exists between two sites, contact your
NOS administrator, network administrator, or Active Directory architect.
If site link bridging is enabled in a non-routed environment, either make the network
fully routed, or disable site link bridging and then create the site links and site link
bridges that you must use. Wait for two times the longest replication interval in the
forest. If event ID 1311 messages continue to be logged or if site link bridging is
enabled in a fully routed network, continue to the "Verify That All Sites Are Defined in
Site Links" method.
By default, site link bridging is turned on. Additionally, the best practice guidelines
recommend that you keep site link bridging turned on.
The following diagram uses plus signs (+) and minus signs (-) to illustrate physical
network connections between Active Directory sites. Site AZ is listed in site link WEST
and site GA is listed in site link EAST, but sites AZ and GA don't have fully routed
network connections to sites WA and NY in an Active Directory configuration where site
link bridging is enabled.
Output
WA <-- Site Link WANY --> NY
+- +-
+ - + -
+ - + -
+ - + -
CA + + + AZ IL + + + GA
Output
Because sites AZ and GA are not listed in any site links, they are orphaned and the KCC
does not consider them when it constructs the replication topology for Active Directory.
The repadmin /showism command is useful for locating improperly configured sites.
Output from the repadmin /showism command appears similar to the following example
from a forest named corp:
7 Note
Unlike other arguments for the repadmin command, you cannot run the repadmin
/showism command from a remote computer. You must run the repadmin /showism
command from the console of the domain controller that you want to examine (in
most cases, this is the ISTG domain controller).
For each site that is configured for IP-based replication or for SMTP-based replication
(not shown), the repadmin /showism command returns a site matrix that represents the
connections to all the sites in the forest. Each entry in the site matrix contains three
numbers delimited by colons (:) that represent the cost, replication interval, and options
for each replication link to another site in the Active Directory forest. The numbers in an
entry appear in the following order:
Cost : Replication interval : Options
The Cost value indicates the preference for a network link for replicating directory
information between sites. The administrator uses the Active Directory Sites and
Services snap-in to define the Cost value for each site link.
The Replication interval value indicates the replication frequency of the link in
minutes.
The Options value indicates the options for the site link, including site link
notification.
7 Note
When you troubleshoot event ID 1311 messages, you can ignore the Options
value.
In the example from the corp.com forest, site link bridging is enabled, and the forest
contains three Active Directory sites:
Site 0: US-NC, an uncovered site that uses the TX<->NC link to connect to Site 1
(US-TX).
Site 1: US-TX, which hosts two domain controllers.
Site 2: US-WA, a covered site that uses the TX<->WA link to connect to Site 1 (US-
TX).
Each site matrix contains one 0:0:0 entry that refers to itself. An entry that contains
positive numbers for the cost value and replication interval value (for example, 200:15:0
or 100:15:0) indicates that the site connection is good. A -1:0:0 entry indicates that the
site connection isn't working. Which occurs if one or more of the following conditions is
true:
The replication protocol isn't used. For example, if SMTP replication isn't
configured, the entries in the SMTP portion of the /SHOWISM matrix all appear as
-1:0:0.
The site doesn't host any domain controllers (this is known as an uncovered site).
The site isn't included in a site link.
If site link bridging is enabled and the repadmin /showism command returns -1:0:0
entries for one or more covered Active Directory sites, make sure that the affected sites
are listed in a site link.
A site with a full complement of -1:0:0 entries and one 0:0:0 entry is orphaned unless the
site is uncovered (no domain controllers reside in that site). When you troubleshoot
event ID 1311 messages, record the names of all orphaned sites, but don't record the
names of uncovered sites.
If site link bridging is disabled, -1:0:0 entries are less meaningful. If it's the case, you
must manually determine if each site is included in a site link. To do so, write down the
list of sites and site links, and manually map each site to a site link.
7 Note
The repadmin /showism command always returns -1:0:0 entries for an uncovered
site.
In the following repadmin /showism example, site link bridging is enabled in the
corp.com forest, and site link TX<->WA was deleted. Site 2 (US-WA) is orphaned from
all other sites in the forest and must be added to an appropriate site link.
1. Use the Ldp.exe command-line tool to do an LDAP search for the following criteria:
DN Path: cn=sites,cn=configuration,dc=<root domain of forest>
ObjectClass: server
Attributes: bridgeheadTransportList
2. Use the FINDSTR command against an LDIFDE export file from the
CN=Sites,CN=Configuration container:
LDIFDE CN=SITES,CN=CONFIGURATION,DC=<Root domain in forest>
SITEDUMP.LDF
FINDSTR /i "bridgeheadTransportList" SITEDUMP.LDF
If the search returns any results, note the name of server in the Domain Name path
in which the bridgeheadTransportList attribute is populated.
If you find any preferred bridgehead servers, use the Site and Services snap-in to
remove them, and then wait two times the maximum replication interval in the
forest. If event ID 1311 messages continue to be logged, continue to the next
method.
If a domain controller is offline for fewer days than the tombstone lifetime number (by
default 60), bring the domain controller online and force it to replicate, or as a last
resort, remove it from the forest.
If a domain controller is offline or does not replicate inbound changes for more days
than the tombstone lifetime number, do not resuscitate it. Instead, immediately remove
it from the forest.
For more information about the TombstoneLifetime value, click the following article
numbers to view the articles in the Microsoft Knowledge Base:
When you want to discover and troubleshoot replication failures, the following tools can
be useful:
repadmin /failcache : Run this command from the console of each ISTG domain
controller in the forest to discover replication failures for bridgeheads in the site
for that ISTG.
7 Note
You can also run this command remotely against other ISTG domain
controllers in the forest.
repadmin /showreps : Run this command from the console of each ISTG domain
controller in the forest to analyze replication of specific domain controllers that are
exposed by the repadmin /failcache command.
bridgehead domain controllers in the forest. The result set is limited to domain
controllers that experience errors with the /q switch.
Examine the Directory Service Event log on ISTG domain controllers and
Bridgehead servers, using the following settings for the NTDS Diagnostic levels:
One Knowledge Consistency Checker: 3
Five Replication Events: 3
Internal Processing: 1
The repadmin /failcache command lists replication failures that KCC knows about. The
output from the repadmin /failcache command is divided into two sections:
The KCC Link Failures cache lists errors for existing connection links. The ISTG domain
controller imports showreps (repsfroms) data for every bridgehead server in its site.
However, the ISTG domain controller does not list errors. The link failure cache is
emptied at the beginning of every KCC run and refilled during the course of the current
run.
The KCC Connection Failures cache lists unsuccessful attempts to build connection
objects between domain controllers (reps from or reps to). When you run the repadmin
/failcache command from the ISTG domain controller, it lists entries that are imported
from bridgeheads in the site. At the beginning of each KCC run, the KCC examines each
entry in the connection failure cache and tries to DsBind to the failing server. If the bind
succeeds, the entry is removed.
The repadmin /failcache command differs from the repadmin /showreps command in
two ways:
The repadmin /showreps command shows the naming context that is failing. The
repadmin /failcache command doesn't.
Data from the repadmin /failcache command isn't replicated between domain
controllers.
The following example shows sample output from the repadmin /failcache command.
Output
A D
/ \ / \
/ \ / \
/ \ / \
B C E F
Sitelink_ABC Sitelink_DEF
The following diagram shows another possible a disjoint site links configuration. In this
case, a new site link must join any site in Sitelink_ABDC with at least one site in
Sitelink_FG (for example, a new site link between site A and site F) to resolve the disjoint
site links condition.
Output
A F
/ \ \
/ \ \
/ \ \
B C \
\ / \
\ / \
\ / \
D G
Sitelink_ABDC Sitelink_FG
Disjoint site links are the most difficult improper configuration to troubleshoot. Look for
disjoint site links only after you rule out all other known causes. Use a pencil and paper
to graph site topology and locate orphaned sites.
Domain controllers replicate all naming contexts that are held in common with
their direct replication partners, so a domain controller in the "corp.com" domain
replicates CN=SCHEMA and CN=CONFIGURATION in addition to the "corp.com"
domain naming context with its inter-site bridgehead partner.
Inter-site topology generator (ISTG): For each Active Directory site, a single server,
known as the ISTG, is nominated to build the inter-site replication topology.
Uncovered Site: An Active Directory site defined in the Sites and Services snap-in
that does not currently contain any Windows 2000 domain controllers. An
uncovered site may be waiting for its domain controller to arrive from a staging
site. Additionally, a site may be defined as uncovered to provide site preference for
client operations.
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28,
29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43,
44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58,
59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73,
74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88,
89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103,
104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118,
In the following example, the repadmin /showism output stops in the middle of the line
for site 115, CN=HeadQuarters.
-1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0,
-1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0,
-1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0,
-1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0, -1:0:0,
To resolve this truncation problem, obtain an updated version of the Repadmin.exe file
from Microsoft Product Support Services (PSS).
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article introduces Jet database error messages and troubleshooting steps.
Summary
During operating system startup, domain controller installation/uninstallation, or Active
Directory Replication, you may encounter Jet error messages. This article introduces Jet
error messages and their solutions.
Error messages
-501 JET_errLogFileCorrupt
Cause
Hardware corrupted the I/O at writing, or the hardware lost flush caused the log to
become unusable. Typically the database (DB) is left in a corrupted state.
Resolution
Restore the database from a known good backup, or reinstall the domain controller
(DC).
Cause
A log write failure occurred. This issue can be caused by any of the following:
2. For an issue that is due to software, stop services that create locks on the files in
the file system. For example, determine whether antivirus software is causing locks
on Active Directory log files. Make sure that the proper files have been added to
the antivirus exclusion list. Windows Server 2016 automatically excludes certain
files and folders from antivirus scanning, see List of automatic exclusions. For
Windows Server 2012 R2, see:
If steps 1 and 2 don't fix the issue, determine whether a non-Microsoft application or
service is causing the issue by disabling these. To do this, follow these steps:
1. Press Windows key + R. Enter MSCONFIG and then click OK. On the Services tab,
select Hide all Microsoft Services. Clear the check box for third-party services.
2. Disable all enabled startup items.
3. Restart the server.
-528 JET_errMissingLogFile
Cause
This can be due to an unexpected shutdown that was caused by a power outage or
another unexpected shutdown. Other causes include administrator changes to log files
(such as copying an old copy) or corrupted backup/restore software (if immediately
after a restore).
Resolution
Cause
-550 JET_errDatabaseDirtyShutdown
Cause
-551 JET_errConsistentTimeMismatch
Cause
-567 JET_errDbTimeTooNew
Cause
Resolution
Cause
Resolution
Evaluate the disk stack, including the motherboard/controller, firmware,
connecting cables, and physical drives, and contact the relevant vendors for known
issues. Compare your current configuration against the vendors' reference
configurations.
Evaluate whether the problem can be resolved by the latest firmware updates or
was triggered by a recent firmware update.
If some DCs are logging -1018s while other DCs in the same environment aren't,
look for differences in hardware configurations.
Databases that log this error can't be recovered or repaired by integrity checks or
semantic database analysis in NTDSUTIL or ESENTUTL.
Offline defrags may fix the problem in the unlikely case that the problem is due to
an index consistency problem.
Try an offline defrag. Or, restore a system state backup that predates the
corruption. Or force-demote, perform a full metadata cleanup, and repromote. If
the -1018 error appears, repeat until the hardware root cause is resolved.
When Jet error -1018s occurs on virtualized DCs that are running on the same virtual
host only on computers that are using an on-board raid controller, the error can occur
because the uninterruptible power supply (UPS) lacked sufficient power for on-board
raid controllers to commit changes to disk following loss of electrical power. The
workaround is to configure UPS software to shut down virtualized guests upon loss of
electrical power. Servers that have dedicated (not on-board) raid controllers with their
own battery backups don't experience the -1018 JET error.
Cause
This is like the -1018 error but is due to a lost page flush.
A lost flush can represent a critical USN change. Failure to apply the same change to
local DCs or to transitive replication partners could be harmful where a single replication
path exists.
Resolution
Deploy the OS on server-class hardware and disk subsystem components.
Databases that log this error can't be recovered or repaired by integrity checks or
semantic database analysis in NTDSUTIL or ESENTUTL.
Offline defrags may resolve the problem in the unlikely case that the problem is due to
an index consistency problem.
Try an offline defrag. Or, restore a system state backup that predates the corruption. Or,
force demote, perform a full metadata cleanup, and then repromote. Repeat until the
hardware root cause is resolved.
-1021 identifies a -1018 error that occurred at the disk level. In other words, -1021
indicates that a disk drive returned a bad check sum error and is the specific source of
the problem in the disk stack.
Cause
The problem may be due to bad blocks on the hard disk that the hard drive may keep
track of.
Resolution
Removing and reinstalling Active Directory on the domain controller may trigger the
storage of data on healthy blocks.
Cause
Generic disk error. Disk IO errors mean that the OS encountered a non-specific error in
accessing the disk. This error may be logged when controllers return generic errors like
"device not working." Some disks and versions of Jet return this error for CRC problems.
Resolution
Verify the whole driver stack.
-1206 JET_errDatabaseCorrupted
Cause
This error is the same as missing/corrupt log file. This error indicates that a lost flush
occurred.
-1216 JET_errAttachedDatabaseMismatch
Cause
Cause
Resolution
Remove and reinstall Active Directory on the DC. Run NTDUSITL semantic database
analysis. If the issue persists, perform an offline defrag.
-1811
Cause
Administrator modified logs or lost I/O flush on shutdown.
Troubleshoot
You can use these methods to troubleshoot Jet database errors:
1. Verify that all Active Directory databases and log files are deployed on suitable
hardware.
Many but not all SATA and IDE drives don't support the write flush command. SAS
drives do support it.
Active Directory databases and log files should use SAS drives on SAS controllers
DCs that have a battery backup on any write caching element.
3. Check whether the event that preceded the LSASS 0xc00002e1 (c00002e1) and
0xc00002e2 (c00002e2) boot errors indicates one of the following issues:
5. Best practice: Make a System State backup so that you can roll back any changes
that are made during your recovery session.
6. Best practice: Ask the administrator up front to locate the most recent system state
backup so that you can factor the existence or nonexistence of System State
backups into your recovery plans. Have the admin delegate the location of any
backups, if possible.
7 Note
8. Verify that the drive that hosts the NTDS.DIT or log files is available on OS startup.
9. Open Windows Explorer and verify that the NTDS.DIT and log files are present at
the log file path reported by step 7.
If the files are present, proceed to step 10.
If the files are not present, search all available drives and volumes for the NTDS.DIT
and log files that belong to this instance of Active Directory.
2 Warning
There may be multiple NTDS.DIT and log files present on local drives. Use
date and time stamps to locate the correct instance.
Correct the paths for the database and log file paths as required.
7 Note
ノ Expand table
Local Service Create Folders / Append Data This folder and subfolders
The root of the volume that is hosting the NTDS.DIT and NTDS log files
(system requires fully control)
The %windir% folder (i.e., c:\windows or c:\winnnt) (system requires fully
control)
The folder that hosts the NTDS.DIT and NTDS log files (see permissions table
below)
The NTDS Log files themselves (see perms table below)
11. Verify that the correct log files reside in the log file directory:
NTDSUTIL /FILES will identify the database directory and log file directory if
different. NTDSUTIL /MH will identify which log files are required in the log file
directory.
Under no circumstances should the database or log files from one DC be copied to
another DC to make the second DC functional.
12. Confirm that disk or file compression is not enabled on any volume that is hosting
the NTDS.DIT or log file volume.
13. Validate the health of the database in NTDS.DIT from the bottom up.
Validate Jet database health from the bottom up. Proceed up to the next layer only
when the underlying layer completes without error.
Equivalent NTDSUTIL and ESENTUTL commands for each later are shown below:
ノ Expand table
+ +
14. Look up the user action for the first failing Jet error encountered during step 13.
Perform remediation if possible.
Some Jet database errors can be repaired by using NTDSUTIL and ESENTUTL.
Some Jet database errors cannot be repaired, and any attempt to repair them
will fail. In such cases, your only recourse may be to restore a system state
backup that predates the corruption, or build a new server. If replica DCs are
up-to-date, lead with promoting additional replicas into the domain after
attempting to mitigate the root cause for any hardware or software-related
errors.
7 Note
The Jet error that is returned in NTDS General event 1168 is an application
layer error. Don't act on this Jet error unless the Jet Physical consistency and
Application logical consistency checks, (tested in that order) pass without
error.
More Information
For more information, see the following Microsoft article:
Domain controller does not start, c00002e2 error occurs, or "Choose an option" is
displayed
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution for resolving Active Directory
replication failing with Win32 error 8418.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2734946
Symptoms
This article describes the symptoms, cause, and resolution for resolving Active Directory
replication failing with Win32 error 8418: The replication operation failed because of a
schema mismatch between the servers involved.
Replication of any Active Directory data between domain controllers in a forest relies on
all DC's having a consistent view of the definitions of objects and attributes. These
definitions are stored in the Schema partition of the Active Directory database. The
directory replication engine prioritizes replication of data this in this partition above all
others - when any change to a schema definition is detected between partners it must
be replicated before data in other partitions can be synchronized.
1. One or more on-screen errors, logged events or diagnostic output identifies the
existence of a schema mismatch.
ノ Expand table
2. DCPromo Promotion
On-Screen error
---------------------------
Active Directory Domain Services Installation Wizard
---------------------------
The operation failed because: Active Directory Domain Services could not
replicate the directory partition <DN path of partition> from the remote Active
Directory Domain Controller <helper DC FQDN>.
"The replication operation failed because of a schema mismatch between the
servers involved."
---------------------------
OK
---------------------------
3. The following events may be logged in the Directory Service Event Log
ノ Expand table
NTDS Replication 1203 The local domain controller could not replicate
the following object from the source domain
controller at the following network address
because of an Active Directory schema
mismatch
4. Active Directory Sites and Services fail with the following error:
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
repadmin /syncall /AePdq Syncing all NC's held on <DC Name>. Syncing
partition: DC=contoso,DC=com SyncAll reported the following errors: Error
issuing replication: 8418 (0x20e2): The replication operation failed because of a
schema mismatch between the servers involved.
REPADMIN /REPLSUM
Cause
Attempts to replicate AD when schema information is not consistent between the DC
partners involved will result in a "Schema Mismatch" error status. This symptom can be
manifested in a number of different ways as outlined above. However the underlying
cause of the error being raised can vary.
There are also scenarios where this error will be raised but there is not a mismatch in the
schema information in the strictest sense. In these cases, it may be that the Active
Directory data being replicated does not conform to the current schema definition for
the relevant object or attribute whose value is being synchronized and applied at the
destination DC.
The duration of schema mismatch errors typically fall into one of two categories,
transient or persistent. Within the persistent category, there are some failures that can
be investigated AND resolved safely.
For issues where schema replication fails due to improper attribute schema definitions
please engage Microsoft Customer Service and Support to work through the issue.
Note: Lab testing of schema modification is critical prior to implementing any proposed
action plan into your production schema.
The duration for which schema mismatch may be logged by a given destination DC
should last no more than one replication cycle for any given partner. DC's with only one
partner should only see the error once while bridge head dc's may see the error multiple
times, once for each partner.
A reasonable estimate of the acceptable time limit transient failure is forest convergence
period* x 1.5.
*The largest amount of time taken for an object update to replicate from one DC to all
other DCs in the forest.
Transient Symptom Triggers
The duration for which schema mismatch may be logged by a given destination DC
should last no more than one replication cycle for any given partner. DC's with only one
partner should only see the error once while bridge head dc's may see the error multiple
times, once for each partner.
*A reasonable estimate of the acceptable time limit transient failure is twice the amount
of time taken for an object update to replicate from one DC to all other DCs in the
forest.
In some scenarios the schema mismatch error will persist indefinitely and intervention is
required to investigate, identify the underlying trigger and resolve. Some scenarios
present as known issues while in other the Schema Mismatch is purely a side effect of
other blocking issues that prevent it from self-resolving through normal replication.
Known Issues
ノ Expand table
947020 Event IDs 1481, 1173, and 1203 are logged in the Directory Event ID 1481 Error
Services log on a Windows Server 2003-based domain 2083; DSID 31510B7
controller
Event ID 1173 Param
2083 DSID 31010B7
Event ID 1203
"Schema Mismatch"
824873 Event 1791 is logged when information is replicated from Event ID 1791 Error
Windows 2000 to Windows Server 2003 8418
KB Article Title Key Data
No.
2001769 Error While Propagating Permissions: "Unable to save Event ID 1450 DSID
permission ... 3150dbe
ノ Expand table
Replication failure caused by Lingering objects when Strict 2028495 Event ID 1988 with
Replication Consistency is enabled status 8606
Replication Topology
1753:
2089874
Resolution
In order to resolve an issue where schema mismatch is cited, it is critical to understand
the scenario in which the is error is being raised as it may influence the data collected.
The common scenarios are:
The aim of the initial data collection is to try to capture information sufficient to identify
if a known issue is being experienced or if other issues are contributing to the failure.
Collecting replication data for all DC's in the forest is advised particularly in the case
where a schema mismatch has been noted after a recent Schema Update or during
normal replication monitoring. Collecting this data helps identify any pockets of
replication failure on which to focus.
Once all the DC's experiencing replication failures, of ANY form, have been identified
from the repadmin /showrepl data focus cam move to specific DC's.
In the case where DCpromo fails with a schema mismatch the following data should be
collected:
The current schema version can be read from two places on any given DC - the registry
and in the Active Directory itself. In normal operation the two values should be in sync
and should correctly reflect the Schema Version of the forest as defined by the schema
FSMO.
Note: Only Microsoft provided updates of the Active Directory Schema will update the
SchemaVersion number.
ノ Expand table
Operating System Schema Version
Windows 2000 13
In the Registry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\SystemSchemaVe
rsion
In Active Directory:
Object: Cn=Schema,cn=configuration,dc=contoso,dc=com
Attribute: ObjectVersion
The schema version in AD can be exported using one of the following commands
Possible Resolution 1
The registry and AD schema versions on the source DC are in sync and match the
expected forest-wide version
It's possible that a reboot of the source DC will resolve the replication failures. The
underlying cause is thought to be failure to correctly reload the in memory version of
schema after the schema update has been received.
In the event that the resolution above is not applicable or is unsuccessful increase
"NTDS Diagnostic" Event Logging on both Source AND Destination DCs under the
following registry key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Diagnostics
ノ Expand table
5 Replication DWORD 5
24 Schema DWORD 5
This will log additional information to the Directory Services event log that will assist in
diagnosing the issue
Trigger the scenario that raises the Schema Mismatch err and review the event log data
collected to try to identify:
Event ID's of interest from the Directory Service Event log include:
The following example events show both an internal ID and extended error data
The following example event identifies a specific object on which replication blocked.
Look for correlating events including the ones noted above which point to known
trigger scenarios.
Look for events that might indicate other underlying issues on the source or destination
that might be blocking replication and so causing what might be a transient mismatch
failure to persist.
See Causes Section for details of events and related status codes for some of these
issues.
Supplementary Actions
If the object triggering failure can be identified, then first use repadmin /showobjmeta to
dump the object replication metadata and on both source and destination DC. This
method can be used to identify "candidate" attributes that could be the cause of failure
Review the replication metadata for correctness by ensuring that all the replicated
attributes display a correctly formed attribute name
Example
The two entries fro replication metadata for a problem object as displayed by
Repadmin.exe shows no ldapdisplayname:
USN DSA Org USN Org. Time/Date Version Attribute
24260 f4617e99-9688-42a6-8562-43fdd2d5cda4 18085395 <DateTime> 2
24260 f4617e99-9688-42a6-8562-43fdd2d5cda4 18086114 <DateTime> 3
If any of the metadata fields has no associated name try using ldp.exe to expose the
internal attributeid
The metadata for the same object above as displayed in LDP.exe shows the AttributeID
associated with the data
The attribute ID can be used to help identify the problem attribute but requires the
engagement of Microsoft Support.
Version comparison - attributes to be replicated will have higher version numbers on the
source.
7 Note
In the DCpromo scenario, the destination object will most likely not yet exist.
If ONLY the object can be identified from the event data, dump the attribute values of
the trigger object.
Console
If the replication events citing 8418 yielded any Extended or Internal errors use those
values to try to match against known issues.
If the attribute triggering failure cannot be identified by the event log data or replication
metadata, then it will be necessary to engage Microsoft Product Support to assist with
the investigation.
Schema Review
Once a potential trigger attribute has been identified and other known causes
eliminated then the next action is to review the schema definition for the attribute. This
analysis is best performed with the assistance Microsoft Product Support.
Export of entire schema partition from both source and destination domain controllers:
Console
Directory Services Event logs with extended logging from the source and
destination domain controller
Replication metadata of any problem object identified from the event logs
LDIFDE Export of any problem object identified from the event logs
More information
Possible schema definition issues that can trigger mismatch include:
OID Clash Invalid OM Syntax values Invalid MayContain values Objects with attributes
that contain data but the schema definition for the attribute type(s) has been marked as
defunct
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes symptoms, cause, and resolution steps for cases in which AD
Replication is delayed and generates Win32 error 8461:
Symptoms
The specific symptoms are as follows:
Symptom 1:
DCDIAG reports that the Active Directory Replications test has failed with error
status (8461): The replication operation was preempted.
Symptom 2:
REPADMIN.EXE reports that the last replication attempt was delayed for a normal
reason, result 8461 (0x210d).
REPADMIN commands that commonly cite the 8461 status include but aren't limited
to:
REPADMIN /REPLSUM
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /SYNCALL
Symptom 3:
Symptom 4:
Repadmin /queue output reveals one or more tasks that have the status of
"PREEMPTED."
Symptom 5:
The "replicate now" command in Active Directory Sites and Services (DSSITE.MSC)
fails and generates the following error message:
Symptom 6:
Events in the Directory Services event log cite the error status 8461.
ノ Expand table
7 Note
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NTDS\Diagnostics]
"5 Replication Events"=dword:00000001
ノ Expand table
Event Event String
Source and
Event ID
Operation:
Synchronize Replica
Options:
0x21000051
Parameter 1:
DC=Contoso,DC=com
Parameter 2:
<source DCs ntds settings object object guid>
Parameter 3:
Parameter 4:
A long-running replication task may also occur when a system has been
unavailable or a directory partition has been unavailable for an extended
period of time. A long-running replication task may indicate a large number
of updates, or a number of complex updates occurring at the source
directory service. Performing these updates during non-critical times may
prevent replication delays.
Additional Data
Error value:
Cause
This replication status is returned when there are higher priority replication tasks in the
destination DCs inbound queue. It doesn't indicate a failure condition; the replication
task isn't cancelled, instead, the task is put into a holding pattern until the higher
priority work is completed. It's normal to see this message returned periodically in larger
environments, and it's important to note that the condition is transient.
While this issue is common and transient, some other AD replication problems can
cause a backlog in the queue. If this occurs, you might start seeing replication tasks
being preempted frequently. Frequent logging of event 2094 "Performance warning"
(sample event are shown in the "Symptoms" and "Resolution" sections) is another
indication that troubleshooting may be needed.
Analyze queue output over time to determine whether tasks are being processed
Explanation of repadmin /showrepl /verbose
ノ Expand table
Active Directory The progress of inbound replication was Wait for replication to
replication has interrupted by a higher priority complete. This
been preempted. replication request, such as a request informational message
generated manually with the repadmin indicates normal operation.
/sync command.
Replication Load
Too many partners
Too frequent of object and attribute updates
Frequent updates combined with inter-site change notification that results in a
high rate of redundant change notifications
Small replication schedule window
Performance-based issue
Resolution
This status does not indicate a failure condition. This is a temporary issue in many cases
and there are no resolution steps required.
If the status 8461 never clears, there is a lot of work to do to determine the correct path
to take. This issue requires advanced knowledge of multiple troubleshooting tools. It
may be necessary to seek the help of Microsoft Support to assist with the data analysis
process.
You will have to determine the cause before you implement any steps to resolve an
underlying problem. The cause of the replication status 8461 can occur in any of the
following scenarios:
Transient condition
Replication load
Consistent Load
Temporary Load
Performance issue
OS Performance
Disk Performance
Network Performance
Determine whether this is only a transient condition. Document the time that manual
replication is initiated, and find the corresponding tasks in the repadmin /queue output.
Sometime later, run repadmin /queue , and determine whether the manually initiated
tasks are still present.
If replication tasks are queued. Look at the currently running task, and investigate.
Use event log data, repadmin output, and performance monitor to help isolate the
cause of the problem. Determine how quickly updates are being processed and what
rate of change.
Replication Load
Consistent
The domain controller has too many replication partners or under too great a replication
load. Symptoms of an overloaded DC would be:
A replication queue that never clears even though replication tasks are processed
in a timely fashion
7 Note
You can use repadmin /queue over time and correlate this with performance
data to identify this scenario.
Excessive replication
Attributes that are frequently updated. Identify attribute updates using verbose
replication event log events (or using repadmin /showchanges ) and then correlate with
repadmin /showobjmeta for several objects on the destination DC. Look at the attribute
identified in the event and look for a high version number, or get multiple logs for the
same object throughout the day and see if the version number increases frequently.
Temporary
Bulk changes infrequently
After hosting a partition for the first time or during a rehost
Performance-based issue
Common symptoms for performance induced queue buildup include
Event ID 2094
If you wish to change the warning limit, the registry key is included below. A value
of zero will disable the check.
Determine whether changes that are applied to the database are occurring slowly by
using performance monitoring and repadmin /queue output. Correlate AD Replication
counters with base OS performance counters (Disk, Memory, Network, and CPU).
DC
Disk
Network
More information
DC / OS performance problems
Resource depletion
Disk bottleneck
AD database problems
Logical or physical corruption
Object or attribute issues
DC load issues
Replication storm
High rate of change to objects and attributes
Full partition syncs
In latent AD replication, the DC is not notified about changes for a long time:
Repadmin Data
Use Repadmin /queue to document the queued replication tasks. Monitor the queue to
see if there is a delay in processing replication tasks. Log all repadmin /queue output to
the same text file so you have good historical data.
Console
Review the output to see whether replication tasks are processed in a timely manner.
The top of the file contains the currently running task and the length of time it has been
running. If the same task is always at the top of the output, you can use verbose output
of repadmin /showrepl to monitor the progress.
Repadmin changes
Repadmin /showrepl
Use Repadmin /showrepl and the /verbose option to monitor the last replication status
and the number of changes that remain to be replicated.
Console
To limit the output so that only the desired Source DC is displayed, use the following:
Console
Repadmin /showutdvec
Console
Obtain Repadmin /showutdvec /latency from the source and destination DC for the
partition in question.
Source DC
Destination DC
Source DC
Destination DC
1126541-801224 = 325317
7 Note
You can also get the Source DCs highestcommitedUSN from the Source DC by
using this command:
Console
Performance Data
Create a new User Defined Data Collector set in Performance Monitor that uses the AD
Diagnostics template.
The steps here detail how to set up a good set of baseline DC performance counters.
You will need to modify some of the settings, such as duration and sample interval to fit
your specific scenario.
1. Open Server Manager on a Full version of Windows Server 2008 or a later version.
2. Expand Diagnostics > Performance > Data Collector Sets.
3. Right-click User Defined and select New > Data Collector Set.
4. Type in a name such as AD DS Diagnostics, and leave the default selection of
Create from a template (Recommended) selected. Then, select Next.
5. Select Active Directory Diagnostics from the list of templates and then select Next
and follow the Wizard prompts (making any changes you think are necessary).
6. Right-click the new User Defined data collector set and view the Properties.
7. To change the run time, modify the Overall Duration settings in the Stop Condition
tab, and then click OK to apply the changes.
Options to consider:
Overall Duration -you can have the data collector stop after collecting for a set
amount of time
Limits -you can have the data collect stop after a time or size threshold is reached
(with the option to have it automatically restart)
Setting limits is advantageous when you want to limit the log size.
Duration
Maximum Size
View Performance Counter Properties for the User Defined Data Collector Set
All recommended counters are included in the default AD Diagnostic's collector set with
three exceptions:
Database ==>Instances(lsass/NTDSA)\ *
LogicalDisk(*)\*
For LogicalDisk: all instances are not required - System drive and drives where
database and logs are stored should be included at minimumSecurity System-
Wide Statistics\*
To add the AD DS database counters to the User Defined Data Collection Set
After the settings are configured to your liking, you can run the new data collector set
directly from Server Manager or export it and deploy it to specific servers.
When you are ready to begin collecting performance data, start your newly defined
Collection Set:
To start your newly defined Data Collection Set from the MMC:
1. In the Performance Monitor mmc, navigate to Performance / Data Collector Sets /
User Defined
2. Right-click the new collection set AD DS Diagnostics and select Start.
3. You can verify that it has started by selecting User Defined AD DS Diagnostics
should have a status of Running
To START a collection of data from the command-line issue this command from an
elevated command prompt: logman start "user defined\AD DS Diagnostics" -ets
To STOP the collection of data before the default 5 minutes, issue this command: (get at
least one full five-minute sample for this issue) logman stop "user defined\AD DS
Diagnostics" -ets
Console
The default logging enabled in the directory services event log is useful to monitor for
events that indicate slow application of changes. (EVENT X) Verbose diagnostic logging
can be enabled to see what changes are currently being applied. Enabling diagnostic
logging at the level mentioned in this article will cause the log to fill up rather quickly,
so only enable it while actively troubleshooting this condition. To give an idea of rate of
events logged with this level of verbosity:
A Directory Services event log configured to 100 MB wrapped in less than two minutes
(1 minute 27 seconds). The log contained 195,728 events. Of all events, 189,340 were
event ID 1412 (attribute addition).
Size the event log so that the enhanced logging doesn't cause the log to wrap in
too short of a period
Export the Directory Services event log shortly after you receive the status 8461, and
reduce the diagnostic logging to a suitable level.
How quickly are attribute values are written to the database? ->Directory Services event
log Event ID 1412 or even better, use performance counter: DirectoryServices / DRA
Inbound Properties Applied/sec
At diagnostic level 5 for Replication Events, for user object creation, around 25 or so
event 1412's (depending on what was written at time of user creation) are written (one
per attribute value). When all attributes have been added, the object creation event is
logged (Event ID 1365).
Internal event:
The following object changes were applied to the local Active Directory Domain
Services database.
Property: 900dd (sAMAccountName)
Object: CN=xtestingusers14167,CN=Users,DC=north,DC=fabrikam,DC=com Object
GUID: <GUID>
Remote version: 1
Remote timestamp: <DateTime>
Remote Originating USN: 540828
The Property section contains both the attributeID and the lDAPDisplayName of the
attribute.
One event is written per value at this debug log level. Filter on the events and determine
how many entries occur in a given period. Review the event details in order to
determine if we are writing values for multiple attributes in order to instantiate an object
or if we are writing to the same attribute across multiple objects. While this level of
analysis can seem cumbersome, it can be useful in determining root cause. As an
example, if you see that we are only writing a few events per second then that could
indicate that transactions are being written to the database slowly or perhaps we have
too many partners that are sending redundant changes (event ID 1239).
Notice that it is perfectly normal to see event ID 1239 when replication diagnostics is set
to 0x5. If you filter out event 1239 and you see nothing else and you have a fairly long
event log history, then that may indicate a problem. This issue was observed by a
customer with a large Active Directory environment that had inter-site change
notification enabled. If you determine that there is a large number of events per second,
replication is probably not affected by a performance problem.
Object Metadata
If an event is logged that indicates a change is taking a long time to process Event ID,
record the objectGUID, and then get the following output:
Replication metadata:
Console
Review the output for recently modified attributes. Pay particular attention to attributes
with frequently modified version numbers. An attribute that has a high version count
could indicate that frequent changes are being made to the attribute. If you suspect this,
you can either view the attribute value to get some context as to why the attribute was
changed, or you can let some time pass, and then get addition repadmin /showobjmeta
output in order to check whether the version of the same attribute on the same object
has increased further.
Use a utility to output the object and attribute values. Then, review the attribute data for
the attributes that have recently modified data. The following examples present two
methods to do this.
Console
Connect and bind to the server in LDP and copy all the output for the object to a text
file
ldpoutput.txt
Network-related data
Console
ノ Expand table
DirectoryServices\DRA Indicates the number of directory This counter should be
Pending Replication synchronizations that are queued as low as possible. If it
Synchronizations for this server. This counter helps is not, the server
identify replication backlogs-the hardware is probably
higher the number, the larger the slowing replication.
backlog.
Use this counter to determine the replication queue. Repadmin /queue DCName also
reports this information.
ノ Expand table
DRA Inbound Objects Shows the number of objects received from neighbors through
Applied/sec inbound replication and applied.
DRA Inbound Properties Shows the total number of object properties (attributes) applied
Applied/sec from inbound replication partners.
You can use the two counters to monitor how quickly changes are being applied to the
database.
Database:
Server Performance:
ノ Expand table
Network:
ノ Expand table
Testing
Scenario Two DCs were isolated (no client or other server activity) 15,000 users were
created from script with the minimal attributes populated on one DC Enabled the
connection between the two DCs.
A Directory Services event log configured to 100 MB in size wrapped in less than two
minutes (1 minute 27 seconds). The log contained 195,728 events. Of all events, 189,340
were event ID 1412 (attribute addition). The number of event 1412s per second:
01: 2400
02: 3570
03: 3540
04: 2160
05: 1170
06: 1890
07: 2225
08: 1435
09: 4233
10: 2817
Event ID 1365 (Object creation) was logged 6,312 times in 1 minute 27 seconds. In one
minute, 4,630 user objects were created, consisting of 138,900 attributes) or about 77
objects per second.
Object creations per second is obtained via the following performance counters:
Database adds/sec
NTDS / DRA Inbound Values (DNs only)/sec This number includes objects that
reference other objects. Values for distinguished names, such as group or
distribution list memberships, are more expensive to apply than other kinds of
values because a group or distribution list object can include hundreds or
thousands of members. In contrast, a simple object might have only one or two
attributes. A high number from this counter might explain why inbound changes
are slow to be applied to the database. Attribute creations per second is:
This issue occurs when the GC being rehosted is busy accepting updates for other
partitions. The sourcing of writable domain partitions including schema, configuration,
and domain partition are by nature higher priority work-items than the rehosting of a
read-only domain partition.
Repadmin /queue output should show that the request to add the partition has been
queued and will eventually be processed. However, sometimes it is necessary to use an
alternative method of partition rehost:
1. Repadmin /unhost
2. Wait for event ID 1660
3. Disable KCC connection translation
4. Repadmin /addIf the process is preempted before /add is complete, you can
disable inbound replication and use repadmin /replicate and the /readonly and
/force options to get the partition re-hosted before you re-enable inbound
replication.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article provides help to troubleshoot Active Directory replication error 8606:
Insufficient attributes were given to create an object.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Summary
This article describes the symptoms and causes of an issue in which Active Directory
replication is unsuccessful and generates error 8606: "Insufficient attributes were given
to create an object. This object may not exist because it may have been deleted." This
article also describes a resolution for this issue.
Symptoms
Symptom 1
The DCDIAG reports that the Active Directory Replications test failed with error 8606:
"Insufficient attributes were given to create an object."
Symptom 2
Incoming replication that is triggered by the Replicate Now command in the Active
Directory Sites and Services snap-in DSSITE.MSC is unsuccessful and generates the error
"Insufficient attributes were given to create an object." When you right-click a
connection object from a source DC and then select Replicate now, the replication is
unsuccessful and generates the following error: "Access is denied." Additionally, you
receive the following error message:
Insufficient attributes were given to create an object. This object may not exist
because it may have been deleted and already garbage collected.
Symptom 3
Various repadmin.exe commands fail with error 8606. These commands include but are
not limited to the following:
Symptom 4
Event 1988 is logged shortly after one of the following events occurs:
Symptom 5
NTDS replication event 1988 may be logged in the Directory Service event log of
domain controllers that are trying to inbound-replicate Active Directory.
Type: Error
Source: NTDS Replication
Category: Replication
Event ID: 1988
User: NT AUTHORITY\ANONYMOUS LOGON
Computer: <hostname of DC that logged event, aka the "destination" DC in the
replication attempt>
Description: The local domain controller has attempted to replicate the following
object from the following source domain controller. This object is not present on the
local domain controller because it may have been deleted and already garbage
collected.
Source domain controller:
<fully qualified GUIDED CNAME of source DC>
Object:
<DN path of live object on source DC>
Object GUID:
<object GUID of object on source DCs copy of Active Directory>
Cause
Error 8606 is logged when the following conditions are true:
If the destination domain controller was configured to use loose replication consistency,
the object would have been "reanimated" on the destination domain controller's copy of
the directory. Specific variations that can cause error are 8606 documented in the "More
Information" section. However, the error is caused by one of the following:
When you troubleshoot 8606 errors, think about the following points:
Although error 8606 is logged on the destination domain controller, the problem
object that is blocking replication resides on the source domain controller.
Additionally, the source domain controller or a transitive replication partner of the
source domain controller potentially did not inbound-replicate knowledge of a
deleted tombstone lifetime number of days in the past.
The NTDS Replication 1988 event identifies only the current object on the source
domain controller that is blocking incoming replication by a strict mode
destination domain controller. There are likely additional objects "behind" the
object that is referenced in the 1988 event that is also lingering.
Because of the way that domain controllers individually delete objects from their
deleted object containers (the garbage-collection daemon runs every 12 hours
from the last time each domain controller last started), the objects that are causing
8606 errors on destination domain controllers could be subject to removal in the
next garbage-collection cleanup execution. Lingering objects in this class are
transient and should remove themselves in no more than 12 hours from problem
start.
The lingering object in question is likely one that was intentionally deleted by an
administrator or application. Factor this into your resolution plan, and beware of
reanimating objects, especially security principals that were intentionally deleted.
Resolution
Resolution
1. Identify the current value for the forest-wide TombStoneLifeTime setting.
Console
See the "Tombstone lifetime and replication of deletions" section in the following
article in the Microsoft Knowledge Base:
910205 Information about lingering objects in a Windows Server Active
Directory forest.
2. For each destination domain controller that is logging the 8606 error, filter the
Directory Service event log on NTDS Replication event 1988.
3. Collect metadata for each unique object that is cited in the NTDS Replication event
1988. From each 1988 event that is logged on the destination domain controller
that cites a new object, populate the following table:
ノ Expand table
The date stamps for LastKnownParent and IsDeleted columns can be determined
by running repadmin /showobjmeta and referencing the objectguid of the object
that is cited in the NTDS replication 1988 event. To do this, use the following
syntax:
Console
The date stamp for LastKnownParent identifies the date on which the object was
deleted. The date stamp for IsDeleted tells you when the object was last deleted or
reanimated. The version number tells you whether the last modification deleted or
reanimated the object. An IsDeleteted value of 1 represents an initial delete. Odd-
numbered values greater than 1 indicate a reanimation following at least one
deletion. For example, an isDeleted value of 2 represents an object that was
deleted (version 1) and then later undeleted or reanimated (version 2). Later even-
numbered values for IsDeleted represent later reanimations or undeletes of the
object.
4. Select the appropriate action based on the object metadata cited in the 1988
event.
Error 8606 / NTDS Replication event 1988 event is most frequently caused by long-
term replication failures that are preventing domain controllers from inbound-
replicating knowledge of all originating deletes in the forest. This results in
lingering objects on one or more source domain controllers.
Review the metadata for object that is listed in the table that was created in step 4
of the "Resolution" section.
If the object in the 1988 event is either ((live on the source domain controller) but
(deleted on the destination domain controller for longer than tombstone lifetime
expiration)), see "Removing Lingering Objects" and "." Objects in this condition
must be manually removed by an administrator.
Deleted objects may have been prematurely purged from the deleted objects
container if system time jumped forward in time on the destination domain
controller. Review the "Check for Time Jumps" section.
If the object that is cited in the 1988 event exists in the deleted objects container
of the source domain controller and its delete date is right at the cusp of
tombstone lifetime expiration in such a way that the object was reclaimed by
garbage collection by one or more destination domain controllers and will be
reclaimed by garbage collection at the next garbage-collection interval on source
domain controllers (that is, the lingering objects are transient), you have a choice.
Either wait for the next garbage collection execution to delete the object, or
manually trigger garbage collection on the source domain controller. See
"Manually starting garbage collection." The introduction of the first domain
controller, or any change in the partial attribute set, can cause this condition.
If repadmin /showobjmeta output for the object that is cited in the 1988 event has a
LastKnownParent value of 1, this indicates that the object was deleted, and an
IsDeleted value that of 2 or some other even-numbered value, and that date
stamp for IsDeleted is at the cusp of the tombstone lifetime number of days
different from the date stamp for LastKnownParent, then the object was deleted
and then undeleted / auth-restored while it was still live on the source domain
controller but already reclaimed by garbage collection by destination domain
controllers logging error 8606 / Event 1988. See Reanimations at the cusp of TSL
expiration
The easiest method to clean up Lingering Objects is to use the LoL. The LoL tool was
developed to help automate the cleanup process against an Active Directory Forest. The
tool is GUI-based and can scan the current Active Directory Forest and detect and
cleanup lingering objects. The tool is available on Microsoft Download Center .
Repadmin
The following two commands in repadmin.exe can remove lingering objects from
directory partitions:
repadmin /removelingeringobjects
repadmin /rehost
Console
repadmin /removelingeringobjects <Dest_DSA_LIST> <Source DSA GUID> <NC>
[/ADVISORY_MODE]
Where:
<Dest_DSA_LIST> is the name of a domain controller that contains lingering objects
(such as the source domain controller that is cited in the NTDS Replication 1988 event).
<Source DSA GUID> is the name of a domain controller that hosts a writable copy of
the directory partition that contains lingering objects to which the domain controller in
<Dest_DSA_LIST> has network connectivity. The DC to be cleaned up (first DC specified
in the command) must be able to connect directly to port 389 on the DC that hosts a
writable copy of the directory partition (specified second in the command).
<NC> is the DN path of the directory partition that is suspected of containing lingering
objects, such as the partition that is specified in a 1988 event.
Console
Where:
DSA is the name of a domain controller that hosts a read-only domain directory
partition for a nonlocal domain. For example, a GC in root.contoso.com can rehost its
read-only copy of child.contoso.com but cannot rehost root.contoso.com.
<Good Source DSA Address> is the name of a domain controller that hosts a writable
copy of <Naming Context>. The domain controller must be network-available to the
DSA computer.
If the lingering object that is reported in the 1988 event is not removed by repadmin,
evaluate whether the object on the source domain controller was created in USN gap, or
whether the objects originating domain controller does not exist in the source domain
controller's up-to-dateness vector.
Repldiag
7 Note
Lingering objects can also be removed by using repldiag.exe. This tool automates
the repadmin /removelingeringobjects process. Removing lingering objects from a
forest with repldiag is as simple as running repldiag /removelingeringobjects .
However, it is usually best to exercise some control over the process in larger
environments. The option /OverRideReferenceDC allows you to select which DC is
used for cleanup. The option /outputrepadmincommandlinesyntax allows you to see
what a forest-wide cleanup looks like using repadmin.
Launch the following TechNet on-demand lab for guided troubleshooting practice of
this and other AD replication errors:
In the lab, you use both repadmin and repldiag.exe to remove lingering objects
Troubleshooting Active Directory Replication Errors
In this lab, you'll walk through the troubleshooting, analysis and implementation phases
of commonly encountered Active Directory replication errors. You'll use a combination
of ADREPLSTATUS, repadmin.exe, and other tools to troubleshoot a five DC, three-
domain environment. AD replication errors encountered in the lab include -2146893022,
1256, 1908, 8453 and 8606."
Date stamps that predate the release of an operating system (for example, date
stamps from CY 2003 for an OS released in CY 2008)
Date stamps that predate the installation of the operating system in your forest
Date stamps in the future
Having no events that are logged in a given date range
Microsoft Support teams have seen system time on production domain controllers
incorrectly jump hours, days, weeks, years, and even tens of years in the past and future.
If system time was found to be inaccurate, you should correct it and then try to
determine why time jumped and what can be done to prevent inaccurate time going
forward vs. just correcting the bad time. Possible questions include the following:
Was the forest root PDC configured by using an external time source?
Are reference online time sources available on the network and resolvable in DNS?
Was the Microsoft or third-party time service running and in an error-free state?
Are domain controller role computers configured to use NT5DS hierarchy to
source time?
Was time rollback protection that is described in Microsoft Knowledge Base article
884776 in place?
Do system clocks have good batteries and accurate time in the BIOS on domain
controllers on virtual host computers?
Are virtual host and guest computers configured to source time according to the
hosting manufacturer's recommendations?
Microsoft Knowledge Base article 884776 documents steps to help protect
domain controllers from "listening" to invalid time samples. More information
about MaxPosPhaseCorrection and MaxNegPhaseCorrection is available in the
W32Time Blog post Windows Time Service .
dn:
changetype: modify
replace: DoGarbageCollection
dogarbagecollection: 1
-
7 Note
controller but is live on the source domain controller and is either a deleted or a
nondeleted object.
A review of key fields from repadmin /showobjmeta on the source domain controller
should report that the following are true: LastKnownParent has a value of 1, and its date
stamp is at the cusp of TSL days in the past. Its date stamp indicates the delete date of
the object.
IsDeleted has a version number of 2 (or another even-numbered value), where version 1
defined the original deletion and version 2 is the restore / reanimation. The date stamp
for "isDeleted=2" should be ~ TSL number of days later than the last change date for
LastKnownParent.
Evaluate whether the object in question should remain a live object or a deleted object.
If LastKnownParent has a value of 1, something or someone deleted the object. If this
was not an accidental deletion, chances are good that the object should be deleted from
any source domain controllers that have a live copy of the object.
If the object should exist on all replicas, the options are as follows:
Enable loose replication on strict mode destination domain controllers that do not
have the object.
Force-demote the domain controllers that have already garbage collected the
object.
Delete the object and then re-create it.
More information
Launch the following TechNet on-demand lab for guided troubleshooting practice of
this and other AD replication errors:
The CONTOSO.COM domain contains two domain controllers in the same domain.
Tombstone lifetime = 60 days. Strict replication is enabled on both domain controllers.
DC2 experiences a motherboard failure. Meanwhile, DC1 makes originating deletes for
stale security groups daily over the next 90 days. After it is offline for 90 days, DC2
receives a replacement motherboard, powers up, and then originates a DACL or SACL
change on all user accounts before it inbound-replicates knowledge of originating
deletes from DC1. DC1 logs 8606 errors for updates security groups that are purged on
DC1 for the first 30 days that DC2 was offline.
Any updates to the partial attribute set can cause temporary lingering objects that will
clear themselves up after source domain controllers garbage-collect deleted objects at
the cusp of TSL expiration (for example, the addition of the first W2K8 R2 domain
controller to an existing forest).
Active Directory requires end-to-end replication from all partition holders to transitively
replicate all originating deletes for all directory partitions to all partition holders. Failure
to inbound-replicate a directory partition in a rolling TSL number of days results in
lingering objects. A lingering object is an object that was intentionally deleted by at
least one domain controller but that incorrectly exists on destination domain controllers
that did not inbound-replicate the transient knowledge of all unique deletions.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article describes the symptoms, cause, and resolution steps for situations where
Active Directory operations fail with error 8456 or 8457.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Symptoms
Active Directory operations fail with error 8456 or 8457: The source | destination server
is currently rejecting replication requests.
Dialog title text: Active Directory Installation Wizard Dialog message text:
The operation failed because: Active Directory could not transfer the remaining
data in directory partition <directory partition DN path> to domain controller
<destination DC>. "The source server is currently rejecting replication
requests."
2. DCDIAG reports the error: The source server is currently rejecting replication
requests or The destination server is currently rejecting replication requests.
3. REPADMIN indicates that incoming and outgoing Active Directory replication may
be failing with the error: The source | destination server is currently rejecting
replication.
DC=Contoso,DC=COM
<site name><dc name> via RPC
DC object GUID: <objectguid of source DCs NTDS settings object>
Last attempt @ <date> <time> failed, result 8457 (0x2109):
The destination server is currently rejecting replication requests.
DC=Contoso,DC=COM
<site name><dc name> via RPC
DC object GUID: <objectguid of source DCs NTDS settings object>
Last attempt @ <date> <time> failed, result 8456 (0x2108):
The source server is currently rejecting replication requests.
7 Note
REPADMIN commands may display both the hexadecimal and the decimal
equivalent for the currently rejecting replication error.
4. Event sources and event IDs that indicate that a USN rollback has occurred include
but are not limited to the following.
ノ Expand table
Where embedded status codes 8456 and 8457 map to the following.
ノ Expand table
5. NTDS General Event 2013 may be logged in the Directory Services event log. This
indicates that a USN rollback occurred because of an unsupported rollback or
restore of the Active Directory Database.
6. NTDS General Event 1393 may be logged in the Directory Services event log. This
indicates that the physical or virtual drive that is hosting the Active Directory
database or log files lacks sufficient free disk space:
Cause
Incoming or outgoing replication was automatically disabled by the operating system
because of multiple root causes.
The operating system automatically makes four configuration changes when one of
three conditions occurs. The four configuration changes are as follows:
The dominant root cause for this error condition is a USN rollback discussed in A
Windows Server domain controller logs Directory Services event 2095 when it
encounters a USN rollback .
Do not assume that any nonzero value for DSA not writable or that a source or
destination server is currently rejecting replication requests during DCPROMO / AD
Replication definitively means that a USN rollback has occurred and that such domain
controllers implicitly have to be force-demoted or force-repromoted. Demotionmaybe
the correct option. However, it may be excessive when the error is caused by insufficient
free disk space.
Resolution
1. Check the value for DSA not writable.
For each domain controller that is logging the 8456 or 8457 error, determine
whether one of the three triggering events automatically disabled incoming or
outgoing Active Directory Replication by reading the value for " DSA not writable"
from the local registry.
When replication is automatically disabled, the operating system writes one of four
possible values to DSA not writable:
Path:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
A value of 1 can be written only when the forest version is incompatible with the
OS (for example, the W2K DC is promoted into a Windows Server 2003 forest
functional level forest or the like).
A value of 2 means that the physical or virtual drive that is hosting the Active
Directory database or log files lacks sufficient free disk space.
A value of 4 means that a USN rollback occurred because the Active Directory
database was incorrectly rolled back in time. Operations that are known to cause a
USN rollback include the following:
Technically, DSA not writable could consist of multiple values. For example, a
registry value of 10 would indicate insufficient disk space and a corrupted UTD.
Typically, a single value is written to DSA not writable.
7 Note
Assuming the Directory Service event log has not wrapped, you may find one or
more related events logged in the Directory Service event log of a domain
controller that is logging the 8456 or 8457 error.
ノ Expand table
Event Details
3. Perform the recovery based on the value of DSA not writable or on events that are
logged on the system:
If DSA not writable equals 2 or if NTDS General event 1393 is logged, check
for sufficient free disk space on the physical and virtual partitions that are
hosting the Active Directory database and log files. Free up space as required.
If DSA not writable equals 8, demote and then repromote the domain
controller before it can replicate its bad value to other domain controllers in
the forest.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Feedback
Was this page helpful? Yes No
This article discusses how to use Ntdsutil to find and clean up duplicate security
identifiers.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 816099
Summary
This article describes how to check for and clean up or remove duplicate security
identifiers (SIDs) in the SAM database. Every security account, such as a user, group, or
computer, has a unique SID. Access permissions are granted or denied to SIDs for
resources, such as files, folders, printers, Microsoft Exchange mailboxes, Microsoft SQL
Server databases, objects that are stored in Active Directory, and any data that is
protected by the Windows Server security model.
A SID contains header information and a set of relative identifiers that identify the
domain and the security account. In a domain, each domain controller can create
accounts and issue a unique SID to every account. Every domain controller maintains a
pool of relative IDs that is used to create SIDs. After 80 percent of the relative ID pool is
consumed, the domain controller requests a new pool of relative identifiers from the
relative ID operations master. Make sure the same pool of relative IDs is never allocated
to different domain controllers, and prevents the allocation of duplicate SIDs. However,
because it is possible (but rare) for a duplicate relative ID pool to be allocated, you have
to identify those accounts that have been issued duplicate SIDs to prevent incorrect
security from being applied.
Duplicate relative ID pools may occur if the administrator seizes the relative ID master
role (RID master), while the original RID master is operational but temporarily
disconnected from the network. In typical practice, the RID master role is assumed by
just one domain controller after one replication cycle. However, before the role
ownership is resolved, two different domain controllers might each request a new
relative ID pool and be allocated the same relative ID pool.
Start Ntdsutil
To start Ntdsutil, follow these steps:
1. At the Ntdsutil command prompt, type security account management, and then
press Enter.
2. To connect to the server that stores your Security Account Maintenance (SAM)
database, type connect to serverDNSNameOfServer at the SAM command prompt,
and then press Enter.
3. At the SAM command prompt, type check duplicate sid, and then press Enter.
7 Note
2. Connect to the server that stores your Security Account Maintenance (SAM)
database. At the SAM command prompt, type 'connect to
serverDNSNameOfServer' and then press Enter.
3. At the SAM command prompt, type cleanup duplicate sid, and then press Enter.
7 Note
Feedback
Was this page helpful? Yes No
This article provides help to fix an issue in which event ID 84 is logged in Active
Directory Rights Management Services (AD RMS) in Windows Server.
Symptoms
On a Windows Server-based computer that has Active Directory Rights Management
Services (AD RMS) installed, you receive the following event:
Parameter Reference
Context: Pipeline[ComponentBase.LogResults]
RequestId:RequestID
HelpLink.ProdName: Microsoft SQL Server
HelpLink.ProdVer: 10.50.4000
HelpLink.EvtSrc: MSSQLServer
HelpLink.EvtID: 8115
HelpLink.BaseHelpUrl: https://go.microsoft.com/fwlink
HelpLink.LinkId: 20476
SqlError-1.Class: 0
SqlError-0.State: 1
SqlError-1.Server: sql01.treyresearch.net ,1441
SqlError-0.Message: Arithmetic overflow error converting IDENTITY to data type
smallint.
SqlError-1.Number: 3606
SqlError-0.Number: 8115
SqlError-1.Message: Arithmetic overflow occurred.
SqlError-1.State: 0
SqlError-0.Server: sql01.treyresearch.net ,1441
SqlError-0.Class: 16
Microsoft.RightsManagementServices.LowSeveritySqlException
Message: The Database Engine threw this exception in response to an error that can
be corrected by the user, such as a missing database object or entity, possible data
inconsistency, transaction deadlock, security setting problems, or SQL command
syntax error. Please examine the SqlError details for more information.
HelpLink.ProdName: Microsoft SQL Server
HelpLink.ProdVer: 10.50.4000
HelpLink.EvtSrc: MSSQLServer
HelpLink.EvtID: 8115
HelpLink.BaseHelpUrl: https://go.microsoft.com/fwlink
HelpLink.LinkId: 20476
Context: ComponentBase.LogResults
SqlError-1.Class: 0
SqlError-0.State: 1
SqlError-1.Server: sql01.treyresearch.net ,1441
SqlError-0.Message: Arithmetic overflow error converting IDENTITY to data type
smallint.
SqlError-1.Number: 3606
SqlError-0.Number: 8115
SqlError-1.Message: Arithmetic overflow occurred.
SqlError-1.State: 0
SqlError-0.Server: sql01.treyresearch.net ,1441
SqlError-0.Class: 16
+ System.Data.SqlClient.SqlException
+ Message: Arithmetic overflow error converting IDENTITY to data type smallint.
Arithmetic overflow occurred.
+ HelpLink.ProdName: Microsoft SQL Server
+ HelpLink.ProdVer: 10.50.4000
+ HelpLink.EvtSrc: MSSQLServer
+ HelpLink.EvtID: 8115
+ HelpLink.BaseHelpUrl: https://go.microsoft.com/fwlink
+ HelpLink.LinkId: 20476
+ Context: ComponentBase.LogResults
Cause
This issue occurs because the AD RMS logging process does not log an event to the
logging database.
There are two tables in the logging database that refer to a UserAgentId value. Both the
dbo.UserAgent and the dbo.ServiceRequest tables have a UserAgentId column. These
columns are both of data type smallint. As soon as the UserAgentId value exceeds the
maximum value (~32,767), the logging database cannot update. When a transaction
does not log, RMS will roll back the request and throw an error.
More information
When requesting a license from AD RMS, clients are passing agent strings with the basic
information about the requesting application. The dbo.UserAgent table only stores
unique agent strings.
Originally, the MSIPC clients just passed in versions of OS, application, MSIPC, and
architecture. The table in which the strings are stored only keeps unique entries. There
should not be lots of unique strings across the user base.
SQL
MSIPC;version=1.0.2191.0;AppName=EXCEL.EXE;AppVersion=16.0.7369.2127;AppArch
=x86;OSName=Windows;OSVersion=10.0.10586;OSArch=amd64
At some point, the MSIPC client started including the process ID (PID) to that user agent
string. This makes every string unique.
SQL
MSIPC;version=1.0.2456.0;AppName=EXCEL.EXE;AppVersion=15.0.4919.1000;AppArch
=x86;PID=13660;OSName=Windows;OSVersion=6.1.7601;OSA
Therefore, the table that should not have terribly many unique strings to store now has
many thousands.
Workaround
To work around this issue, disable logging on the AD RMS cluster:
Resolution
To resolve this issue, change the data type of the columns from smallint to int (integer).
To do this, follow these steps:
7 Note
A large logging database (DB) may take a long time to alter and may cause SQL
performance issues. Therefore, we recommend that you back up the SQL DB from
the production SQL instance and restore it on a nonproduction SQL location. After
that, you can perform the database alteration on the nonproduction SQL location,
and then replace the production DB.
1. Back up the AD RMS logging database.
Sample script
7 Note
Edit the database name and the UserAgent table key value to reflect the target
environment.
SQL
/***************************************************************************
****
THIS TOOL AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND,
EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE.
****************************************************************************
***/
use [DRMS_Logging_ipc_treyresearch_net_443]
go
Feedback
Was this page helpful? Yes No
This article provides solutions to an issue where you can't promote a Windows Server
domain controller to be a global catalog server.
Symptoms
You cannot promote a Microsoft Windows Server domain controller to be a global
catalog server. After you try to assign the role of global catalog server to the Windows
Server domain controller by clicking the Global Catalog check box, the domain
controller is not promoted to be a global catalog server. Information events that are
similar to the following may be logged repeatedly in the Directory Services log.
Event 1559
Event 1578
Event 1801
If you enable diagnostic logging for the Knowledge Consistency Checker (KCC) to level
1, the following event is logged.
Additional symptoms
When you type repadmin /showrepl at the command line of the Windows Server domain
controller, one or more of the domains may not appear.
When you try to add a connection by using the naming context of the missing domain,
you may receive the following error message:
You can verify whether the domain-naming update has reached all the domain
controllers by modifying the dumpDatabase attribute on the domain controller that is
experiencing the problem. For more information, click the following article number to
view the article in the Microsoft Knowledge Base:
In the dump file that you create, look for the cross-reference record for the domain. This
cross-reference record has an object class 196619. Locate the record that the object
class 196619 points to. Then, make sure that the object class that is contained in the
record has an assigned GUID.
In the following example, object 5070 references object 5072. However, object 5072 is
not assigned a GUID:
Resolution
To resolve this problem, use one of the following methods.
Method 1
If one or two domain controllers experience the problem, and other domain controllers
in the same domain do not experience the problem, you must demote and then
promote the domain controllers that are experiencing the problem. To do this, follow
these steps:
1. Log on to the Windows Server domain controller by using an account that has
domain administrator permissions.
2. Click Start, click Run, type dcpromo, and then click OK.
3. Follow the instructions in the wizard to demote the domain controller.
4. After you demote the domain controller, restart the Windows Server computer.
5. Click Start, click Run, type dcpromo, and then click OK.
6. Follow the instructions in the wizard to promote the Windows Server domain
controller.
Method 2
You must rebuild the domain that is mentioned in the event descriptions if one of the
following conditions is true:
More information
Event 1119 may be logged in the Directory Services log on the domain controller. This
event may be logged after you assign the role of global catalog server to the domain
controller, and after the account and the schema information is replicated to the new
global catalog server.
The event description states that the computer is identified as a global catalog server. To
confirm that the domain-naming master is a global catalog server, follow these steps:
1. Click Start, click Run, type cmd, and then click OK.
2. Type nltest /dsgetdc : domain_name /server: server_name, and then press ENTER.
For example, when you type the command, you receive a message that is similar to the
following if the GC flag is present:
DC: \\Server_Name
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you create a DFS
namespace.
Symptoms
You may receive the following error when attempting to create a DFS namespace on a
Windows Server 2008 computer:
Cause
This error can occur when no DomainDNSName records are registered for the domain.
These records are updated by the Netlogon service on domain controllers. These are the
same as parent A records in domain's forward lookup zone.
The following documentation indicates these records are not a requirement and are only
used for DNS clients that do not understand SRV records:
How DNS Support for Active Directory Works.
DnsDomainName:
In a network trace, you will see a DNS lookup for the DomainDNSname A record and the
DNS server will respond with the SOA record if these A records do not exist.
DNS lookup query:
Dns: QueryId = 0x887C, QUERY (Standard query), Query for adatum.com of type
Host Addr on class Internet
QRecord: adatum.com of type Host Addr on class Internet
Resolution
Update the A records on the DNS server, or create a HOSTS file on the Windows Server
2008 computer that includes the fully qualified name and the IP addresses of the
domain controller.
adatum.com 192.168.2.10
adatum.com 192.168.3.10
adatum.com 192.168.4.10
Feedback
Was this page helpful? Yes No
This article describes the problems that you may experience when you rename sites in
the Active Directory forest.
More information
When you rename a site in the Active Directory forest, the following events occur in the
background:
1. The site name change is replicated in the configuration naming context (NC)
throughout the forest.
2. When the site name change is replicated on a local domain controller, the Net
Logon service looks up its subnet-to-site mapping table. Thereafter, the Net Logon
service informs the client computers about the new site name.
3. The Net Logon service on the domain controller then registers its new site-specific
domain controller Service location (SRV) records with its authoritative Domain
Name System (DNS) server.
4. The DNS server writes the new domain controller records to the zone. This new
information is then replicated to other DNS servers based on the DNS or Active
Directory replication schedule.
5. The client computers receive the new site name from the domain controller. The
client computers then use this new site name in the DNS queries to look for
domain controllers.
6. The Distributed File System (DFS) server service keeps caches of client-to-site and
server-to-site mappings. These caches are named "client site cache" and "target
site cache." These caches are refreshed every 12 hours, but the caches are only
reliably present after 24 hours.
Because of the different time intervals that are used to update site-related information,
you may experience the following problems:
When the client computers are informed about the new site name in step 2, their
DNS server may not yet have the new record registrations and will therefore return
an error. The client computers will then query for records that aren't site-specific.
The domain controllers that are returned from this query may only have a weak
network link to the client computer. Therefore, the client computer experiences
poor performance. The effect of this problem depends on the following:
The delay that you experience in obtaining the new DNS records that are
propagated to all DNS servers
To force the Net Logon service to immediately register its DNS records, you can
run the nltest /dsregdns command at the command prompt.
7 Note
The Nltest tool can be obtained from the Microsoft Windows Server 2003
support tools.
When client computers search for domain-based DFS volumes, the DFS namespace
servers or domain controllers examine the IP address of the client computers and
their local site information. When the DFS namespace servers or domain
controllers examine the IP address, they can determine the site that the client
computers are in. You can also perform this mapping from the client site cache.
DFS may run a query for the best alternative site by using the Windows Server
2003 closest site selection mode. The DFS server then examines the target site
cache to find the servers for the site that the client computer is in, and the next
best sites. Because of the delay to update the caches, the DFS server may not find
the new site names in the target site cache. The DFS server then returns an
incorrectly ordered list of servers to the client computer. Therefore, the client
computer may contact slow servers for files. This causes poor performance.
If the site information is completely replicated in Active Directory and DNS, you
may restart all DFS namespace servers or domain controllers so that they obtain
the latest server-to-site mapping.
For more information about DFS, visit the following Microsoft Web site:
This article discusses a situation where Kerberos Forest Search Order (KFSO) doesn't
work in an external trust.
Applies to: Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1
Original KB number: 2977475
Symptoms
In Windows Server 2008 R2 and later versions of Windows Server, the following Group
Policy settings can be used to configure KFSO:
With these settings configured, Kerberos authentication may work in external trusts in a
single-domain forest environment. However, it may fail when the specified forest
contains multiple domains.
Cause
The KFSO feature offers the convenience of allowing for short name (host name) service
principal name (SPN) resolution in a forest trust environment instead of offering the
support of Kerberos authentication over external trusts.
More information
In an external trust environment that has KFSO configured, the KDC, or the Kerberos
client tries to append the specified suffix to search, and then it issues a DsCrackNames
request against the target forest in order to resolve the requested SPN. However, the
DsCrackNames request may try to connect to any global catalog in the target forest. If
the request contacts the domain controller in the directly trusted domain, Kerberos
authentication may be successful. If the request contacts a domain controller in another
domain, Kerberos authentication may be unsuccessful.
Feedback
Was this page helpful? Yes No
This article provides the steps to optimize the location of a domain controller or global
catalog that resides outside of a client's site.
Summary
The domain controller locator mechanism in Windows 2000 always prefers a domain
controller that resides in the site of the client that is searching for a domain controller.
This is achieved by a domain controller that registers site-specific domain controller
locator DNS SRV resource records for the site in which the domain controller resides.
For more information about this mechanism, refer to the Windows 2000 Server Resource
Kit, "Distributed Systems Guide" book, Chapter 3: "Name Resolution in Active Directory."
In a case in which all the domain controllers in the same role (that is, that are hosting
the same domain or are being global catalogs) in a particular site become unavailable,
clients that are located in the same site will fail over to any other domain controller in
any other site without optimization.
More information
The following information describes the recommended configuration that you should
use to optimize the location of the domain controllers or global catalogs when all of the
domain controllers/global catalogs that are serving a particular site become unavailable.
"Section I" describes the configuration for hub-and-spoke topologies. "Section II"
describes the configuration for other topologies.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
It is preferable that if all domain controllers and global catalogs in a satellite site
become unavailable, a client that's searching for a domain controller or global catalog in
that site fails over to a domain controller or global catalog that's in a central hub and
not in another satellite site. This solution is suitable for topologies that have a single hub
site or multiple central hubs to accommodate cases in which it's irrelevant to which
central site a satellite client fails over.
To achieve this behavior, the domain controllers and global catalogs in the satellite
offices should not register generic (non-site-specific) domain controller locator DNS
records. These records are registered only by the domain controllers and global catalogs
in the central hub. When clients cannot locate the domain controllers and global
catalogs that serve their site, they try to locate any domain controllers or global catalogs
by using these generic (non-site-specific) domain controller locator DNS records.
The following records should not be registered by the domain controllers or global
catalogs in the satellite sites:
Windows 2000
1. Start Registry Editor (Regedt32.exe).
3. On the Edit menu, click Add Value, and then add the following registry value:
Set the value to the list of the enter-delimited mnemonics that are specified in the
"Reference tables" section.
Reference tables
The following tables contain mnemonics, types, and owner names of the domain
controller locator DNS records that should not be registered by the satellite domain
controllers and global catalogs to optimize the domain controller location.
ノ Expand table
LdapIpAddress A <DnsDomainName>
Dc SRV _ldap._tcp.dc._msdcs.<DnsDomainName>
ノ Expand table
Gc SRV _ldap._tcp.gc._msdcs.<DnsForestName>
GcIpAddress A gc._msdcs.<DnsForestName>
For the complete list of the domain controller locator DNS records, see the Windows
2000 Server Resource Kit, "Distributed Systems Guide" book, Chapter 3: "Name
Resolution in Active Directory." For the complete list of the domain controller locator
DNS records, refer to KB article Q267855 that is referenced in this article.
If the clients (such as servers that run Microsoft Exchange Servers) in site A fail over to
the domain controllers and global catalogs in site B, an administrator can configure
some or all the domain controllers and global catalogs in site B to register site-specific
records for site A when domain controllers and global catalogs in site A become
unavailable. To make sure that domain controllers and global catalogs from site B are
chosen by the clients in site A only if the domain controllers and global catalogs from
site A are not available, the domain controllers and global catalogs in site B that are
covering site A should register SRV records that containing lower (higher in absolute
value) priority.
7 Note
The priority setting is applied to all SRV records that are registered by a domain
controller. Therefore, the administrator should be cautious when setting a lower
priority to be used by a domain controller because the domain controller will
register a lower priority for the site-specific-records, including for its own site.
Windows 2000
1. Start Registry Editor (Regedt32.exe).
3. On the Edit menu, click Add Value, and then add the following registry value:
Set the value to the list of the space-delimited site names for which the domain
controller should register.
Windows 2000
3. On the Edit menu, click Add Value, and then add the following registry value:
Set the value to the list of the space-delimited site names for which the global
catalog should register.
Windows 2000
1. Start Registry Editor (Regedt32.exe).
3. On the Edit menu, click Add Value, and then add the following registry value:
To configure Windows Server 2003-based domain controllers, use the "Priority Set in the
domain controller locator DNS SRV Records" Net Logon service Group Policy.
Feedback
Was this page helpful? Yes No
This article discusses a problem with promoting a domain controller to a global catalog
server.
Summary
This article discusses the following topics:
The event messages that are logged in the Directory Services log for Windows
Server
The possible causes of the global catalog promotion failure
Ways to determine the cause of the global catalog promotion failure
Ways to resolve the global catalog promotion failure
Symptoms
When you try to promote a domain controller to a global catalog server, the domain
controller may not advertise itself as a global catalog. This is true if you promote the
domain controller programmatically or by clicking to select the Global Catalog option.
When this problem occurs, event messages are logged in the Directory Services log.
Additionally, the output may show that the domain controller did not pass the
advertising test and is not advertising the global catalog. This output occurs when a
domain controller logs event ID 1578 and when you run a domain controller diagnostic
check (Dcdiag.exe) on that domain controller.
7 Note
1. Click Start, click Run, type cmd, and then click OK.
2. At the command prompt, type dcdiag /v /f: logfile.txt , and then press
ENTER.
The following event messages are logged in the Directory Services log when this
problem occurs.
Event ID 1559
Event ID 1578
If you enable diagnostic logging for the Knowledge Consistency Checker (KCC) at
level 1, the following event is logged.
Event ID 1801
Cause
A global catalog must replicate inbound copies of all objects from all domain partitions
in the forest before the global catalog can advertise the global catalog role.
When a domain controller is selected to host the global catalog, the KCC on the domain
controller that is being promoted uses its discretion to build connection objects from
source domain controllers that host the required partitions. These source domain
controllers may consist of existing global catalogs in the forest or domain controllers
that host writable copies of every domain partition that resides in its forest. The
contents of each domain partition are then inbound replicated from source domain
controllers that are designated by the KCC. The contents are replicated to the newly
promoted global catalog over existing or newly created connection links.
Global catalog promotion may fail if one of the following conditions is true:
2. Metadata for a source domain controller that is designated by the KCC is located in
the configuration partition of one or more domain controllers but does not
represent a domain controller currently present in the forest.
3. The source domain controller that is selected by the KCC on the global catalog that
is being promoted is offline.
4. The source domain controller that was selected by the KCC on the global catalog
that is being promoted is inaccessible over the network. This domain controller is
inaccessible because there is no network connectivity or partial network
connectivity. The following are examples of network connectivity issues:
6. The global catalog that is being promoted cannot build a connection link from the
selected source domain controller because of the error status that is logged in one
of the events that are listed in the Summary section.
An orphaned domain will prevent the domain controller from finishing the replication.
The domain controller cannot advertise itself as a global catalog server until replication
is completed. There are several issues that could lead to an orphaned domain:
1. Active Directory was removed from all the domain controllers of a domain, but the
domain partition cross-reference object still remains.
2. Active Directory was removed from a domain controller, and the directory partition
of the domain controller was removed. The domain controller was then re-created
before replication was completed. These events caused lingering phantoms that a
cross-reference object incorrectly references.
3. The domain-naming update for the domain has not reached the domain controller
that is experiencing the problem. Or, the domain-naming update for a domain that
is newly promoted may not have reached any domain controllers outside that
domain. This issue would be a temporary problem.
Resolution
2 Warning
You should not enable a reduced occupancy level to artificially accelerate global
catalog promotion. We strongly recommend that you first resolve the Directory
Service replication issue so that the global catalog is automatically advertised.
To resolve this problem, first identify the root cause of the replication issue, and resolve
that problem. Determine whether the replication issue is caused by one of the following
conditions:
A replication delay
An orphaned domain that is located in the forest environment
An inability to build the connection link
An inability to replicate over the connection agreement
If there is an NTDS KCC event ID 1265 that is logged in the Directory Service log, use
that event to determine the cause of the replication failure for the same domain
partition. Make sure that network connectivity is good and that no required network
ports are blocked. Required network ports are, for example, TCP 135 and ephemeral
ports that are used by RPC. View the DNS records to make sure that the registered Host
and SRV records are all correctly registered. If there are incorrect records, you must clear
them out and register such records.
Remove all stale metadata for any domain controllers and domains in the forest that are
listed in the relevant event IDs. You must do this to make sure that replication is not
failing because of a non-existent domain controller or domain. For more information
about how to remove Active Directory metadata, see the following article:
After you have verified that the replication between domain controllers is working
correctly, determine whether there is an orphaned domain object. You can use the
Ntdsutil.exe utility to clear the orphaned domain object. If there is any orphaned domain
controller object for that domain, you must also delete the domain controller object. For
more information about how to remove an orphaned domain, see the following article:
For more information about how to remove orphaned domain controller objects, see
the following article:
More information
After you promote the domain controller to a global catalog server, domain partitions in
the forest will be replicated to the new global catalog server. When all partitions have
successfully replicated to the new global catalog server, event ID 1119 will be logged in
the Directory Services log on the domain controller. The event description states that
the computer is now advertising itself as a global catalog server.
To confirm that the domain controller is a global catalog server, follow these steps:
1. Click Start, click Run, type cmd, and then click OK.
2. Type nltest /dsgetdc: Domain_name /server: Server_Name , and then press ENTER.
3. Verify that the server is advertising the "GC" (global catalog) flag. For example,
when you type the command in step 2, you will receive a message that is similar to
the following if the GC flag is present:
DC: \\<ServerName>
Address: \\<IPAddress>
Dom Guid: <GUID>
7 Note
Nltest is a command-line tool that is built into Windows Server. For more
information, see Nltest.
Feedback
Was this page helpful? Yes No
Provide product feedback
DCPROMO fails with error "Access is
denied" if the user does the promotion
isn't granted the "trusted for
delegation" user right
Article • 02/19/2024
This article provides a solution to an Access is denied error that occurs with DCPROMO
(Domain Controller Promoter).
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019
Original KB number: 2002413
Symptoms
DCPROMO promotion of a Windows Server 2008 or later version member computer to a
replica domain controller (DC) fails with the following error:
Cause
The user account used to execute DCPROMO hasn't been granted the "Enable computer
and user accounts to be trusted for delegation" user right.
Resolution
1. Verify that the default domain controllers policy exists in Active Directory.
If the domain controller policy doesn't exist, evaluate whether that condition is
because of simple replication latency, an Active Directory replication failure or
whether the policy has been deleted from Active Directory. If the policy has been
deleted, contact Microsoft Support to recreate the missing policy with the default
policy GUID (Globally Unique Identifier). Don't manually recreate the policy with
the same name and settings as the default.
If the default domain controllers policy exists in Active Directory on some domain
controllers but not others, evaluate whether that inconsistency is due simple
replication latency or a replication failure. Resolve as required.
2. Verify that the server account is not protected from accidental deletion.
In the process of elevation to Domain Controller, the computer account for the
server is deleted, and re-added as a Domain Controller. If this checkbox is clicked,
this can't happen.
3. Verify that the user account does the DCPROMO operation has been granted the
"Enable computer and user accounts to be trusted for delegation" user right in the
default domain controllers policy.
Run whoami /all to verify that the "Enable computer and user accounts to be
trusted for delegation" user right exists in the users security token.
7 Note
4. Verify that the default domain controllers policy is linked to the domain controllers
OU and that all DC machine accounts stay in that OU.
5. Verify that the file system portion of default domain controllers policy exists in the
SYSVOL share of the DC being used to apply policy on the computer being
promoted or demoted.
6. The default domain policy or policy in general isn't applying to the logged on user
Console
gpresult /h result.html
More information
Table1. Logs from Promotion (example)
ノ Expand table
DCPROMO.LOG DCPROMOUI.LOG
ノ Expand table
DCPROMO.LOG DCPROMOUI.LOG
Feedback
Was this page helpful? Yes No
This article provides a solution to fix an error (Access is denied) that occurs when you
promote new Windows Server 2012 R2 domain controllers in an existing domain.
Symptoms
When you try to promote new Windows Server 2012 R2 domain controllers in an
existing domain, the operation fails with an "Access is denied" error. This issue occurs
even when the user is a member of the Domain Admins or Enterprise Admins group.
The operation failed because: Active Directory Domain Services could not configure
the computer account <hostname>$ to the remote Active Directory Domain
Controller account <fully qualified name of helper DC>. "Access is denied"
The failure occurs when adding the NTDS Settings object for the new Domain
Controller, returning the following error message:
Active Directory Domain Services could not create the NTDS Settings object for this
Active Directory Domain Controller CN=NTDS Settings,CN=TEST-
DC,CN=Servers,CN=mysite,CN=Sites,CN=Configuration,DC=domain,DC=com on the
remote AD DC DCName.ChildDomain.domain.com. Ensure the provided network
credentials have sufficient permissions.
"Access is denied."
2705DateTime[INFO]
Error - Active Directory Domain Services could not create the NTDS Settings object
for this Active Directory Domain Controller CN=NTDS Settings,CN=TEST-
DC,CN=Servers,CN=mysite,CN=Sites,CN=Configuration,DC=domain,DC=com on
the remote AD DC DCName.ChildDomain.domain.com. Ensure the provided
network credentials have sufficient permissions. (5)
Additional Data
-1073741823
c0000001
...
DateTime[INFO] NtdsInstall for ChildDomain.domain.com returned 5
DateTime [INFO] DsRolepInstallDs returned 5
DateTime [ERROR] Failed to install to Directory Service (5)
DateTime[ERROR] DsRolepFinishSysVolPropagation (Abort Promote) failed with 8001
DateTime[WARNING] Failed to abort system volume installation (8001)
DateTime[INFO] Starting service NETLOGON
DateTime[INFO] Configuring service NETLOGON to 2 returned 0
DateTime[INFO] The attempted domain controller operation has completed
Cause
This issue occurs because the Add/Remove Replica In Domain permission is missing for
the Domain Admins and Enterprise Admins groups on the domain partition of the
domain.
Resolution
To resolve this issue, follow these steps:
1. Verify that all the steps and conditions in the "Resolution" section of Knowledge
Base article 2002413 are true for your environment.
2. If domain controller promotion still fails even after you make sure that the user
also has the SeEnableDelegationPrivilege permission, check ADSIEdit.msc to verify
the user's effective permissions for the domain partition:
d. On the Effective Access tab, enter the user or group name of the user who is
performing the operation that's failing in DCPromo.
3. If the Add/Remove Replica In Domain permission is missing for the user or group,
add it by using ADSIEdit.msc:
d. On the Permissions tab, add the Add/remove replica in domain control access
permission for the desired user or group as follows:
Type: Allow
Applies to: This object only
More information
7 Note
Feedback
Was this page helpful? Yes No
This article provides help to an error (The service cannot be started) that occurs when
Active Directory Domain Services (AD DS) configuration fails.
Symptoms
In Windows Server 2012, one of the following AD DS configuration operations fails:
When the configuration fails, you receive the following error message:
Additionally, you see that the Dcpromoui.log file contains the following line of text:
Cause
This issue occurs because an administrator configured the "startup type" for the DS Role
Server service (DsRoleSvc) to disabled. You can confirm this by using the Services.msc
snap-in to examine the Startup type list on the General tab.
By default, the DS Role Server service is installed during AD DS role installation and is
set to the Manual startup type.
Resolution
To resolve this issue, make sure that the DS Role Server service is not disabled. To do
this, use Services.msc or Sc.exe to set the startup type to Manual and to let the DS Role
Server operations start and stop the service on demand. For example, run the following
command from an Administrator elevated command prompt:
Console
7 Note
More information
This behavior is by design.
The DS Role Server service is new to Windows Server 2012 and is used to install or
remove Active Directory or to clone domain controllers.
Feedback
Was this page helpful? Yes No
This article provides some information about how to add a domain controller as a node
in a failover cluster environment.
Symptoms
When you build a Windows Server 2012 failover cluster environment, you cannot add a
server that has the Active Directory Domain Services (AD DS) role as a node.
Cause
We do not support combining the AD DS role and the failover cluster feature in
Windows Server 2012.
Status
This behavior is by design.
More information
Although we do not recommend this, you can enable domain controllers as a cluster
node in Windows Server versions earlier than Windows Server 2012. However, starting
with Windows Server 2012, we no longer support this configuration.
For more information about how to use domain controllers as nodes in failover clusters,
click the following article number to view the article in the Microsoft Knowledge Base:
For more information about Microsoft support policy for Windows Server 2012 failover
clusters, click the following article number to view the article in the Microsoft Knowledge
Base:
2775067 The Microsoft support policy for Windows Server 2012 failover clusters
Feedback
Was this page helpful? Yes No
This article helps fix an issue where the option to auto-install the DNS Server role is
disabled or grayed out in the Active Directory Installation Wizard (DCPROMO) when
promoting a Windows Server 2008 or Windows Server 2008 R2 replica domain
controller.
Symptoms
When promoting a Windows Server 2008 or Windows Server 2008 R2 replica domain
controller, the option to auto-install the DNS Server role is disabled or grayed out in the
Active Directory Installation Wizard (DCPROMO).
DNS cannot be installed on this domain controller because this domain does not
host DNS.
Cause
1. A code defect prevents the DNS Server checkbox from being enabled when
promoting replica domain controllers into existing domains with single-label DNS
names like "contoso" instead of best-practice fully qualified DNS name like
" contoso.com " or " corp.contoso.com ". This condition exists even when Microsoft
DNS is installed on a domain controller and hosts Active Directory-integrated
forward lookup zones for the target domain.
For more information about single label domains, visit the following Microsoft web
site:
OR
2. DCPromo checks to see if the DNS zone for the target Active Directory forest is
hosted in Active Directory. If the DNS zone for the target domain isn't hosted on
an existing domain controller in the target forest, DCPROMO doesn't allow the
user to install DNS during the replica promotion.
Resolution
For the first root cause, continue the promotion and install the DNS Server role after it's
promoted.
For the second root cause, the DNS client and server configuration on the replica
domain controller being promoted was sufficient to discover a helper domain controller
in the target domain but DCPROMO has determined that the DNS zone for the domain
wasn't Active Directory integrated.
Determine which DNS servers are going to host the zone for your Active Directory
domain and what replication scopes those zones will use (Microsoft DNS versus third-
party DNS, forest-wide application partition, domain-wide application partition, file-
based primary, and so on.)
Don't let the inability to auto-install the DNS Server role during DCPROMO block the
promotion of Windows Server 2008 replica domain controllers in the domain. Server
Manager can be used to install the Microsoft DNS Server role on existing domain
controllers, as well as computers functioning as member or workgroup computers. DNS
zones and their records can be replicated or copied between DNS servers.
1. If the DNS zones exist on DNS servers outside the domain, consider moving the
zones to an existing domain controller in the domain that hosts the DNS Server
role.
2. If zone data needs to be moved, configure the Microsoft DNS server to host a
secondary copy of the zone, then convert that zone to be a file-based primary,
then transition the zone to be Active Directory integrated as required. You can
ignore this step if you have no interest in saving the DNS zone data.
3. Configure the new replica domain controller being promoted to point exclusively
to DNS servers hosting Active Directory integrated copies of the zone.
4. Use the following command to force Windows 2000, Windows XP, Windows Server
2003, Windows Vista, and Windows Server 2008 computers to dynamically register
Host A or AAAA records:
Console
ipconfig /registerdns
5. Use the following command to force Windows 2000, Windows Server 2003, and
Windows Server 2008 domain controllers to dynamically register SRV records
Console
Feedback
Was this page helpful? Yes No
This article describes how to install and configure a new Active Directory installation in a
laboratory environment that includes Windows Server 2003 and Active Directory.
7 Note
You will need two networked servers that are running Windows Server 2003 for this
purpose in a laboratory environment.
1. Insert the Windows Server 2003 CD-ROM into your computer's CD-ROM or DVD-
ROM drive.
3. Click OK to start the Active Directory Installation Wizard, and then click Next.
4. Click Domain controller for a new domain, and then click Next.
6. Specify the full DNS name for the new domain. Note that because this procedure is
for a laboratory environment and you are not integrating this environment into
your existing DNS infrastructure, you can use something generic, such as
mycompany.local, for this setting. Click Next.
7. Accept the default domain NetBIOS name (this is "mycompany" if you used the
suggestion in step 6). Click Next.
8. Set the database and log file location to the default setting of the c:\winnt\ntds
folder, and then click Next.
9. Set the Sysvol folder location to the default setting of the c:\winnt\sysvol folder,
and then click Next.
10. Click Install and configure the DNS server on this computer, and then click Next.
11. Click Permissions compatible only with Windows 2000 or Windows Server 2003
servers or operating systems, and then click Next.
12. Because this is a laboratory environment, leave the password for the Directory
Services Restore Mode Administrator blank. Note that in a full production
environment, this password is set by using a secure password format. Click Next.
13. Review and confirm the options that you selected, and then click Next.
14. The installation of Active Directory proceeds. Note that this operation may take
several minutes.
15. When you are prompted, restart the computer. After the computer restarts,
confirm that the Domain Name System (DNS) service location records for the new
domain controller have been created. To confirm that the DNS service location
records have been created, follow these steps:
a. Click Start, point to Administrative Tools, and then click DNS to start the DNS
Administrator Console.
b. Expand the server name, expand Forward Lookup Zones, and then expand the
domain.
c. Verify that the _msdcs, _sites, _tcp, and _udp folders are present. These folders
and the service location records they contain are critical to Active Directory and
Windows Server 2003 operations.
a. Click Start, point to Administrative Tools, and then click Active Directory Users
and Computers to start the Active Directory Users and Computers console.
b. Click the domain name that you created, and then expand the contents.
d. Type the first name, last name, and user logon name of the new user, and then
click Next.
e. Type a new password, confirm the password, and then click to select one of the
following check boxes:
Users must change password at next logon (recommended for most users)
User cannot change password
Password never expires
Account is disabled
Click Next.
f. Review the information that you provided, and if everything is correct, click
Finish.
2. After you create the new user, give this user account membership in a group that
permits that user to perform administrative tasks. Because this is a laboratory
environment that you are in control of, you can give this user account full
administrative access by making it a member of the Schema, Enterprise, and
Domain administrators groups. To add the account to the Schema, Enterprise, and
Domain administrators groups, follow these steps:
a. On the Active Directory Users and Computers console, right-click the new
account that you created, and then click Properties.
b. Click the Member Of tab, and then click Add.
c. In the Select Groups dialog box, specify a group, and then click OK to add the
groups that you want to the list.
d. Repeat the selection process for each group in which the user needs account
membership.
e. Click OK to finish.
3. The final step in this process is to add a member server to the domain. This
process also applies to workstations. To add a computer to the domain, follow
these steps:
e. When you are prompted, type the user name and password of the account that
you previously created, and then click OK.
f. Click OK to return to the Computer Name tab, and then click OK to finish.
For more information about configuring DNS on Windows Server 2003, see How to
configure DNS for Internet access in Windows Server 2003 .
Feedback
Was this page helpful? Yes No
This article solves an issue where the demotion of a Windows Server computer that
hosts the Active Directory Domain Services (AD DS) or domain controller server role
fails.
Symptoms
The graceful demotion of a Windows Server computer hosting the AD DS or domain
controller server role fails. You see the following on-screen error:
The relevant part of the DCPROMO.LOG file contains the following text:
Output
Output
Where distinguishing elements in the LDAP output taken from the sample domain
CONTOSO.COM include:
1. The fSMORoleOwner attribute contains the string 0ADEL indicating that the role
owning DC's NTDS Settings object has been deleted.
3. The name of the default DNS application partition for which the fSMORoleOwner
attribute is assigned to a DC with a deleted NTDS Settings object. In this case, the
error referenced the DomainDNSZones. This same error may also occur for the
ForestDNSZones application partition.
Cause
The error occurs when the domain controller that's being demoted can't outbound
replicate changes to the DC that owns the infrastructure FSMO or operational role for
the partition referenced in the DCPROMO [log] error.
Specifically, the demotion attempt is aborted to safeguard against data loss. In the case
of DNS application partitions, the demotion is blocked to ensure that the following data
is replicated:
DN paths for partitions where the error in the Symptoms section may occur include:
CN=Infrastructures,DC=DomainDNSZones....
CN=Infrastructures,DC=ForestDNSZones....
Resolution
7 Note
1. Use ADSIEDIT.MSC to assign the DN path for the fsMORoleOwner attribute to a live
DC that was a direct replication partner of the original FSMO role owner. Then wait
for that change to inbound-replicate to the DC that's being demoted.
2. Run the script in the Resolution section of KB949257 for the partition in
question.
3. If the DC that's being demoted can't inbound-replicate changes for the directory
partition in question, run the DCPROMO /FORCEREMOVAL command to forcefully
demote the domain controller.
More information
DCPromo attempts to outbound-replicate changes on every locally held NC so that
unique changes aren't lost. If data is stored in DNS zones, DCPROMO attempts to
outbound replicate the contents of DNS zones to the infrastructure master for the DNS
partition in question.
Related problem:
KB949257 describes a problem where the ADPREP /RODCPREP command fails when
infrastructure master for one or more DNS application partitions is assigned to a deleted
NTDSA.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where domain controller promotion stops
responding when short credentials are used in an environment that has NetBIOS over
TCPIP disabled.
Symptoms
When you use Active Directory Domain Services Configuration Wizard to promote a
computer to domain controller in Windows Server 2012 R2, the wizard stops
responding. When the issue occurs, Active Directory Domain Services Configuration
Wizard indicates the promotion is in process and displays the following text:
Windows Server 2012 R2 domain controllers have a default for the security setting
named "Allow cryptography algorithms compatible with Windows NT 4.0" that
prevents weaker cryptography algorithms when establishing security channel
sessions.
When the issue occurs, the Dcpromo.log file correctly indicates that the promotion
operation has stopped:
Error value:
Could not find the domain controller for this domain. (1908)
"Short" credential names are used in the Credential UI or in the domain controller
promotion answer file.
The Dcpromo.log earlier in this section indicates an
ERROR_DOMAIN_CONTROLLER_NOT_FOUND error is returned from the DRS bind
call when the promotion process is setting up to replicate the first naming context.
If the issue occurs when you promote a new domain controller in a new child
domain. The following issues also occurs:
Cause
When you run Active Directory Domain Services Configuration Wizard in a NetBIOS-
less\WINS-less environment, it introduces some DC-locator limitations to be aware of
short domain names. This is especially true on a non-domain-joined computer. DC-
locator tries to map short domain names to fully qualified domain names (FQDNs) by
using the trusted-domain-list, which involves DNS to be used most of the time. If DNS
cannot be used, locator has to use WINS\NetBIOS. However, WINS\NetBIOS is not
available when NetBIOS over TCP/IP is disabled. This issue can be partly worked around
by the DNS-suffix feature that is added to DC-locator in Windows Server 2012 R2 and
Windows 8.1 but that is not always a 100% reliable solution.
Resolution
To resolve the issue, follow these steps:
7 Note
This step closes the Active Directory Domain Services Configuration Wizard.
When the issue occurs, the cancel button in the UI does not work.
Additionally, ending the Active Directory Domain Services Configuration
Wizard in Task Manager also does not work.
2. When you promote the computer as a domain controller again, use one of the
following workarounds:
Specific "long" credentials, for example, <domain>\administrator, in the
promotion wizard or the promotion answer files.
On Windows 8.1 and Windows Server 2012 R2 computers, configure the DNS
search suffixes, so that when the DNS search suffixes are concatenated with
the provided NetBIOS domain name, they can be resolved to the fully
qualified DNS name of the Active Directory domain that hosts the user
account being used to perform the authenticated operation.
7 Note
This assumes that the NetBIOS name that is specified in credential "UI"
matches the left-most part of the target accounts DNS domain name.
Feedback
Was this page helpful? Yes No
This article contains information about the deployment and operation of Active
Directory (AD) domains that are configured by using single-label DNS names.
Applies to: Windows Server 2008 R2 Service Pack 1, Windows Server 2012 R2, Windows
Server 2016, Windows Server 2019, Windows 10, version 1809
Original KB number: 300684
Summary
The wish to remove the single label domain configuration is a frequent reason to
rename a domain. The application compatibility information in this article applies to all
scenarios in which you might consider renaming a domain.
For the following reasons, the best practice is to create new Active Directory domains
that have fully qualified DNS names:
Client computers and domain controllers that are joined to single-label domains
require additional configuration to dynamically register DNS records in single-label
DNS zones.
Transitioning from a single-label DNS domain name to a fully qualified DNS name
is non-trivial and consists of two options. Either migrate users, computers,
groups, and other states to a new forest. Or, do a domain rename of the existing
domain. Some server-based applications are incompatible with the domain rename
feature that is supported in Windows Server 2003 and newer domain controllers.
These incompatibilities either block the domain rename feature or make the use of
the domain rename feature more difficult when you try to rename a single-label
DNS name to a fully qualified domain name.
Examples of applications that are incompatible with domain renaming include, but
aren't limited to, the following products:
More information
Best-practice Active Directory domain names consist of one or more subdomains that
are combined with a top-level domain that is separated by a dot character ("."). The
following ones are some examples:
contoso.com
corp.contoso.com
The top-level domain occupies the rightmost label in a domain name. Common top-
level domains include the following:
.com
.net
.org
Two-letter country code top-level domains (ccTLD) such as .nz
Active Directory domain names should consist of two or more labels for the current and
the future operating system and for application experience and reliability.
Invalid Top Level domain queries reported by the ICANN Security and Stability Advisory
Committee can be found at Invalid Top Level Domain Queries at the Root Level of the
Domain Name System .
After you configure Microsoft Windows for a single label domain name, all servers
that have the domain controller role may be unable to register DNS records. The
System log of the domain controller may consistently log NETLOGON 5781
warnings that resemble the following example:
7 Note
Status code 0000232a maps to the following error code:
DNS_ERROR_RCODE_SERVER_FAILURE
The following additional status codes and error codes may appear in log files such
as Netdiag.log:
Windows-based computers that are configured for DNS dynamic updates won't
register in a single-label domain. Warning events that resemble the following
examples are recorded in the System log of the computer:
Also without modification, an Active Directory domain member in a forest that contains
no domains that have single-label DNS names doesn't use the DNS Server service to
locate domain controllers in domains that have single-label DNS names that are in other
forests. Client access to the domains that have single-label DNS names fails if NetBIOS
name resolution isn't configured correctly.
) Important
This section, method, or task contains steps that tell you how to modify the
registry. However, serious problems might occur if you modify the registry
incorrectly. Therefore, make sure that you follow these steps carefully. For
added protection, back up the registry before you modify it. Then, you can
restore the registry if a problem occurs. For more information, see How to
back up and restore the registry in Windows .
1. Select Start, select Run, type regedit, and then select OK.
) Important
This section, method, or task contains steps that tell you how to modify the
registry. However, serious problems might occur if you modify the registry
incorrectly. Therefore, make sure that you follow these steps carefully. For
added protection, back up the registry before you modify it. Then, you can
restore the registry if a problem occurs. For more information, see How to
back up and restore the registry in Windows .
Active Directory domain members and domain controllers that are in a domain
that has a single-label DNS name typically must dynamically register DNS records
in a single-label DNS zone that matches the DNS name of that domain. If an Active
Directory forest root domain has a single-label DNS name, all domain controllers
in that forest typically must dynamically register DNS records in a single-label DNS
zone that matches the DNS name of the forest root.
1. Select Start, select Run, type regedit, and then select OK.
For the changes to take effect, restart the computers where you changed the
registry entries.
7 Note
For Windows Server 2003 and later versions, the
UpdateTopLevelDomainZones entry has moved to the following registry
subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient
ノ Expand table
7 Note
These policies are supported only on Windows Server 2003-based computers and
on Windows XP-based computers.
To enable these policies, follow these steps on the root domain container:
1. Select Start, select Run, type gpedit.msc, and then select OK.
2. Under Local Computer Policy, expand Computer Configuration.
3. Expand Administrative Templates.
4. Enable the Update Top Level Domain Zones policy. To do it, follow these steps:
a. Expand Network.
b. Select DNS Client.
c. In the details pane, double-click Update Top Level Domain Zones.
d. Select Enabled.
e. Select Apply, and then select OK.
5. Enable the Location of the DCs hosting a domain with single label DNS name
policy. To do this, follow these steps:
a. Expand System.
b. Expand Net Logon.
c. Select DC Locator DNS Records.
d. In the details pane, double-click Location of the DCs hosting a domain with
single label DNS name.
e. Select Enabled.
f. Select Apply, and then select OK.
6. Exit Group Policy.
On Windows Server 2003-based and later versions DNS servers, make sure that root
servers aren't created unintentionally.
On Windows 2000-based DNS servers, you may have to delete the root zone "." to have
the DNS records correctly declared. The root zone is automatically created when the
DNS server service is installed because the DNS server service can't reach the root hints.
This issue was corrected in later versions of Windows.
Root servers may be created by the DCpromo Wizard. If the "." zone exists, a root server
has been created. For name resolution to work correctly, you may have to remove this
zone.
The following are the entry values for UpdateTopLevelDomainZones : - Enabled (0x1).
A 0x1 setting means that computers may try to update the TopLevelDomain zones.
That is, if the UpdateTopLevelDomainZones setting is enabled, computers to which
this policy is applied send dynamic updates to any zone that is authoritative for the
resource records that the computer must update, except for the root zone. -
Disabled (0x0). A 0x0 setting means that computers aren't permitted to try to
update the TopLevelDomain zones. That is, if this setting is disabled, computers to
which this policy is applied don't send dynamic updates to the root zone or to the
top-level domain zones that are authoritative for the resource records that the
computer must update. If this setting isn't configured, the policy isn't applied to
any computers, and computers use their local configuration.
The following are the entry values for RegisterReverseLookup : - 0x2. Register only if
"A" record registration succeeds. Computers try to implement PTR resource
records registration only if they successfully registered the corresponding "A"
resource records. - 0x1. Register. Computers try to implement PTR resource
records registration whatever the success of the "A" records registration. - 0x0.
Don't register. Computers never try to implement PTR resource records
registration.
References
DNS namespace planning
Unable to select DNS Server role when adding a domain controller into an existing
Active Directory domain
Active Directory Migration Tool (ADMT) Guide: Migrating and Restructuring Active
Directory Domains
Feedback
Was this page helpful? Yes No
This article provides resolutions to fix the issue where the domain controller rename
doesn't rename all AD DFSR SYSVOL objects.
Symptoms
The SYSVOL msDFSR-Member container used by DFS Replication (DFSR) isn't updated
when a domain controller is renamed. For example, when renaming a DC named
"OldName" to a DC named "NewName", the following object doesn't get renamed:
File replication will continue to work correctly and normally, and sysvol folder won't be
affected for group policy processing or scripts.
However, the CN won't be updated or removed during later demotions or via Metadata
Cleanup. This will leave orphaned DFSR topology objects in the Active Directory domain
indefinitely. In addition, if a new domain controller - with the previously renamed DC's
old name - were to be promoted in the domain, it would take over the old object and
temporarily stop replication on the renamed domain controller until an administrator
manually recreated a new object for the renamed domain controller using
ADSIEDIT.MSC.
Cause
A code defect in the domain controller rename process.
Resolution
Workaround 1:
Before running DCPROMO.EXE, rename computers to the final intended name using the
System control panel applet or NETDOM.EXE.
Workaround 2:
When renaming an existing DC, first demote it gracefully with DCPROMO.EXE, rename it,
then promote it back to being a DC.
Workaround 3:
Use ADSIEDIT.MSC to correct the AD objects manually, using the following steps:
2. Start ADSIEDIT.MSC.
5. Rename the msDFSR-Member CN object that has the old computer name and give
it the new computer name.
More information
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where domain controllers don't demote
when you use the Active Directory Installation Wizard (Dcpromo.exe) to force demotion.
Symptoms
Microsoft Windows 2000 or Microsoft Windows Server 2003 domain controllers may not
gracefully demote by using the Active Directory Installation Wizard (Dcpromo.exe).
Cause
This behavior may occur if a required dependency or operation fails. These include
network connectivity, name resolution, authentication, Active Directory directory service
replication, or the location of a critical object in Active Directory.
Resolution
To resolve this behavior, determine what is preventing the graceful demotion of the
Windows 2000 or the Windows Server 2003 domain controller, and then try to demote
the domain controller by using the Active Directory Installation Wizard again.
7 Note
For Windows Server 2008, the Directory Services Restore Mode (DSRM) is
unchanged from Windows Server 2003 with one exception. In Windows Server
2008, you can run the dcpromo/forceremoval command to forcibly remove AD DS
from a domain controller that is started in DSRM, just as you can in the AD DS
stopped state. A domain controller must still be started in DSRM to restore system
state data from a backup. For more information about how to do this, see
Restartable AD DS Step-by-Step Guide.
Workaround
If you cannot resolve the behavior, you can use the following workarounds to perform a
forced demotion of the domain controller to preserve the installation of the operating
system and of any applications on it.
2 Warning
Before you use either of the following workarounds, make sure that the you can
successfully start in Directory Services Restore mode. Otherwise, you will not be
able to log on after you forcefully demote the computer. If you do not remember
the Directory Services Restore mode password, you can reset the password by
using the Setpwd.exe utility that is located in the Winnt\System32 folder. In
Windows Server 2003, the functionality of the Setpwd.exe utility has been
integrated into the Set DSRM Password command of the NTDSUTIL tool.
2. Click Start, click Run, and then type the command: dcpromo /forceremoval .
3. Click OK.
4. At the Welcome to the Active Directory Installation Wizard page, click Next.
5. If the computer that you are removing is a global catalog server, click OK in the
message window.
7 Note
Promote additional global catalogs in the forest or in the site if the domain
controller that you are demoting is a global catalog server, as needed.
6. At the Remove Active Directory page, make sure that the This server is the last
domain controller in the domain check box is cleared, and then click Next.
7. At the Network Credentials page, type the name, password, and domain name for
a user account with enterprise administrator credentials in the forest, and then
click Next.
8. In Administrator Password, type the password and confirmed password that you
want to assign to the Administrator account of the local SAM database, and then
click Next.
10. Perform a metadata cleanup for the demoted domain controller on a surviving
domain controller in the forest.
If you removed a domain from the forest by using the remove selected domain
command in Ntdsutil, verify that all the domain controllers and the global catalog
servers in the forest have removed all the objects and the references to the domain that
you just removed before you promote a new domain into the same forest with the same
domain name. Tools such as Replmon.exe or Repadmin.exe from Windows 2000 Support
Tools may help you determine whether end-to-end replication has occurred. Windows
2000 SP3 and earlier global catalog servers are noticeably slower to remove objects and
naming contexts than Windows Server 2003 is.
2. Click OK.
3. At the Welcome to the Active Directory Installation Wizard page, click Next.
5. In Administrator Password, type the password and confirmed password that you
want to assign to the Administrator account of the local SAM database, and then
click Next.
If resource access control entries (ACEs) on the computer that you removed Active
Directory from were based on domain local groups, these permissions may have to be
reconfigured, because these groups will not be available to member or stand-alone
servers. If you plan to install Active Directory on the computer to make it a domain
controller in the original domain, you do not have to configure access control lists
(ACLs) any more. If you prefer to leave the computer as a member or stand-alone server,
any permissions that are based on domain local groups must be translated or replaced.
hosts an operations master role, is a Domain Name System (DNS) server, or is a global
catalog server. For each of these roles, the administrator receives a popup warning that
advises the administrator to take appropriate action.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
) Important
Follow these steps only as a last resort if the domain controller cannot start in
normal mode.
To remove Active Directory from a domain controller, follow these steps:
1. Restart the computer, and then press F8 to display the Windows 2000 Advanced
Options menu.
2. Choose Directory Services Restore Mode, press ENTER, and then press ENTER
again to continue restarting.
3. Modify the ProductType entry in the registry. To do this, follow these steps:
a. Click Start, click Run, type regedit, and then click OK.
d. Type ServerNT in the Value data box, and then click OK.
7 Note
If this value is not set correctly or is misspelled, you may receive the
following error message:System Process - License Violation: The system has
detected tampering with your registered product type. This is a violation of
your software license. Tampering with product type is not permitted.
5. Log on with the administrator account and password that is used for Directory
Service Repair mode.
The computer will behave as a member server. However, there are still some
remaining files and registry entries on the computer that are associated with the
domain controller.
If there is an entry for Src Root Domain Srv, right-click the value and then click
Delete. This value must be deleted so that the domain controller sees itself as the
only domain controller in the domain after promotion.
) Important
The above step is critical. Without it the re-promotion into the temporary AD
forest will not complete and you will not be able to log on to the domain
controller.
7. Remove the remaining files and registry entries. To do this, follow these steps:
b. Install Active Directory to make the computer a domain controller for a new,
temporary domain, such as psstemp.deleteme.
7 Note
Make sure that you make the computer a domain controller in a different
forest.
c. After you install Active Directory, start the Active Directory Installation Wizard
again, and then remove Active Directory from the domain controller.
8. After you remove Active Directory from a domain controller, remove metadata that
is left in the domain. For more information about how to remove this metadata,
see How to remove data in Active Directory after an unsuccessful domain
controller demotion.
Status
Microsoft has tested and supports the forced demotion of domain controllers that are
running Windows 2000 or Windows Server 2003.
More information
The Active Directory Installation Wizard creates Active Directory domain controllers on
Windows 2000-based and Windows Server 2003-based computers. Operations that are
performed by the Active Directory Installation Wizard include the installation of new
services, changes to the startup values of existing services, and the transition to Active
Directory as a security and authentication realm.
With forced demotion, a domain administrator can forcibly remove Active Directory and
roll back locally held system changes without having to contact or replicate any locally
held changes to another domain controller in the forest.
Because forced demotion causes the loss of any locally held changes, use it only as a
last resort in production or test domains. You can forcibly demote domain controllers
when connectivity, name resolution, authentication, or replication engine dependencies
cannot be resolved so that graceful demotion can be performed. Valid scenarios for
forced demotions include the following:
There are no domain controllers currently available in the parent domain when you
try to demote the last domain controller in an immediate child domain.
The Active Directory Installation Wizard cannot complete because there is a name
resolution, authentication, replication engine, or Active Directory object
dependency that you cannot resolve after you perform detailed troubleshooting.
) Important
Do not recover such domain controllers unless they are the only chance of
recovery for a particular domain.
Time does not permit more detailed troubleshooting because you must
immediately bring into service the domain controller. Forced demotions may be
useful in lab and classroom environments where you can remove domain
controllers out of existing domains, yet you do not have to demote each domain
controller serially.
If you force the demotion of a domain controller, you will lose any unique changes that
reside in the Active Directory of the domain controller that you are forcibly demoting.
This includes the addition, deletion, or modification of users, computers, groups, trust
relationships, and Group Policy or Active Directory configuration that did not replicate
off before you ran the dcpromo /forceremoval command. Additionally, you will lose
changes to any one of the attributes on these objects, such as passwords for users,
computers, and trust relationships and group membership.
However, if you force the demotion of a domain controller, you return the operating
system to a state that is the same as the successful demotion of the last domain
controller in a domain (service start values, installed services, use of a registry based
SAM for the account database, computer is a member of a workgroup). Programs that
are installed on the demoted domain controller remain installed.
The System event log identifies forcibly demoted Windows 2000 domain controllers and
instances of the dcpromo /forceremoval operation by event ID 29234. For example: The
System event log identifies forcibly demoted Windows Server 2003 domain controllers
by event ID 29239. For example: After you use the dcpromo /forceremoval command,
metadata for the demoted computer is not deleted on surviving domain controllers. For
more information, see Clean up Active Directory Domain Controller server metadata.
The following are items that you must address, if applicable, after forcibly demoting a
domain controller:
Feedback
Was this page helpful? Yes No
Provide product feedback
DCDIAG.EXE /E or /A or /C expected
errors
Article • 02/19/2024
This article helps fix errors that occur when you run DCDIAG.EXE /E or /A or /C
commands.
Symptoms
Consider the following scenario:
When running DCDIAG.EXE /E (or /A or /C) on Windows Server 2003 (included with the
Support Tools out-of-band install):
Cause
All of these behaviors are expected.
The Windows Server 2008/200R2 versions of DCDIAG are designed to test RPCSS
for the Windows Server 2008 shared process setting -not the previous isolated
process setting used in Windows Server 2003 and older operating systems. The
tool doesn't distinguish between OSs for this service.
The Windows Server 2008/200R2 versions of DCDIAG don't correctly test trust
health
Windows Server 2008/2008 R2 doesn't allow remote connectivity to the event log
based on default firewall rules.
The Windows Server 2003 version of DCDIAG doesn't report back an error if it can't
connect to the event log; it only reports if it connects and finds errors.
The Windows Server 2003 version of DCDIAG doesn't test the RPCSS service
configuration.
Resolution
There are multiple workarounds to these issues:
To stop the event log-related errors, enable the built-in incoming firewall rules on
DCs so that the event logs can be accessed remotely:
This can be done through the "Windows Firewall with Advanced Security"
snap-in (WF.MSC), using the firewall group policy (Computer Configuration\
Policies\ Windows Settings\ Security Settings\ Windows Firewall with
Advanced Security), or by using NETSH.EXE ADVFIREWALL .
To stop the RPCSS service error, you can opt out of the test with /SKIP:SERVICES .
There are caveats to this, see More Information. It's better to ignore this specific
error altogether when it's returned from Win2003 DCs.
It's expected and normal for this service's behavior type to be 0x10 (isolated) on
Windows Server 2003 and 0x20 (shared) on Windows Server 2008 and later. Don't
change it based on what DCDIAG says unless you're running the version of
DCDIAG that goes with that OS. Between Windows Server 2003 and Windows
Server 2008, the behavior changed for the RPC service, but there was nothing yet
to share in that svchost.exe process. In Windows Server 2008 R2, the new
RPCEptMapper service was added to that shared svchost process. You can see who
would launch in that same process by looking for this value in the service registry
keys:
%systemroot%\system32\svchost.exe -k RPCSS.
Do not change the service type on Windows Server 2003 to stop the error. There
may be unexpected issues long-term as this isn't a tested configuration. These
issues would be difficult to identify or trace back to this root cause. Long-term
solution to the RPCSS service issue: replace the remaining Windows Server 2003
servers with a later operating system.
To stop the OutboundSecureChannels errors, use /skip:outboundsecurechannels .
The tests aren't valid and can be instead tested with NETDOM.EXE and NLTEST.EXE .
More information
The Windows Server 2008/2008 R2 DCDIAG Services test checks for the following
services to be running, configured with default start options, and configured with
default process types:
7 Note
This article provides a solution to an issue where demoting a domain controller by using
the Active Directory Installation wizard (Dcpromo.exe) fails.
Symptoms
When you demote a Windows domain controller by using the Dcpromo.exe, you may
receive the following error message:
This domain controller holds the last replica of the following application directory
partitions:
DC=MSTAPI,DC= yourdomain,DC=com
Cause
This behavior can occur if you installed the domain controller by using the Configure
Your Server wizard. When you use this wizard, it automatically creates a program
partition or a non-domain naming context called DC=MSTAPI,DC=
yourdomain,DC=com.
Resolution
If you created the partition by using the Configure Your Server wizard, and you used
the default name of Mstapi, if this name is not in use, use the Tapicfg.exe tool to remove
this name. To do so, run the following command, where <your_domain.com> is your
domain DNS name:
Console
If the partition was created manually, or if it was created by using another program, you
can remove it by using the Ntdsutil utility:
1. Open a command prompt, and then type ntdsutil.
After the binding message appears, you will have a successful connection to your
server.
6. In the Domain Management window, type list . A list of the naming contexts on
this server appears.
8. At the Ntdsutil prompt, type Q , and then press ENTER until you are returned to the
CMD command prompt. You can now successfully demote this domain controller.
You may have to restart this domain controller before you start the Active
Directory Installation wizard again.
More information
Windows supports program naming contexts, also referred to as non-domain naming
contexts. This feature allows the Microsoft Active Directory directory service to host
dynamic data without impacting network performance by enabling you to control the
scope of replication and placement of replicas. With Active Directory services, you can
create a new type of naming context or partition, referred to as the application partition.
This naming context can contain a hierarchy of any type of object except security
principals (users, groups, and computers), and it can be configured to replicate to any
set of domain controllers in the forest that are not necessarily all in the same domain.
Feedback
Was this page helpful? Yes No
Certain operations are best done on a single domain controller. This article describes the
placement of Active Directory Flexible Single-Master Operation (FSMO) roles in the
domain and forest for these operations.
More information
Certain domain and enterprise-wide operations aren't well suited to multi-master
updates. In these situations, the operations must be done on a single domain controller
in the domain or in the forest. Having a single-master owner defines a well-known
target for critical operations, and prevents possible conflicts or latency created by multi-
master updates. It means that the relevant FSMO role owner must be online,
discoverable, and available on the network by computers that must perform FSMO-
dependent operations.
When the Active Directory Installation Wizard (Dcpromo.exe) creates the first domain in
a new forest, the wizard adds five FSMO roles. A forest with one domain has five roles.
The Active Directory Installation Wizard adds three domain-wide roles on the first
domain controller in each additional domain in the forest. Additionally, infrastructure
master roles exist for each application partition. It includes the default domain and the
forest-wide DNS application partitions that are created on Windows Server 2003 and
later domain controllers. The operations masters and their scope are shown in the
following table.
ノ Expand table
Domain Enterprise - Used to add and to remove domains and application partitions
Naming to and from the forest.
Master - Must be online when domains and application partitions in a
forest are added or removed.
Primary Domain - Receives password updates when passwords are changed for the
Domain computer and for user accounts that are on replica domain
Controller controllers.
- Consulted by replica domain controllers that service
authentication requests that have mismatched passwords.
- Default target domain controller for Group Policy updates.
- Target domain controller for legacy applications that perform
writable operations and for some admin tools.
- Must be online and accessible 24 hours a day, seven days a
week.
RID Domain - Allocates active and standby RID pools to replica domain
controllers in the same domain.
- Must be online in the following situations:
Infrastructure Domain - Updates cross-domain references and phantoms from the global
Master catalog. For more information, see Phantoms, tombstones, and
Application the infrastructure master
partition - A separate infrastructure master is created for each application
partition, including the default forest-wide and domain-wide
application partitions created by Windows Server 2003 and later
domain controllers.
CN=Infrastructure,DC=DomainDnsZones,DC=<forest root
domain>,DC=<top level domain>
CN=Infrastructure,DC=ForestDnsZones,DC=<forest root
domain>,DC=<top level domain>
It's easier to keep track of FSMO roles if you host them on fewer computers.
Place roles on domain controllers that can be accessed by the computers, which
need access to a given role, especially on networks that aren't fully routed. For
example, to obtain a current or standby RID pool, or perform pass-through
authentication, all DCs need network access to the RID and PDC role holders in
their respective domains.
You should transfer (not seize) the role to the new domain controller under the
following conditions:
a role must be moved to a different domain controller
the current role holder is online and available
FSMO roles should only be seized if the current role holder isn't available. For
more information, see Managing Operations Master Roles.
FSMO roles assigned to domain controllers that are offline or in an error state only
have to be transferred or seized if role-dependent operations are being done. If
the role holder can be made operational before the role is needed, you may delay
seizing the role. If role availability is critical, transfer or seize the role as required.
The PDC role in each domain should always be online.
Select a direct intrasite replication partner for existing role holders to act as a
standby role holder. If the primary owner goes offline or fails, transfer or seize the
role to the designated standby FSMO domain controller as required.
Place the PDC on your best hardware in a reliable hub site that contains replica
domain controllers in the same Active Directory site and domain.
In large or busy environments, the PDC frequently has the highest CPU usage,
because it handles pass-through authentication and password updates. If high CPU
usage becomes a problem, identify the source. The source includes applications or
computers that may be performing too many operations (transitively) targeting the
PDC. Techniques to reduce CPU include:
Adding more or faster CPUs
Adding more replicas
Adding more memory to cache Active Directory objects
Removing the global catalog to avoid global catalog lookups
Reducing the number of incoming and outgoing replication partners
Increasing the replication schedule
Reducing authentication visibility by using LDAPSRVWEIGHT and
LDAPPRIORITY, and by using the Randomize1CList feature.
All domain controllers in a particular domain, and computers that run applications
and admin tools that target the PDC, must have network connectivity to the
domain PDC.
Place the RID master on the domain PDC in the same domain.
RID master overhead is light, especially in mature domains that have already
created the bulk of their users, computers, and groups. The domain PDC typically
receives the most attention from administrators. Co-locating this role on the PDC
helps ensure reliable availability. Make sure that existing domain controllers and
newly promoted domain controllers have network connectivity to obtain active
and standby RID pools from the RID master, especially the domain controllers
promoted in remote or staging sites.
Multidomain forest:
References
For more information, see How to use Windows Server cluster nodes as domain
controllers .
The NTDS Replication event 1586 occurs in one of the following situations:
the PDC FSMO role for a particular domain has been seized.
the PDC FSMO role for a particular domain has been transferred to a new domain
controller that wasn't a direct replication partner of the previous role holder.
Feedback
Was this page helpful? Yes No
This article describes group policy application rules for domain controllers.
Summary
Domain controllers pull some security settings only from group policy objects linked to
the root of the domain. Because domain controllers share the same account database
for the domain, certain security settings must be set uniformly on all domain controllers.
This ensures the members of the domain have a consistent experience regardless of
which domain controller they use to log on. Windows 2000 accomplishes this task by
allowing only certain setting in the group policy to be applied to domain controllers at
the domain level. This group policy behavior is different for member server and
workstations.
The following settings are applied to domain controllers in Windows 2000 only when
the group policy is linked to the Domain container:
The following settings are applied to Windows Server 2003-based domain controllers
only when the group policy is linked to the domain container. (The settings are located
in Computer Configuration/Windows Settings/Security Settings/Local
Policies/Security Options.)
More information
These settings from group policy objects aren't applied on the Domain Controllers
organizational unit because a domain controller can be moved out of the Domain
Controllers organizational unit and into a different organizational unit. Using the
Domain container allows these setting to be applied regardless of in which
organizational unit the domain container resides.
The domain controller gathers the list of group policy objects by searching the
parent containers of the domain controller's Computer object.
The domain controller applies the settings listed earlier only if the group policy
object is linked to the Domain container.
If there are multiple group policy objects linked to the Domain container,
application of the group policy objects starts with the group policy object at the
bottom of the list and ends with the group policy object at the top. This results in
the group policy object at the top taking precedence over the others.
Feedback
Was this page helpful? Yes No
This article describes an issue that Group Policy preparation isn't performed when you
automatically prepare an existing domain.
Symptoms
When you automatically prepare an existing domain for Windows Server 2012 R2 by
using Server Manager or the Install-AddsDomainController Windows PowerShell
cmdlet, Group Policy preparation isn't performed. Additionally, the following output is
displayed briefly when you use Install-AddsDomainController :
The new cross domain planning functionality for Group Policy, RSOP Planning Mode,
requires file system and Active Directory Domain Services permissions to be updated for
existing Group Policy Objects (GPOs).
7 Note
This output is not visible when you install Active Directory Domain Services (AD DS)
by using Server Manager, and the output is not logged.
Cause
This behavior is by design. The automated remote domain preparation capabilities that
are added in Windows Server 2012 don't alter the Group Policy preparation (Gpprep)
behavior that occurred in earlier operating systems.
Gpprep adds cross-domain planning functionality for Group Policy and Resultant Set of
Policy (RSoP) planning mode. This requires updating the file system in SYSVOL and
Active Directory permissions for existing group policies. If the environment already
contains custom or delegated permissions that were put in place manually by
administrators, Gpprep triggers replication of all Group Policy files in SYSVOL and may
deny RSOP functionality to delegated users until their permissions are re-created by
administrators.
Resolution
Domain administrators must run adprep.exe /domainprep /gpprep manually, just as they
had to do in Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2.
More information
Administrators should run Gpprep only one time in the history of a domain. They
shouldn't run Gpprep every time that an upgrade occurs. Gpprep was introduced in
Windows Server 2003.
The Adprep.exe tool is included on the Windows Server 2012 media at \support\adprep.
This version of Adprep.exe supports remote preparation and doesn't have to run on the
infrastructure master operations master (also known as flexible single master operations
or FSMO) role, as it did in previous server operating systems.
For more information about legacy Adprep.exe commands, see Prepare Your
Infrastructure for Upgrade.
Feedback
Was this page helpful? Yes No
This article discusses how to upgrade Microsoft Windows 2000 domain controllers to
Windows Server 2003 and how to add new Windows Server 2003 domain controllers to
Windows 2000 domains.
Summary
This article discusses how to upgrade Microsoft Windows 2000 domain controllers to
Windows Server 2003 and how to add new Windows Server 2003 domain controllers to
Windows 2000 domains. For more information about how to upgrade domain
controllers to Windows Server 2008 or Windows Server 2008 R2, visit the following
Microsoft Web site:
Upgrade Domain Controllers: Microsoft Support Quick Start for Adding Windows Server
2008 or Windows Server 2008 R2 Domain Controllers to Existing Domains
1. Inventory the clients that access resources in the domain that host Windows Server
2003 domain controllers for compatibility with SMB signing:
Each Windows Server 2003 domain controller enables SMB signing in its local
security policy. Make sure that all network clients that use the SMB/CIFS protocol
to access shared files and printers in domains that host Windows Server 2003
domain controllers can be configured or upgraded to support SMB signing. If they
can't, temporarily disable SMB signing until updates can be installed or until the
clients can be upgraded to newer operating systems that support SMB signing. For
information about how to disable SMB signing, see the To disable SMB signing
section at the end of this step.
Action plans
The following list shows the action plans for popular SMB clients:
No action is required.
Microsoft Windows 95
Microsoft Network Client for MS-DOS and Microsoft LAN Manager clients
The Microsoft Network Client for MS-DOS and the Microsoft LAN Manager
2.x network client may be used to provide access to network resources, or
they may be combined with a bootable floppy disk to copy operating system
files and other files from a shared directory on a file server as part of a
software installation routine. These clients don't support SMB signing. Use an
alternative installation method, or disable SMB signing. For information about
how to disable SMB signing, see the To disable SMB signing section at the
end of this step.
Macintosh clients
Some Macintosh clients aren't SMB signing compatible and will receive the
following error message when they try to connect to a network resource:
Some third-party SMB clients don't support SMB signing. Consult your SMB
provider to see if an updated version exists. Otherwise, disable SMB signing
on Windows Server 2003 domain controllers.
You can disable SMB service signing in the following node of Default Domain
Controllers policy on the domain controllers organizational unit: Computer
Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft Network Server:
2. Inventory the domain controllers that are in the domain and in the forest:
a. Make sure that all the Windows 2000 domain controllers in the forest have
installed all the appropriate hotfixes and service packs.
Microsoft recommends that all the Windows 2000 domain controllers run the
Windows 2000 Service Pack 4 (SP4) or later operating systems. If you can't fully
deploy Windows 2000 SP4 or later, all the Windows 2000 domain controllers
must have an Ntdsa.dll file whose date stamp and version are later than June 4,
2001 and 5.0.2195.3673.
To determine the operating system and the service pack revision level of Active
Directory domain controllers in an Active Directory domain, install the Windows
Server 2003 version of Repadmin.exe on a Windows XP Professional or Windows
Server 2003 member computer in the forest, and then run the following
repadmin command against a domain controller in each domain in the forest:
Console
7 Note
Resolve all replication errors between domain controllers that have failed to
inbound replicate in less than Tombstone Lifetime (TSL) number of days (by
default, 60 days). If replication can't be made to function, you may have to
forcibly demote the domain controllers and remove them from the forest by
using the Ntdsutil metadata cleanup command, and then promote them back
into the forest. You can use a forceful demotion to save both the operating
system installation and the programs that are on an orphaned domain
controller. For more information about how to remove orphaned Windows 2000
domain controllers from their domain, click the following article number to view
the article in the Microsoft Knowledge Base:
Take this action only as a last resort to recover the installation of the operating
system and the installed programs. You'll lose unreplicated objects and
attributes on orphaned domain controllers including users, computers, trust
relationships, their passwords, groups, and group memberships.
Be careful when you try to resolve replication errors on domain controllers that
haven't replicated inbound changes for a particular Active Directory partition for
greater than tombstonelifetime number of days. When you do so, you may
reanimate objects that were deleted on one domain controller but for which
direct or transitive replication partners never received the deletion in the
previous 60 days.
Consider removing any lingering objects that reside on domain controllers that
haven't performed inbound replication in the last 60 days. Alternatively, you can
forcefully demote domain controllers that have not performed any inbound
replication on a given partition in tombstone lifetime number of days and
remove their remaining metadata from the Active Directory forest by using
Ntdsutil and other utilities. Contact your support provider or Microsoft PSS for
additional help.
Verify that the file system portion of group policy is consistent. You can use
Gpotool.exe from the Resource Kit to determine whether there are
inconsistencies in policies across a domain. Use Healthcheck from the Windows
Server 2003 support tools to determine whether the Sysvol share replica sets
function correctly in each domain.
If the contents of the Sysvol share are inconsistent, resolve all the
inconsistencies.
d. Use Dcdiag.exe from the support tools to verify that all the domain controllers
have shared Netlogon and Sysvol shares. To do so, type the following command
at a command prompt:
Console
DCDIAG.EXE /e /test:frssysvol
The schema and infrastructure operations masters are used to introduce forest
and domain-wide schema changes to the forest and its domains that are made
by the Windows Server 2003 adprep utility. Verify that the domain controller
that hosts the schema role and infrastructure role for each domain in the forest
reside on live domain controllers and that each role owner has performed
inbound replication over all partitions since they were last restarted.
Verify that the have performed inbound replication of Active Directory since last
booted. Inbound replication can be verified by using the REPADMIN /SHOWREPS
DCNAME command, where DCNAME is the NetBIOS computer name or the fully
f. EventLog Review
Examine the event logs on all the domain controllers for problematic events.
The event logs must not contain serious event messages that indicate a
problem with any of the following processes and components:
physical connectivity
network connectivity
name registration
name resolution
authentication
Group Policy
security policy
disk subsystem
schema
topology
replication engine
The volume that hosts the Active Directory database file, Ntds.dit, must have
free space equal to at least 15-20% of the Ntds.dit file size. The volume that
hosts the Active Directory log file must also have free space equal to at least 15-
20% of the Ntds.dit file size. For more information about how to free up
additional disk space, see the "Domain Controllers Without Sufficient Disk
Space" section of this article.
Enable DNS Scavenging at 7-day intervals for all DNS servers in the forest. For
best results, perform this operation 61 or more days before you upgrade the
operating system. This provides the DNS scavenging daemon sufficient time to
garbage-collect the aged DNS objects when an offline defragmentation is
performed on the Ntds.dit file.
Make a system state backup of at least two domain controllers in every domain
in the forest. You can use the backup to recover all the domains in the forest if
the upgrade doesn't work.
7 Note
The Exchange 2000 schema defines three inetOrgPerson attributes with non-Request for
Comment (RFC)-compliant LDAPDisplayNames: houseIdentifier, secretary, and
labeledURI.
The Windows 2000 inetOrgPerson Kit and the Windows Server 2003 adprep command
define RFC-complaint versions of the same three attributes with identical
LDAPDisplayNames as the non-RFC-compliant versions.
When the Windows Server 2003 adprep /forestprep command is run without corrective
scripts in a forest that contains Windows 2000 and Exchange 2000 schema changes, the
LDAPDisplayNames for the houseIdentifier, labeledURI, and secretary attributes become
mangled. An attribute becomes "mangled" if "Dup" or other unique characters are
added to the beginning of the conflicted attribute name so that objects and attributes in
the directory have unique names.
If you run the Windows Server 2003 adprep /forestprep command in a forest that
contains the Windows 2000 schema before you add the Exchange 2000 schema.
If you install the Exchange 2000 schema in forest that was created where a
Windows Server 2003 domain controller was the first domain controller in the
forest.
If you add Windows 2000 inetOrgPerson Kit to a forest that contains the Windows
2000 schema, and then you install Exchange 2000 schema changes, and then you
run the Windows Server 2003 adprep /forestprep command.
If you add Exchange 2000 schema to an existing Windows 2000 forest, then run
Exchange 2003 /forestprep before you run the Windows Server 2003 adprep
/forestprep command.
If you add the Exchange 2000 versions of the labeledURI, the houseIdentifier, and
the secretary attributes to a Windows 2000 forest before you install the Windows
2000 inetOrgPerson Kit.
You add the Exchange 2000 versions of the labeledURI, the houseIdentifier, and the
secretary attributes to a Windows 2000 forest before you run the Windows Server
2003 adprep /forestprep command without first running the cleanup scripts.
Action plans for each scenario follow:
1. Log on to the console of the schema operations master by using an account that is
a member of the Schema Admins security group.
2. Click Start, click Run, type notepad.exe in the Open box, and then click OK.
3. Copy the following text including the trailing hyphen after "schemaUpdateNow: 1"
to Notepad.
dn: CN=ms-Exch-Assistant-Name,CN=Schema,CN=Configuration,DC=X
changetype: Modify
replace:LDAPDisplayName
LDAPDisplayName: msExchAssistantName
-
dn: CN=ms-Exch-LabeledURI,CN=Schema,CN=Configuration,DC=X
changetype: Modify
replace: LDAPDisplayName
LDAPDisplayName: msExchLabeledURI
-
dn: CN=ms-Exch-House-Identifier,CN=Schema,CN=Configuration,DC=X
changetype: Modify
replace: LDAPDisplayName
LDAPDisplayName: msExchHouseIdentifier
-
dn:
changetype: Modify
add: schemaUpdateNow
schemaUpdateNow: 1
-
5. On the File menu, click Save. In the Save As dialog box, follow these steps:
a. In the File name box, type the following:
\%userprofile%\InetOrgPersonPrevent.ldf
b. In the Save as type box, click All Files.
c. In the Encoding box, click Unicode.
d. Click Save.
e. Quit Notepad.
a. Click Start, click Run, type cmd in the Open box, and then click OK.
Console
Syntax notes:
For example, the command syntax for an Active Directory forest whose forest root
domain is TAILSPINTOYS.COM would be:
7 Note
You may need to change the Schema Update Allowed registry subkey if you
receive the following error message: Schema update is not allowed on this DC
because the registry key is not set or the DC is not the schema FSMO Role
Owner.
1. Install Ldp.exe from the Support\Tools folder of the Microsoft Windows 2000 or
Windows Server 2003 media.
3. Record the distinguished name path for the SchemaNamingContext attribute. For
example, for a domain controller in the CORP.ADATUM.COM forest, the
distinguished name path might be
CN=Schema,CN=Configuration,DC=corp,DC=company,DC=com.
Base DN: The distinguished name path for the schema naming context that is
identified in step 3.
Filter: (ldapdisplayname=dup*)
Scope: Subtree
LDAPDisplayName: DUP-labeledURI-9591bbd3-d2a6-4669-afda-48af7c35507d;
LDAPDisplayName: DUP-secretary-c5a1240d-70c0-455c-9906-a4070602f85f
LDAPDisplayName: DUP-houseIdentifier-354b0ca8-9b6c-4722-aae7-e66906cc9eef
c. Extract the InetOrgPersonFix.ldf file from the Support.cab file that is located in
the Support\Tools folder of the Windows Server 2003 installation media.
Console
Syntax notes:
8. Verify that the houseIdentifier, secretary, and labeledURI attributes in the schema
naming context are not "mangled" before you install Exchange 2000.
New Schema objects and attributes like inetOrgPersonThe adprep utility supports
two command-line arguments:
adprep /forestprep : Runs forest upgrade operations.
dprep /domainprep : Runs domain upgrade operations.
The adprep /domainprep command is a one-time operation that you run on the
infrastructure operations master domain controller of each domain in the forest that will
host new or upgraded Windows Server 2003 domain controllers. The adprep
/domainprep command verifies that the changes from forestprep have replicated in the
domain partition and then makes its own changes to the domain partition and group
policies in the Sysvol share.
You can't perform either of the following actions unless the /forestprep and the
/domainprep operations have completed and replicated to all the domain controllers in
that domain:
Upgrade the Windows 2000 domain controllers to Windows Server 2003 domain
controllers by using Winnt32.exe.
7 Note
You can upgrade the Windows 2000 member servers and computers to Windows
Server 2003 member computers whenever you want. Promote new Windows Server
2003 domain controllers into the domain by using Dcpromo.exe.The domain that
hosts the schema operations master is the only domain where you must run both
adprep /forestprep and adprep /domainprep . In all other domains, you only have to
The adprep /forestprep and the adprep /domainprep commands don't add attributes to
the global catalog partial attribute set or cause a full synchronization of the global
catalog. The RTM version of adprep /domainprep does cause a full sync of the \Policies
folder in the Sysvol tree. Even if you run forestprep and domainprep several times,
completed operations are performed only one time.
After the changes from adprep /forestprep and adprep /domainprep completely
replicate, you can upgrade the Windows 2000 domain controllers to Windows Server
2003 by running Winnt32.exe from the \I386 folder of the Windows Server 2003 media.
Also, you can add new Windows Server 2003 domain controllers to the domain by using
Dcpromo.exe.
1. Make sure that you've completed all the operations in the "Forest Inventory" phase
with special attention to the following items:
a. You have created system state backups.
b. All the Windows 2000 domain controllers in the forest have installed all the
appropriate hotfixes and service packs.
c. End-to-end replication of Active Directory is occurring throughout the forest
d. FRS replicates the file system policy correctly throughout each domain.
2. Log on to the console of the schema operations master with an account that is a
member of the Schema Admins security group.
3. Verify that the schema FSMO has performed inbound replication of the schema
partition by typing the following at a Windows NT command prompt: repadmin
/showreps
5. Run adprep on the schema operations master. To do so, click Start, click Run, type
cmd, and then click OK. On the schema operations master, type the following
command:
Console
X:\I386\adprep /forestprep
where X:\I386\ is the path of the Windows Server 2003 installation media. This
command runs the forest-wide schema upgrade.
7 Note
Events with event ID 1153 that are logged in the Directory Service event log,
such as the sample that follows, can be ignored:
6. Verify that the adprep /forestprep command successfully ran on the schema
operations master. To do so, from the console of the schema operations master,
verify the following items: - The adprep /forestprep command completed without
error. - The CN=Windows2003Update object is written under
CN=ForestUpdates,CN=Configuration,DC= forest_root_domain. Record the value
of the Revision attribute. - (Optional) The schema version incremented to version
30. To do so, see the ObjectVersion attribute under
CN=Schema,CN=Configuration,DC= forest_root_domain.If adprep /forestprep
doesn't run, verify the following items:
The fully qualified path for Adprep.exe located in the \I386 folder of the
installation media was specified when adprep ran. To do so, type the
following command:
Console
x:\i386\adprep /forestprep
The logged on user who runs adprep has membership to the Schema Admins
security group. To verify this, use the whoami /all command.
a. Click Start, click Run, type cmd, and then click OK.
b. Type the following, and then press ENTER: repadmin /options -
DISABLE_OUTBOUND_REPL
8. Verify that the adprep /forestprep changes have replicated on all the domain
controllers in the forest. It's useful to monitor the following attributes:
a. Incrementing the schema version
b. The CN=Windows2003Update, CN=ForestUpdates,CN=Configuration,DC=
forest_root_domain or CN=Operations,CN=DomainUpdates,CN=System,DC=
forest_root_domain and the operations GUIDs under it have replicated in.
c. Search for new schema classes, objects, attributes, or other changes that adprep
/forestprep adds, such as inetOrgPerson. View the Sch XX.ldf files (where XX is
10. Log on to the console of the schema operations master with an account that is a
member of the Schema Admins group security group of the forest that hosts the
schema operations master.
7 Note
2. Run adprep /domainprep on the Infrastructure master. To do so, click Start, click
Run, type cmd, and then on the Infrastructure master type the following command:
X:\I386\adprep /domainprep where X:\I386\ is the path of the Windows Server
2003 installation media. This command runs domain-wide changes in the target
domain.
7 Note
The adprep /domainprep command modifies files permissions in the Sysvol
share. These modifications cause a full synchronization of files in that
directory tree.
3. Verify that domainprep completed successfully. To do so, verify the following items:
The fully qualified path for Adprep.exe located in the \I386 directory of the
installation media was specified when you ran adprep . To do so, at a
command prompt type the following command: x :\i386\adprep
/forestprep where x is the drive that hosts the installation media.
4. Verify that the adprep /domainprep changes have replicated. To do so, for the
remaining domain controllers in the domain, verify the following items: - The
CN=Windows2003Update,CN=DomainUpdates,CN=System,DC= dn path of
domain you are upgrading object exists and the value for the Revision attribute
matches the value of the same attribute on the infrastructure master of the
domain. - (Optional) Look for objects, attributes, or access control list (ACL)
changes that adprep /domainprep added. Repeat steps 1-4 on the infrastructure
master of the remaining domains in bulk or as you add or upgrade DCs in those
domains to Windows Server 2003. Now you can promote new Windows Server
2003 computers into the forest by using DCPROMO. Or, you can upgrade existing
Windows 2000 domain controllers to Windows Server 2003 by using
WINNT32.EXE.
The following computers must be among the first domain controllers that run Windows
Server 2003 in the forest in each domain:
The domain naming master in the forest so that you can create default DNS
program partitions.
The primary domain controller of the forest root domain so that the enterprise-
wide security principals that Windows Server 2003's forestprep adds become
visible in the ACL editor.
The primary domain controller in each non-root domain so that you can create
new domain-specific Windows 2003 security principals. To do so, use WINNT32 to
upgrade existing domain controllers that host the operational role you want. Or,
transfer the role to a newly promoted Windows Server 2003 domain controller.
Perform the following steps for each Windows 2000 domain controller that you
upgrade to Windows Server 2003 with WINNT32 and for each Windows Server
2003 workgroup or member computer that you promote:
1. Before you use WINNT32 to upgrade Windows 2000 member computers and
domain controllers, remove Windows 2000 Administration Tools. To do so, use the
Add/Remove Programs tool in Control Panel. (Windows 2000 upgrades only.)
2. Install any hotfix files or other fixes that either Microsoft or the administrator
determines is important.
3. Check each domain controller for possible upgrade issues. To do so, run the
following command from the \I386 folder of the installation media: winnt32.exe
/checkupgradeonly Resolve any issues that the compatibility check identifies.
4. Run WINNT32.EXE from the \I386 folder of the installation media, and the restart
the upgraded 2003 domain controller.
If Windows NT 4.0 clients don't have NT 4.0 SP6 or Windows 95 clients don't have
the directory service client installed, disable SMB Service signing on the Default
Domain Controllers policy on the Domain Controllers organizational unit, and then
link this policy to all organizational units that host domain controllers. Computer
Configuration\Windows Settings\Security Settings\Local Policies\Security
Options\Microsoft Network Server: Digitally sign communications (always)
6. Verify the health of the upgrade using the following data points:
The upgrade completed successfully.
The hotfixes that you added to the installation successfully replaced the
original binaries.
Inbound and outbound replication of Active Directory is occurring for all
naming contexts held by the domain controller.
The Netlogon and Sysvol shares exist.
The event log indicates that the domain controller and its services are
healthy.
7 Note
You may receive the following event message after you upgrade: You can
safely ignore this event message.
7. Install the Windows Server 2003 Administration Tools (Windows 2000 upgrades
and Windows Server 2003 non-domain controllers only). Adminpak.msi is in the
\I386 folder of the Windows Server 2003 CD-ROM. Windows Server 2003 media
contains updated support tools in the Support\Tools\Suptools.msi file. Make sure
that you reinstall this file.
8. Make new backups of at least the first two Windows 2000 domain controllers that
you upgraded to Windows Server 2003 in each domain in the forest. Locate the
backups of the Windows 2000 computers that you upgraded to Windows Server
2003 in locked storage so you don't accidentally use them to restore a domain
controller that now runs Windows Server 2003.
The SIS reviews existing permissions on objects stored in Active Directory, and
then applies a more efficient security descriptor on those objects. The SIS starts
automatically (identified by event 1953 in the directory service event log) when
upgraded domain controllers first start the Windows Server 2003 operating
system. You benefit from the improved security descriptor store only when you log
an event ID 1966 event message in the directory service event log: This event
message indicates that the single instance store operation has completed and
serves as a queue the administrator to perform of offline defragmentation of the
Ntds.dit using NTDSUTIL.EXE.
The offline defragmentation can reduce the size of a Windows 2000 Ntds.dit file by
up to 40%, improves Active Directory performance, and updates the pages in the
database for more efficient storage of Link Valued attributes. For more information
about how to defragment the Active Directory database, click the following article
number to view the article in the Microsoft Knowledge Base:
10. Investigate the DLT Server Service. Windows Server 2003 domain controllers
disable the DLT Server service on fresh and upgrade installs. If Windows 2000 or
Windows XP clients in your organization use the DLT Server service, use Group
Policy to enable the DLT Server service on new or upgraded Windows Server 2003
domain controllers. Otherwise, incrementally delete distributed link tracking
objects from Active Directory. For more information, click the following article
number to view the article in the Microsoft Knowledge Base:
If you bulk delete thousands of DLT objects or other objects, you may block
replication because of a lack of version store. Wait tombstonelifetime number of
days (by default, 60 days) after you delete the last DLT object and for garbage
collection to complete, then use NTDSUTIL.EXE to perform an offline
defragmentation of the Ntds.dit file.
11. Configure the best practice organizational unit structure. Microsoft recommends
that administrators actively deploy the best practice organizational unit structure in
all the Active Directory domains, and after they upgrade or deploy Windows Server
2003 domain controllers in Windows Domain mode, redirect the default containers
that earlier-version APIs use to create users, computers, and groups to an
organizational unit container that the administrator specifies.
For additional information about the best practice organizational unit structure,
view the "Creating an Organizational Unit Design" section of the "Best Practice
Active Directory Design for Managing Windows Networks" white paper. To view
the white paper, visit the following Microsoft Web site:
https://technet.microsoft.com/library/bb727085.aspx For more information
about changing the default container where users, computers, and groups that
earlier-version APIs create are located, click the following article number to view
the article in the Microsoft Knowledge Base:
324949 Redirecting the users and computers containers in Windows Server 2003
domains
12. Repeat steps 1 through 10 as required for each new or upgraded Windows Server
2003 domain controller in the forest and step 11 (Best Practice organizational unit
structure) for each Active Directory domain.
In Summary:
Hardware: computer type, memory size, page file placement, disk size,
performance and raid configuration, BIOS and firmware revision levels
Software: client and server operating system versions, client and server
applications, service pack versions, hotfixes, schema changes, security groups,
group memberships, permissions, policy settings, object count type, and location,
version interoperability
Network infrastructure: WINS, DHCP, link speeds, available bandwidth
Load: Load simulators can simulate password changes, object creation, Active
Directory replication, logon authentication and other events. The goal isn't to
reproduce the scale of the production environment. Instead, the goals are to
discover the costs and frequency of common operations and to interpolate their
effects (name queries, replication traffic, network bandwidth, and processor
consumption) on the production environment based on your current and future
requirements.
Administration: tasks performed, tools used, operating systems used
Operation: capacity, interoperability
Disk Space: Note the starting, peak, and ending size of the operating system,
Ntds.dit, and Active Directory log files on global catalog and non-global catalog
domain controllers in each domain after each of the following operations:
1. adprep /forestprep
2. adprep /domainprep
3. Upgrading Windows 2000 domain controllers to Windows Server 2003
4. Performing offline defragmentation after version upgrades
Understand the inner workings of the upgrade process and the associated risks.
Expose potential problem areas for the deployment process in your environment.
Test and develop fall-back plans in case the upgrade doesn't succeed.
Define the appropriate level of detail to apply to the upgrade process for the
production domain.
1. Delete the unused files including *.tmp files or cached files that internet browsers
use. To do so, type the following commands (press ENTER after each command):
Console
cd /d drive\
del *.tmp /s
2. Delete any user or memory dump files. To do so, type the following commands
(press ENTER after each command):
Console
cd /d drive\
del *.dmp /s
3. Temporarily remove or relocate files that you can access from other servers or
easily reinstall. Files that you can remove and easily replace include ADMINPAK,
Support Tools, and all the files in the %systemroot%\System32\Dllcache folder.
4. Delete old or unused user profiles. To do so, click Start, right-click My Computer,
click Properties, click the User Profiles tab, and then delete all the profiles that are
for old and unused accounts. Don't delete any profiles that may be for service
accounts.
7 Note
Active Directory does not delete objects from the database until tombstonelifetime
number of days (by default, 60 days) have passed and the garbage collection
completes. If you reduce tombstonelifetime to a value lower than end-to-end
replication in the forest, you may cause inconsistencies in Active Directory.
Feedback
Was this page helpful? Yes No
This article describes the parameters and options that are used in the DCPROMO answer
file to install and remove Active Directory Domain Services (AD DS) on domain
controllers.
Summary
This article describes the syntax that you use to build answer files to perform
unattended installations of AD DS on domain controllers. You can also use the answer
files to remove AD DS in unattended mode.
Introduction
The Dcpromo.exe program (DCPROMO) was introduced in Microsoft Windows 2000
Server to provide a GUI method of promoting and demoting Active Directory domain
controllers. Administrators can use DCPROMO answer files to do the following
unattended tasks:
Windows Server 2003 updated the syntax for DCPROMO answer files.
Windows Server 2012 replaced DCPROMO with PowerShell cmdlets. However, the
Windows Server 2003 version of the DCPROMO answer file syntax remains fully
supported on the following Windows versions:
More information
The DCPROMO answer file is an ASCII text file that provides automated user input for
each page of the DCPROMO wizard.
Subtle differences exist between the DCPROMO answer file syntax in Windows 2000
Server and in Windows Server 2003. Despite these differences, Windows Server 2003 can
read the Windows 2000 Server answer file syntax and interpret equivalent settings.
However, the Windows Server 2003 answer file syntax may not work correctly on a
Windows 2000 Server domain controller. For example, Windows 2000 Server cannot use
the RemoveApplicationPartitions and ConfirmGc options.
If you have to use the same answer files on both Windows 2000 Server and Windows
Server 2003 domain controllers, use the answer file syntax that is described in this
article.
Console
dcpromo /answer:<answer.txt>
7 Note
In this command, <answer.txt> is the path and file name of the answer file that will
be used for demotion or promotion. You can use this command whether you use
the Start > Run command or an unattended Setup file.
Each DCPROMO operation requires answers to specific fields in the [DCInstall] section of
the answer file. The following list provides the required fields for each operation. The
default values are used if the option is not specified. The default values for these fields
are described in Field Definitions.
[DCINSTALL]
InstallDNS=yes
NewDomain=forest
NewDomainDNSName=<The fully qualified Domain Name System (DNS) name>
DomainNetBiosName=<By default, the first label of the fully qualified DNS name>
SiteName=<Default-First-Site-Name>
ReplicaOrNewDomain=domain
ForestLevel=<The forest functional level number>
DomainLevel=<The domain functional level number>
DatabasePath="<The path of a folder on a local volume>"
LogPath="<The path of a folder on a local volume>"
RebootOnCompletion=yes
SYSVOLPath="<The path of a folder on a local volume>"
SafeModeAdminPassword=<The password for an offline administrator account>
[DCINSTALL]
ParentDomainDNSName=<Fully qualified DNS name of parent domain>
UserName=<The administrative account in the parent domain>
UserDomain=<The name of the domain of the user account>
Password=<The password for the user account> Specify * to prompt the user for
credentials during the installation.
NewDomain=child
CreateDNSDelegation=yes
DNSDelegationUserName= <The account that has permissions to create a DNS
delegation> The account that is being used to install AD DS may differ from the
account in the parent domain that has the permissions that are required to create
a DNS delegation. In this case, specify the account that can create the DNS
delegation for this parameter. Specify * to prompt the user for credentials during
the installation.
DNSDelegationPassword= <The password for the account that is specified for
DNSDelegationUserName> Specify * to prompt the user for a password during the
installation.
SafeModeAdminPassword=<The password for an offline administrator account>
RebootOnCompletion=yes
For a new tree in existing forest installations, the following options apply:
[DCINSTALL]
UserName=<An administrative account in the parent domain>
UserDomain=<The name of the domain of the user account>
Password=<The password for the adminstrative account> Specify * to prompt the
user for credentials during the installation.
NewDomain=tree
NewDomainDNSName=<The fully qualified DNS name of the new domain>
SiteName=<The name of the AD DS site in which this domain controller will
reside> This site must be created in advance in the Dssites.msc snap-in.
DomainNetBiosName=<The first label of the fully qualified DNS name>
ReplicaOrNewDomain=domain
DomainLevel=<The domain functional level number>
DatabasePath="<The path of a folder on a local volume>"
LogPath="<The path of a folder on a local volume>"
SYSVOLPath="<The path of a folder on a local volume>"
InstallDNS=yes
CreateDNSDelegation=yes
DNSDelegationUserName= <The account that has permissions to create a DNS
delegation> The account that is being used to install AD DS may differ from the
account in the parent domain that has the permissions that are required to create
a DNS delegation. In this case, specify the account that can create the DNS
delegation for this parameter. Specify * to prompt the user for credentials during
the installation.
DNSDelegationPassword=<The password for the account that is specified for
DNSDelegationUserName> Specify * to prompt the user for a password during the
installation.
SafeModeAdminPassword=<The password for an offline administrator account>
RebootOnCompletion=yes
ReplicaOrNewDomain=replica
InstallDNS=yes
ConfirmGC=yes
RebootOnCompletion=yes
For additional domain controller installations that use the Install From Media (IFM)
method, the following options apply:
[DCINSTALL]
UserName=<The administrative account in the domain of the new domain
controller>
Password=<The password for the UserName account>
UserDomain=<The name of the domain of the UserName account>
DatabasePath="<The path of a folder on a local volume>"
LogPath="<The path of a folder on a local volume>"
SYSVOLPath="<The path of a folder on a local volume>"
SafeModeAdminPassword=<The password of an offline administrator account>
CriticalReplicationOnly=no
SiteName=<The name of the AD DS site in which this domain controller will
reside>
This site must be created in advance in the Dssites.msc snap-in.
ReplicaOrNewDomain=replica
ReplicaDomainDNSName=<The fully qualified domain name (FQDN) of the
domain in which you want to add an additional domain controller>
ReplicationSourceDC=<An existing domain controller in the domain>
RebootOnCompletion=yes
For read-only domain controller (RODC) installations, the following options apply:
[DCINSTALL]
UserName=<The administrative account in the domain of the new domain
controller>
UserDomain=<The name of the domain of the user account>
PasswordReplicationDenied=<The names of the user, group, and computer
accounts whose passwords are not to be replicated to this RODC>
PasswordReplicationAllowed =<The names of the user, group, and computer
accounts whose passwords can be replicated to this RODC>
DelegatedAdmin=<The user or group account name that will install and
administer the RODC>
SiteName=Default-First-Site-Name
CreateDNSDelegation=no
CriticalReplicationOnly=yes
For removal of AD DS from the last domain controller in a domain, the following
options apply:
[DCINSTALL]
UserName=<An administrative account in the parent domain>
UserDomain=<The domain name of the UserName account>
Password=<The password for the UserName account> Specify * to prompt the
user for credentials during the installation.
IsLastDCInDomain=yes
AdministratorPassword=<The local administrator password for the server>
RemoveApplicationPartitions=If you want to remove the partitions, specify "yes"
(no quotation marks) for this entry. If you want to keep the partitions, this entry is
optional.
RemoveDNSDelegation=yes
DNSDelegationUserName=<The DNS server administrative account for the DNS
zone that contains the DNS delegation>
DNSDelegationPassword=<The password for the DNS server administrative
account>
RebootOnCompletion=yes
For removal of the last domain controller in a forest, the following options apply:
[DCINSTALL]
UserName=<An administrative account in the parent domain>
UserDomain=<The domain name of the UserName account>
Password=<The password for the UserName account> Specify * to prompt the
user for credentials during the installation.
IsLastDCInDomain=yes
AdministratorPassword=<The local administrator password for the server>
RemoveApplicationPartitions=If you want to remove the partitions, specify "yes"
(no quotation marks) for this entry. If you want to keep the partitions, this entry is
optional.
RemoveDNSDelegation=yes
DNSDelegationUserName=<The DNS server administrative account for the DNS
zone that contains the DNS delegation>
DNSDelegationPassword=<The password for the DNS server administrative
account>
RebootOnCompletion=yes
Field definitions
This section describes the fields and the entries that you can use in the answer file. The
default value for each entry appears in bold text.
AllowDomainReinstall
Yes | No
This entry specifies whether an existing domain is re-created.
AllowDomainControllerReinstall
Yes | No
This entry specifies whether to continue to install this domain controller even
though an active domain controller account that uses the same name is detected.
Specify "Yes" (no quotation marks) only if you're sure that the account is no longer
being used.
ApplicationPartitionsToReplicate
No default
This entry specifies the application partitions that have to be replicated in the
format ""partition1" "partition2"". If * is specified, all application partitions will be
replicated. Use space-separated or comma-and-space-separated distinguished
names. Enclose the whole string in quotation marks.
ChildName
No default
This is the name of the subordinate domain that is appended to the
ParentDomainDNSName entry. If the parent domain is "A.COM," and the
subordinate domain is "B," enter "B.A.COM and B" (no quotation marks) for
ChildName.
ConfirmGc
Yes | No
This entry specifies whether the replica is also a global catalog. "Yes" makes the
replica a global catalog if the backup was a global catalog. "No" doesn't make the
replica a global catalog. (These entries don't require quotation marks.)
CreateDNSDelegation
Yes | No
No default
This entry indicates whether to create a DNS delegation that references this new
DNS server. This entry is valid for AD DS-integrated DNS only.
CriticalReplicationOnly
Yes | No
This entry specifies whether the installation operation performs only important
replication before a restart and then skips the noncritical and potentially lengthy
part of replication. The noncritical replication occurs after the role installation is
complete, and the computer restarts.
DatabasePath
%systemroot%\NTDS
This entry is the path of the fully qualified, non-Universal Naming Convention
(UNC) directory on a hard disk of the local computer. This directory will host the
AD DS database (NTDS.DIT). If the directory exists, it must be empty. If it doesn't
exist, it will be created. Free disk space on the logical drive that is selected must be
200 megabytes (MB). To accommodate rounding errors or all objects in the
domain, free disk space may have to be larger. For best performance, locate the
directory on a dedicated hard disk.
DelegatedAdmin
No default
This entry specifies the name of the user or the group who will install and
administer the RODC. If no value is specified, only members of the Domain Admins
group or the Enterprise Admins group can install and administer the RODC.
DNSDelegationPassword
<Password> | *
No default
This entry specifies the password for the user account that is used to create or
remove the DNS delegation. Specify * to prompt the user to enter credentials.
DNSDelegationUserName
No default
This entry specifies the user name to be used when the DNS delegation is created
or removed. If you don't specify a value, the account credentials that you specify
for the installation or removal of AD DS are used for the DNS delegation.
DNSOnNetwork
Yes | No
This entry specifies whether the DNS service is available on the network. This entry
is used only when the network adapter for this computer isn't configured to use
the name of a DNS server for name resolution. Specify "No" (no quotation marks)
to indicate that DNS will be installed on this computer for name resolution.
Otherwise, the network adapter must be configured to use a DNS server name
first.
DomainLevel
0|2|3
No default
This entry specifies the domain functional level. This entry is based on the levels
that exist in the forest when a new domain is created in an existing forest. Value
descriptions are as follows:
0 = Windows 2000 Server native mode
2 = Windows Server 2003
3 = Windows Server 2008
DomainNetbiosName
No default
This entry is the NetBIOS name that is used by pre-AD DS clients to access the
domain. The DomainNetbiosName must be unique on the network.
ForestLevel
0|2|3
This entry specifies the forest functional level when a new domain is created in a
new forest as follows:
InstallDNS
Yes | No
The default value changes depending on the operation. For a new forest, the DNS
server role is installed by default. For a new tree, a new child domain, or a replica, a
DNS server is installed by default if an existing DNS infrastructure is detected by
the Active Directory Domain Services Installation Wizard. If no existing DNS
infrastructure is detected by the wizard, a DNS server isn't installed by default.
This entry specifies whether DNS is configured for a new domain if the Active
Directory Domain Services Installation Wizard detects that the DNS dynamic
update protocol isn't available. This entry also applies if the wizard detects an
insufficient number of DNS servers for an existing domain.
LogPath
%systemroot%\NTDS
This is the path of the fully qualified, non-UNC directory on a hard disk on the local
computer that will host the AD DS log files. If the directory exists, it must be empty.
If it doesn't exist, it will be created.
NewDomain
NewDomainDNSName
No default
This entry is used in "new tree in existing forest" or "new forest" installations. The
value is a DNS domain name that is currently not being used.
ParentDomainDNSName
No default
This entry specifies the name of an existing parent DNS domain for a child domain
installation.
Password
<Password> | *
No default
This entry specifies the password that corresponds to the user account that is used
to configure the domain controller. Specify * to prompt the user to enter
credentials. For protection, passwords are removed from the answer file following
an installation. Passwords must be redefined every time that an answer file is used.
PasswordReplicationAllowed
<Security_Principal> | NONE
No default
This entry specifies the names of computer accounts and user accounts whose
passwords can be replicated to this RODC. Specify "NONE" (no quotation marks) if
you want to keep the value empty. By default, no user credentials will be cached
on this RODC. To specify more than one security principal, add the entry multiple
times.
PasswordReplicationDenied
<Security_Principal> | NONE
This entry specifies the names of the user, group, and computer accounts whose
passwords aren't to be replicated to the RODC. Specify "NONE" (no quotation
marks) if you don't want to deny the replication of credentials for any users or
computers. To specify more than one security principal, add the entry multiple
times.
RebootOnCompletion
Yes | No
This entry specifies whether to restart the computer after you install or remove AD
DS regardless of whether the operation was successful.
RebootOnSuccess
Yes | No | NoAndNoPromptEither
This entry specifies whether the computer must be restarted after AD DS has been
installed or removed successfully. A restart is always required to complete a
change in an AD DS role.
ReplicaDomainDNSName
No default
This entry specifies the FQDN of the domain in which you want to configure an
additional domain controller.
ReplicaOrNewDomain
This entry is used only for new installations. "Domain" (no quotation marks)
converts the server into the first domain controller of a new domain.
"ReadOnlyReplica" (no quotation marks) converts the server into a RODC. "Replica"
(no quotation marks) converts the server into an additional domain controller.
ReplicationSourceDC
No default
This entry specifies the FQDN of the partner domain controller from which AD DS
data is replicated to create the new domain controller.
ReplicationSourcePath
No default
This entry specifies the location of the installation files that are used to create a
new domain controller.
SafeModeAdminPassword
<Password> | NONE
No default
This entry is used to supply the password for the offline administrator account that
is used in Directory Service Restore Mode. You can't specify an empty password.
SiteName
Default-First-Site-Name
This entry specifies the site name when you install a new forest. For a new forest,
the default is Default-First-Site-Name. For all other scenarios, a site will be selected
by using the current site and the subnet configuration of the forest.
SkipAutoConfigDNS
No default
This entry is for expert users who want to skip automatic configuration of client
settings, forwarders, and root hints. The entry is only in effect if the DNS Server
service is already installed on the server. In this case, you'll receive an informational
message that confirms that the automatic configuration of DNS was skipped.
Otherwise, this entry is ignored. If you specify this switch, make sure that zones are
created and configured correctly before you install AD DS, or the domain
controller won't operate correctly. This entry doesn't skip automatic creation of the
DNS delegation in the parent DNS zone. To control DNS delegation creation, use
the DNSDelegation entry.
Syskey
<system_key> | NONE
This entry specifies the system key for the media from which you replicate the
data.
SYSVOLPath
%systemroot%\SYSVOL
This entry specifies a fully qualified, non-UNC directory on the hard disk of the
local computer. This directory will host the AD DS log files. If the directory already
exists, it must be empty. If it doesn't exist it will be created. The directory must be
located on a partition that was formatted by using the NTFS 5.0 file system. Locate
the directory on a different physical hard disk than the operating system for best
performance.
TransferIMRoleIfNeeded
Yes | No
This entry specifies whether to transfer the infrastructure master role to this
domain controller. This entry is useful if the domain controller is currently hosted
on a global catalog server, and you don't plan to make the domain controller a
global catalog server. Specify "Yes" (no quotation marks) to transfer the
infrastructure master role to this domain controller. If you specify "Yes," make sure
that you specify the ConfirmGC=No entry.
UserDomain
No default
This entry specifies the domain name for the user account that is used for install
AD DS on a server.
UserName
No default
This entry specifies the user account name that is used for installing AD DS on a
server. We recommend that you specify the account credentials in the <domain>\
<user_name> format.
AdministratorPassword
No default
This entry is used to specify the local administrator password when you remove AD
DS from a domain controller.
DemoteFSMO
Yes | No
This entry indicates whether a forced removal happens even if an operations
master role is held by the domain controller.
DNSDelegationPassword
<Password> | *
No default
This entry specifies the password for the user account that is used to create or to
remove the DNS delegation. Specify * to prompt the user to enter credentials.
DNSDelegationUserName
No default
This entry specifies the user name to be used when the DNS delegation is created
or removed. If you don't specify a value, the account credentials that you specify
for the AD DS installation or for the AD DS removal are used for the DNS
delegation.
IgnoreIsLastDcInDomainMismatch
Yes | No
This entry specifies whether to continue the removal of AD DS from the domain
controller when either the IsLastDCInDomain=Yes entry is specified or the Active
Directory Domain Services Installation Wizard detects that there's actually another
active domain controller in the domain. This entry also applies to a scenario in
which the IsLastDCInDomain=No entry is specified, and the wizard can't contact
any other domain controller in the domain.
IgnoreIsLastDNSServerForZone
Yes | No
This entry specifies whether to continue removing AD DS even though the domain
controller is the last DNS server for one or more AD DS-integrated DNS zones that
the domain controller hosts.
IsLastDCInDomain
Yes | No
This entry specifies whether the domain controller from which you remove AD DS
is the last domain controller in the domain.
Password
<Password> | *
No default
This entry specifies the password that corresponds to the user account that is used
to configure the domain controller. Specify * to prompt the user to enter
credentials. For protection, passwords are removed from the answer file after you
install AD DS. Passwords must be redefined every time that an answer file is used.
RebootOnCompletion
Yes | No
This entry specifies whether to restart the computer after you install or remove AD
DS regardless of whether the operation was successful.
RebootOnSuccess
Yes | No | NoAndNoPromptEither
RemoveApplicationPartitions
Yes | No
This entry specifies whether to remove application partitions when you remove AD
DS from a domain controller. "Yes" (no quotation marks) removes application
partitions on the domain controller. "No" (no quotation marks) doesn't remove
application partitions on the domain controller. If the domain controller hosts the
last replica of any application directory partition, you must manually confirm that
you must remove these partitions.
RemoveDNSDelegation
Yes | No
This entry specifies whether to remove DNS delegations that point to this DNS
server from the parent DNS zone.
RetainDCMetadata
Yes | No
This entry specifies whether domain controller metadata is retained in the domain
after AD DS removal so that a delegated administrator can remove AD DS from an
RODC.
UserDomain
No default
This entry specifies the domain name for the user account that is used to install AD
DS.
UserName
No default
This entry specifies the user account name that is used to install AD DS on a server.
We recommend that you specify the account credentials in the <domain>\
<user_name> format.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where installing Active Directory Domain
Services fails with the error: The specified user already exists.
Symptoms
When you attempt to install Active Directory Domain Services on a Windows Server
computer, you may receive the following error:
Cause
There is a computer account with the same name as the computer on which you are
attempting to install Active Directory Domain Services.
Resolution
1. If you are installing Active Directory Domain Services on a computer with the same
name as a domain controller that previously existed in the domain, it is possible
that metadata still remains.
You can use one of the following methods to remove the metadata:
For best results, remove the stale domain controller metadata on a domain
controller in the same domain and site that the new domain controller is joining, or
the helper domain controller specified in the Active Directory Installation Wizard or
answer file.
2. If the Active Directory Installation Wizard continues to fail with error "The specified
user already exists", review the %systemroot%\debug\DCPROMOUI.LOG to identify
the name of the helper domain controller that the new domain controller is
attempting to use.
3. Verify that the helper domain controller identified in Step 2 has inbound replicated
the removal of the conflicting domain controller machine account and NTDS
Settings objects (metadata cleanup) performed in Step 1. If the domain controller
machine account still exists, evaluate the possible reasons:
Replication latency such as a domain controller being several hops away from
the domain controller originating the metadata cleanup.
Inbound replication failure on the helper domain controller.
The helper domain controller resides in a lag site that has been intentionally
configured to inbound replicate changes in a delayed fashion.
4. For more information about other root causes for this error, click the following
article number to view the articles in the Microsoft Knowledge Base:
938447 You cannot add a user name or an object name that only differs by a
character with a diacritic mark
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot an internal error that you receive during the
replication phase of the Active Directory Installation Wizard (Dcpromo).
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 265090
7 Note
Home users: This article is only intended for use by technical support agents and IT
professionals. If you're looking for help with a problem, ask the Microsoft
Community .
Summary
During promotion, directory service objects are replicated in the order of the Update
Sequence Number (USN) (low to high) for the schema, configuration, and domain.
Internal errors can occur when a parent container for replicated child objects doesn't
exist in the local directory service.
There is a live object whose parent was deleted in the past, and the parent has
expired and been converted to a phantom. Therefore, the child object can no
longer be replicated out. The call to FillGuidAndSid for the parent object in
ReplPrepareDataToShip doesn't succeed, and an error is reported (8352 =
ERROR_DS_NOT_AN_OBJECT). This error causes the outbound replication of the
child object to quit, and you receive a replication internal error message.
If there is a live (or deleted) object that has a phantom parent, Active Directory
temporarily accepts the live object because of out-of-order replication
requirements. Disk cleanup procedures, such as garbage collection, shouldn't be
able to convert a deleted object into a phantom if the parent has child objects. The
Ntdsa.dll file as of Windows 2000 Service Pack 2 (SP2) prevents this situation in the
directory service. However, this file doesn't fix the issue after it has already
occurred.
You use the authoritative restore command when you use Windows Server 2003
or a later version of the Ntdsutil tool. Ntdsutil.exe increases the USN of specified
containers and child objects in Active Directory. Beta versions of Ntdsutil.exe may
incorrectly increase the USN for the Lost and Found container. When objects that
are destined for the Lost and Found container are replicated before the container
is created in the local directory service, the following event is reported:
To avoid this scenario, the Lost and Found container is normally one of the first
containers that is replicated.
Internal errors can also occur on existing Active Directory domain controllers during
normal or administrator-initiated Active Directory replication.
2. If this error occurs when you are using Active Directory Installation Wizard and
more than one potential replication partner exists, use the Active Directory
Installation Wizard answer file to find the source server. Possible source domain
controllers include domain controllers in the parent domain for new child domains,
or domain controllers in the same domain for replicated domain controllers.
Alternatively, if a specific source server is suspect, stop the Net Logon service on
the suspect computer, and search from a different domain controller.
3. On the source server, locate and click the following registry sub key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Diagnostics
4. Use Registry Editor to export the \NTDS key from the source server to the
computer that is being promoted (for example, Ntds.reg). Copy the file to the
computer that is encountering the internal error when replication occurs. If the
internal error occurs when the Active Directory Installation Wizard is running, copy
the .reg file to the desktop on the problem domain controller so that the file can
be easily started.
Alternatively, press Windows key+R, and then drag the .reg file from the staged
Explorer window that is focused on that file. Select OK to add the contents of the
.reg file to the registry.
5. When the computer that is being promoted starts replicating the schema naming
context, run the Ntds.reg file to build the \NTDS\Diagnostics registry key and
settings.
2 Warning
The NTDS\Diagnostics registry key does not exist at this phase of promotion
and must be manually created on the destination domain controller. If the
NTDS\Diagnostics registry key is loaded too early when the Active Directory
Installation Wizard is running, the key is overwritten with default values and
no events are logged. For existing domain controllers, the registry settings can
be enabled any time.
6. Examine the directory service events logs on the source and destination servers.
Internal events are displayed on the source server as event ID 1173. Review NTDS
replication events that occur before the internal error to locate the global universal
identification (GUID) of the object that's being replicated. (There may be back-to-
back attempts to replicate the same object). Record the GUID for the problematic
object or container.
7. Start Ldp.exe, initiate a connection, and bind against the source server. From the
Browse menu, select Delete. For the distinguished name path, type
<GUID=GUID#>, for example, <GUID=b2d605a4-b9e6-4505-ba59-
895e91a9a7b5>. Set the search scope to Base, and then delete the specified GUID.
8. Using Ldp.exe, set the value for the TombstoneLifetime attribute to 2 (the value in
days before tombstoned objects are removed). TombstoneLifetime is located in the
following distinguished name path:
Verify that the TombstoneLifetime attribute is present and its value is 2. If the value
is less than 2, the value is invalid, and the server uses the default value of 60 days.
(You can also use ADSIEDIT to change this attribute.)
7 Note
After you wait two days for the tombstoned objects to be removed, you may
have to wait an additional 60 minutes or longer before you restart the domain
controller and continue the garbage collection process.
9. Initiate garbage collection on the source domain controller. Locate and click the
following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Diagnostics key
10. To verify that the object has been deleted, run the following command:
Console
If you receive a message: no such object, the object has already been successfully
deleted, and you can now successfully run the Active Directory Installation Wizard.
If the object has not yet undergone the garbage collection process, there should
be metadata for the isDeleted attribute. The time stamp that's associated with the
isDeleted attribute is the deletion time. Verify that the deletion time is set for at
least two days ago, for example:
Console
11. When this issue is resolved, reset the diagnostics logging levels to 0 and set the
tombstone lifetime back to what it was previously, or remove the value altogether
to prompt the computer to use the default values. The TombstoneLifetime setting
is critical in defining the useful life of system state and Active Directory backups.
When TombstoneLifetime is set to 2, backup tapes that are older than two days are
unusable. Any domain controller that has been down for two or more days must
be either restored from backup or reinstalled.
The following text is an example of the events that are reported in the directory service
event log on the source and destination server:
Event Type: Information Event Source: NTDS Replication Event Category: Replication
Event ID: 1240 Date: MM/DD/YY Time: HH:MM:SS AM|PM User: S-1-5-21-
1151542997-2719369742-1698538726-500 Computer: computer_source
Description: Property 0 (objectClass) of object CN="NTDS Settings DEL:51c6913c-
9221-4ac4-8513-9155dd7e15ad",CN="ZA9902000 DEL:37eabd48-bc98-483f-b2fd-
9c8869e9c3ce",CN=Servers,CN=Bull,CN=Sites,CN=Configuration,DC=mma,DC=fr
(GUID 51c6913c-9221-4ac4-8513-9155dd7e15ad) is being sent to DSA 6abec3d1-
3054-41c8-a362-5a0c5b7d5d71.
Event Type: Warning Event Source: NTDS General Event Category: Internal
Processing Event ID: 1173 Date: MM/DD/YY Time: HH:MM:SS AM|PM User: S-1-5-
21-1151542997-2719369742-1698538726-500 Computer: computer_source
Description: Internal event: Exception e0010002 has occurred with parameters 8442
and 20a0 (Internal ID 11003a1).
The following text is reported in the Active Directory Installation Wizard log on the
computer that is being promoted. In this sample Dcpromo.log file, the computer that is
being promoted, \\computer_promoted, is encountering the "internal error" in the
Active Directory Installation Wizard when it's sourcing from \\computer_source. Note
the error 8442 that occurs while one of three naming contexts is being replicated ("The
replication system encountered an internal error"). This example shows that the error
occurs on the configuration naming context:
Feedback
Was this page helpful? Yes No
This article helps fix the error (The wizard cannot gain access to the list of domains in
the forest) that occurs when you use Dcpromo.exe to move a Windows Server into an
existing domain.
Symptoms
When you attempt to use Dcpromo.exe to move a Windows 2000-based, or a Windows
Server 2003-based server into an existing domain, the following error message may be
displayed:
The wizard cannot gain access to the list of domains in the forest. The error is:
The specified domain either does not exist or could not be contacted. If you are using
Windows Server 2008, the error message may resemble the following: Active Directory
Installation Wizard
The wizard cannot access the list of domains in the forest. The error is:
Cause
This problem can occur if the server that is running the Domain Name System (DNS)
service has not registered an "A" record for itself in DNS.
The SRV records for the domain controllers must be in the DNS database. If the "A"
record for the DNS server is missing, the process does not succeed.
Resolution
You can add the "A" record to DNS by issuing the following command at the DNS
server:
ipconfig /registerdns After verifying that an "A" record is present for the DNS server, you
may receive the following error message when you attempt to continue the
Dcpromo.exe process:
The wizard cannot gain access to the list of domain in the forest. The error is:
To resolve this problem, type the following command on the server on which you try to
use Dcpromo.exe. This command clears the DNS resolver cache on the computer that is
running Dcpromo.exe so that it re-creates the query after the "A" record for the DNS
server is registered in the DNS database.ipconfig /flushdns
This problem can also occur during the Dcpromo.exe process if the existing domain
controller that is authenticating this process does not have file and printer sharing
enabled on its network adapter. To resolve this issue, enable file and printer sharing on
the existing domain controller until the Dcpromo.exe process is complete.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue that occurs after you install Active
Directory Domain Services on a new full or read-only Windows Server 2008-based
domain controller.
) Important
This article contains information about how to modify the registry. Make sure that
you back up the registry before you modify it. Make sure that you know how to
restore the registry if a problem occurs. For more information about how to back
up, restore, and modify the registry, see How to back up and restore the registry
in Windows .
Symptoms
After you install Active Directory Domain Services on a new full or read-only Windows
Server 2008-based domain controller in an existing domain, the SYSVOL share is
present. However, the NETLOGON share is not present on the new domain controller.
7 Note
This article does not apply if both NETLOGON and SYSVOL shares are missing.
Cause
This problem occurs when the Netlogon service reads the SysvolReady Flag in the
registry very quickly. Then, the Netlogon service tries to share out the
\Windows\SYSVOL\domain\scripts folder before the NT File Replication Service (NTFRS)
creates this folder.
Workaround
7 Note
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall the operating system. Microsoft cannot guarantee that these problems can
be solved. Modify the registry at your own risk.
To work around this issue, set the SysvolReady Flag registry value to 0 and then back to
1 in the registry. To do this, follow these steps:
1. Click Start, click Run, type regedit, and then click OK.
3. In the details pane, right-click the SysvolReady flag, and then click Modify.
5. Again in the details pane, right-click the SysvolReady flag, and then click Modify.
7 Note
This will cause Netlogon to share out SYSVOL, and the scripts folder will be present.
More information
The problem that is described in the Symptoms section occurs in the following scenario:
2. NTFRS then moves and renames files from the location that is mentioned in step 1
to the following folder:
\Windows\SYSVOL\domain
3. However, if the Netlogon service reads the SysvolReady Flag entry in the registry
very quickly, the Netlogon service tries to share out the
\Windows\SYSVOL\domain\scripts folder before NTFRS creates this folder.
Therefore, the NETLOGON share is not created.
Feedback
Was this page helpful? Yes No
This article describes an issue where a newly promoted domain controller fails to
advertise after completion of DCpromo.
Symptoms
A newly promoted domain controller may fail to advertise after completion of DCpromo
and reboot. This issue is specific to domain controllers participating in domains at
functional level where Sysvol is replicated by Distributed Files System Replication (DFSR).
Cause
There's a name resolution or network connectivity issue.
Resolution
To resolve this problem, choose one of the following options:
1. Resolve any possible name resolution or network connectivity issue that would
prevent communication with the defined "Parent Computer"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DFSR\Parameters\SysVols\S
eeding SysVols\contoso.com
More information
DFSR is a Multi master replication engine used to replicate files and folders for
Distributed files system (DFS) structures and optionally the Domain System Volume in
functional level domains. Domain controllers using DFSR for sysvol will initially
synchronize their Sysvol content after the DCpromo wizard has synchronized Active
Directory and the computer is rebooted.
A replica domain controller will attempt to source its sysvol content from the same
server that it used to source it domain-naming context from during the Active Directory
promotion by reading the "Parent Computer" registry key under:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DFSR\Parameters\SysVols\Seedin
g SysVols\domain.com
7 Note
If the Server defined by the "Parent Computer" becomes unavailable after the reboot,
initial synchronization of the sysvol content will be delayed until action to correct the
server's availability on the network has been restored.
Source: DFSR
Level: Error
Description:
Source: DFSR
Level: Error
Description:
The DFS Replication service initialized SYSVOL at local path
C:\Windows\SYSVOL\domain and is waiting to perform initial replication. The
replicated folder will remain in the initial synchronization state until it has replicated
with its partner WIN-C0T0SC8MCEF.contoso.com . If the server was in the process of
being promoted to a domain controller, the domain controller will not advertise and
function as a domain controller until this issue is resolved. This can occur if the
specified partner is also in the initial synchronization state, or if sharing violations
are encountered on this server or the sync partner. If this event occurred during the
migration of SYSVOL from File Replication service (FRS) to DFS Replication, changes
will not replicate out until this issue is resolved. This can cause the SYSVOL folder on
this server to become out of sync with other domain controllers.
Source: DFSR
Level: Error
Description:
Source: DFSR
Level: Error
Description:
The DFS Replication service failed to communicate with partner DC1 for replication
group Domain System Volume. This error can occur if the host is unreachable, or if
the DFS Replication service is not running on the server. The service will retry the
connection periodically.
Additional Information:
Source: DFSR
Level: Warning
Description:
Additional Information:
References:
DCpromo
How to back up and restore the registry in Windows
Disclaimer
Microsoft and/or its suppliers make no representations or warranties about the
suitability, reliability, or accuracy of the information contained in the documents and
related graphics published on this website (the "materials") for any purpose. The
materials may include technical inaccuracies or typographical errors and may be revised
at any time without notice.
To the maximum extent permitted by applicable law, Microsoft and/or its suppliers
disclaim and exclude all representations, warranties, and conditions whether express,
implied, or statutory, including but not limited to representations, warranties, or
conditions of title, non-infringement, satisfactory condition or quality, merchantability
and fitness for a particular purpose, with respect to the materials.
Feedback
Was this page helpful? Yes No
This article describes the requirements that you need to fulfill to issue a domain
controller certificate from a third-party certification authority (CA).
Summary
For more information about the requirements for a Windows Server 2008 R2 domain
controller certificate from a third-party CA, see Updated requirements for a Windows
Server 2008 R2 domain controller certificate from a 3rd party CA .
Support
Currently, Microsoft supports the use of third-party domain controller certificates
with smart card sign-in only.
Currently, Microsoft doesn't support the use of certificates from third-party CAs to
support SMTP (Simple Mail Transfer Protocol) replication between domain
controllers.
Third-party CAs don't support the automatic enrollment and renewal of domain
controller or computer certificates.
Requirements
You can manually issue a certificate to a domain controller. The certificate for the
domain controller must meet the following specific format requirements:
Optionally, the certificate Subject section should contain the directory path of
the server object (the distinguished name), for example:
CN=server1.northwindtraders.com OU=Domain Controllers
DC=northwwindtraders DC=com
The certificate Key Usage section must contain:
Digital Signature, Key Encipherment
The certificate Subject Alternative Name section must contain the Domain
Name System (DNS) name. If SMTP replication is used, the certificate Subject
Alternative Name section must also contain the globally unique identifier (GUID)
of the domain controller object in the directory. For example:
Other Name: 1.3.6.1.4.1.311.25.1 = ac 4b 29 06 aa d6 5d 4f a9 9c 4c bc b0 6a 65
d9 DNS Name=server1.northwindtraders.com
The certificate template must have an extension that has the basic metabolic
panel (BMP) data value DomainController.
7 Note
You must use the Schannel cryptographic service provider (CSP) to generate
the key.
The domain controller certificate must be installed in the local computer's
certificate store.
Sample certificate
Console
X509 Certificate:
Version: 3
Serial Number: 61497f5e000000000006
Signature Algorithm:
Algorithm ObjectId: 1.2.840.113549.1.1.5 sha1RSA
Algorithm Parameters:
05 00 ..
Issuer:
CN=TestCA
DC=northwindtraders
DC=com
Subject:
CN=TEST-DC1
OU=Domain Controllers
DC=northwindtraders
DC=com
URL=ldap:///CN=TestCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Confi
guration,DC=northwindtraders,DC=com?cACertificate?base?
objectClass=certificationAuthority
Signature Algorithm:
Algorithm ObjectId: 1.2.840.113549.1.1.5 sha1RSA
Algorithm Parameters:
05 00
Feedback
Was this page helpful? Yes No
This article provides the resolution of fixing the error "schema mismatch", when you try
to run the Active Directory Installation Wizard (Dcpromo.exe).
Symptoms
When you run the Active Directory Installation Wizard (Dcpromo.exe) on a computer
that is running one of the editions of Microsoft Windows that is listed in the "Applies to"
section, you may receive a "schema mismatch" error message.
If you are running Microsoft Windows Server 2003, you may receive the following error
message:
Active Directory could not replicate the directory partition DN path for partition
from the remote domain controller fully qualified computer name of the source
domain controller. The replication operation failed because of a schema mismatch
between the servers involved.
If you are running Microsoft Windows 2000, you may receive the following error
message:
The Directory Service failed to replicate the partition partition name from remote
server remote server name. The replication operation failed because of a schema
mismatch between the servers involved.
Cause
This problem may occur if one of the following conditions is true:
Condition 1: The source domain controller's copy of the Active Directory directory
service contains duplicate multi-valued attributes.
Condition 2: One or more attributes or pages in the database of the source domain
controller are corrupted.
Condition 3: The source domain controller has attributes in its database that are
not covered by the current schema because of schema deletion.
Resolution
To resolve this problem, use one of the following two methods. Method 1 addresses
Condition 1 and Condition 2. Method 2 addresses Condition 3.
To troubleshoot and to resolve this problem, follow the steps in this six-part procedure.
Turn on diagnostic logging on the source domain controller. To do this, follow these
steps.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
1. Click Start, click Run, type regedit, and then click OK.
3. In the Name column in the right pane, right-click the 5 Replication Events registry
entry, and then click Modify.
7 Internal Configuration
8 Directory Access
9 Internal Processing
24 DS Schema
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ntds\Diagnostics
8. In the Save in box, open the administrator's Desktop folder on the computer
where you are receiving the "schema mismatch" error message. In the File name
box, type Ntds_logging, and then click OK.
7 Note
a. Log on to the computer where you are receiving the "schema mismatch" error
message.
b. Click Start, click Run, type command, and then click OK.
The output line that begins with "SystemDrive=" shows you the drive letter that
your system uses.
Increase HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ntds\Diagnostics
logging on all possible source domain controllers by using steps 1 through 5 in the
"Part 1: Turn on diagnostic logging" section.
Stop the Net Logon service on all possible source domain controllers except the
source domain controller that is referenced in the "schema mismatch" error where
logging was increased. To do this, follow these steps:
1. Click Start, point to Programs, point to Administrative Tools, and then click
Services.
2. Right-click Net Logon, and then click Stop.
3. Create an unattended Active Directory Installation Wizard answer file.
Run the Active Directory Installation Wizard on the destination computer that is
reporting the "schema mismatch" error with NTDS diagnostic logging enabled. The
exact time that NTDS diagnostic logging occurs depends on whether the computer
that is being promoted is running Windows 2000 or Windows Server 2003.
The Active Directory Installation Wizard affects the following Windows registry
keys:
Helper domain controllers that are running Windows 2000 or Windows Server
2003 preserve log settings in the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ntds\Diagnostics
registry subkey until the Active Directory Installation Wizard demotes these
domain controllers.
Windows 2000-based computers that are being promoted overwrite the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ntds\Diagnostics
registry subkey for each attempt to promote the Windows 2000-based domain
controller.
Windows Server 2003-based computers do not overwrite pre-existing values in
the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ntds\Diagnostics
registry subkey. However, existing settings are deleted after each failed
promotion attempt.
Pre-populate the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ntds\Diagnostics subkey on
destination domain controllers that are running Windows 2000 or Windows Server 2003.
To do this, follow these steps:
1. On the source domain controller, follow steps 1 through 5 in the "Part 1: Turn on
diagnostic logging" section.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ntds\Diagnostics
3. In the Save in box, open the administrator's Desktop folder on the computer that
is being promoted. In the File name box, type Ntds_logging, and then click OK.
7 Note
1. Examine the directory service event logs on both the source domain controller and
the destination domain controller to find the problem object.
2. On the source domain controller, review the directory service event log and note
the last object and attribute that were outbound replicated to the domain
controller that is being promoted. The problem object is either the last object or
attribute that is referenced in the directory service event log or the object in the
same partition with the next highest Update Sequence Number (USN). Record the
domain name path of the object that is referenced and the last attribute that was
replicated. On the source domain controller, look for the last event 1240. On the
destination domain controller, look for event 1203.
3. Use the ldifde command to export the object that is referenced. To do this:
a. Click Start, click Run, type command, and then click OK.
b. Type the following, and then press ENTER: LDIFDE -f MISMATCH -d <domain name
path of object referenced in event log of the source domain controller>
4. Examine the ldifde output in Notepad or another text editor. Pay particular
attention to attributes that have duplicate values. For example, the following
truncated example contains attributes with duplicate values:
1. Examine the source domain controller's directory services event log for the last
1240 event that was logged. This event may be logged just before Internal
Processing Event 1173. Note the DN path of the object that is referenced in the
last 1240 event, and then run the Repadmin.exe tool on the console of the source
domain controller. To do this, follow these steps:
a. Click Start, click Run, type command, and then click OK.
b. Type the following command, and then press ENTER:
Console
2. View the metadata of the last outbound-replicated object that was replicated from
the source domain controller. If no duplicate values are found, examine the source
domain controller's directory services event log for the last 1240 event that was
logged before a 1173 event. The following is a sample 1240 event.
3. Run the repadmin /showmeta command against the domain name path of the
object that is referenced in the last 1240 event that was logged on the source
domain controller. For example, using the sample event in step 2 for a domain
controller in the CORP.COM domain, the syntax would be the following:
Console
REPADMIN /SHOWMETA CN=Secret,CN=Schema,CN=Configuration,DC=CORP,DC=COM
Look for inconsistent or suspicious values in the output, especially in the Local USN
and the Originating time columns. For example, in the following truncated output
example, two attributes, defaultObjectCategory and ObjectClass, have what
appears to be USN numbers and 0 date and time stamps that are not valid.
4. If the problem object that is referenced in the output is not a critical object, make a
ldifde backup of the object, and then delete the object. Do not delete problem
objects that reside in the schema partition of Active Directory.
5. Run an NTDSUTIL files integrity check against the Active Directory database. To do
this:
a. Windows 2000 uses setpwd to change the DSRM passwords. Windows Server
2003 uses ntdsutil to change the DSRM passwords.
7 Note
Clients that try to access the DFS Root information or the DFS Link
information may receive an "access denied" error message during an
attempt to connect while the domain controller is in DSREPAIR mode. This
behavior is by design.
c. Run NTDSUTIL files integrity check from the Windows command prompt.
a. If other candidate domain controllers exist to source the new domain controller
in the forest, run the Active Directory Installation Wizard with the problem
source domain controller offline.
c. Restore the system state for that domain controller if the all following
conditions are true:
The original source domain controller is the only domain controller in its
domain.
It contains critical system state (that is, it contains the forest root domain,
or there is a significant investment in objects in its copy of Active
Directory).
A valid system state backup exists (that is, the backup is less than
tombstonelifetime days old and it contains no corrupted objects).
7 Note
d. If the original source domain controller is the only domain controller in its
domain and if it contains critical system state but no valid system state backups
exist, consider doing the following:
After you have finished troubleshooting and resolving the problem, turn off diagnostic
logging. To do this, go to "Part 1: Turn on diagnostic logging," and follow steps 1
through 5. Set the following registry entries to 0 (zero).
5 Replication Events
7 Internal Configuration
8 Directory Access
9 Internal Processing
24 DS Schema
1. Identify the object that has the attributes that are not in the schema. To do this,
consider the following:
If you are running Windows 2000, the 1039 event is logged on the source
domain controller with the DN of the object that was affected.
If you are running any other operating system, enable replication events at
level five (5) on the source. During outbound replication, the object and the
attribute that are being shipped will be logged. When the error occurs, look
for the next object that would be shipped to the destination computer.
2. After you identify the object that has the extra attributes, do any one or more of
the following:
Delete the object. The offending attributes will be stripped, and the
tombstone will be shipped for replication.
Edit the object to remove the attributes in question.
Re-add the schema entries that were removed.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the Windows Server 2008 R2 or newer
domain controller only returns 5000 values for an LDAP response.
Symptoms
An LDAP application may return less information when a query is sent to a Windows
Server 2008 or Windows Server 2008 R2 domain controller than when sent to a
Windows Server 2003 domain controller. The query results may appear truncated or
incomplete. In some occasions, you may not get any results. For example, if an LDAP
application queries the members of a group, the Windows Server 2008 R2 or Windows
Server 2008 domain controller only returns 5000 members, while the Windows Server
2003 domain controllers return many more members. In both cases, you may realize the
same extended LDAP policy setting in NTDSUTIL required for the LDAP application. For
more information about viewing the LDAP policy settings, click the following article
number to view the article in the Microsoft Knowledge Base:
315071 How to view and set LDAP policy in Active Directory by using Ntdsutil.exe
Sample output:
Policy Current(New)
MaxPoolThreads 4
MaxDatagramRecv 4096
MaxReceiveBuffer 10485760
InitRecvTimeout 120
MaxConnections 5000
MaxConnIdleTime 900
MaxPageSize 50000
MaxQueryDuration 120
MaxTempTableSize 10000
MaxResultSetSize 262144
MinResultSets 0
MaxResultSetsPerConn 0
MaxNotificationPerConn 5
MaxValRange 25000
7 Note
On both domain controllers, the setting MaxPageSize is set to 50000 (default 1000)
and MaxValRange to 25000 (default 1500).
Cause
Internal LDAP limitations have been introduced in Windows Server 2008 R2 and
Windows Server 2008 to prevent overloading the domain controller. These limits
overwrite the LDAP policy setting when the policy value should be higher.
ノ Expand table
MaxReceiveBuffer 20971520
MaxPageSize 20000
MaxQueryDuration 1200
MaxTempTableSize 100000
MaxValRange 5000
Therefore the effective setting for the above LDAP policy is MaxPageSize=50000 and
MaxValRange=25000 on a Windows Server 2003 domain controller as configured in the
LDAP policy but on a Windows Server 2008 R2 or Windows Server 2008 domain
controller the hardcoded limits dictate MaxPageSize=20000 and MaxValRange=5000.
MaxValRange affects the number of attributes returned for a query. If you perform an
LDAP query for the multi-valued attribute Member for a group object with more than
5000 members the Windows Server 2008 R2 or Windows Server 2008 domain controller
will only return 5000 of them.
Resolution
The new maximum limits introduced with Windows Server 2008 R2 and Windows Server
2008 try to enforce the message that applications should adopt to the policies AD wants
to enforce. You should adapt your LDAP application accordingly. For the MaxValRange
limitation you may consider the following MSDN information and samples for using
ranged queries: Range Retrieval of Attribute Values
https://msdn.microsoft.com/library/cc223242(PROT.10).aspx
The following code example uses ranging to retrieve the members of a group using the
IDirectoryObject interface: Example Code for Ranging with IDirectoryObject
https://msdn.microsoft.com/library/aa705923(VS.85).aspx
The following code example uses ranging to retrieve the members of a group using the
IDirectorySearch interface: Example Code for Ranging with IDirectorySearch
https://msdn.microsoft.com/library/aa705924(VS.85).aspx
For MaxPageSize it is recommended to used paged queries, outlined on MSDN as
follows: Paging Search Results
https://msdn.microsoft.com/library/aa367011(VS.85).aspx
ldap_create_page_control Function
https://msdn.microsoft.com/library/aa366547(VS.85).aspx
There is a way to override these limitations, but we encourage to discuss the
requirements with Microsoft customer technical support to decide if modifying the
policies is the correct approach.
More information
For more information about LDAP policies, visit LDAP Policies
https://msdn.microsoft.com/library/cc223376(PROT.10).aspx
Feedback
Was this page helpful? Yes No
This article provides common resolutions to the issue where domain controller is not
functioning correctly.
Symptoms
When you run the Dcdiag tool on a Microsoft Windows 2000-Server based domain
controller or on a Windows Server 2003-based domain controller, you may receive the
following error message:
DC Diagnosis
Performing initial setup:
[DC1] LDAP bind failed with error 31
When you run the REPADMIN /SHOWREPS utility locally on a domain controller, you may
receive one of the following error messages:
Last attempt @ yyyy-mm-dd hh:mm.ss failed, result 1753: There are no more
endpoints available from the endpoint mapper.
If you use Active Directory Sites and Services to trigger replication, you may receive a
message that indicates that access is denied.
When you try to use network resources from the console of an affected domain
controller, including Universal Naming Convention (UNC) resources or mapped network
drives, you may receive the following error message:
Microsoft Outlook clients that are connected to Microsoft Exchange Server computers
that are using affected domain controllers for authentication may be prompted for
logon credentials, even though there is successful logon authentication from other
domain controllers.
The following event may be logged in the system event log of the affected domain
controller:
Output
For more information about configuring DNS for Active Directory directory service, click
the following article numbers to view the articles in the Microsoft Knowledge Base:
254680 DNS namespace planning
1. Modify the Gpttmpl.inf file for the Default Domain Controllers Policy. By default,
the Default Domain Controllers Policy is where user rights are defined for a domain
controller. By default, the Gpttmpl.inf file for the Default Domain Controllers Policy
is located in the following folder.
7 Note
Sysvol may be in a different location, but the path for the Gpttmpl.inf file will
be the same.
C:\WINDOWS\Sysvol\Sysvol\<Domainname>\Policies\{6AC1786C-016F-11D2-
945F-00C04fB984F9}\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf
C:\WINNT\Sysvol\Sysvol\<Domainname>\Policies\{6AC1786C-016F-11D2-945F-
00C04fB984F9}\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf
2. To the right of the SeNetworkLogonRight entry, add the security identifiers for
Administrators, for Authenticated Users, and for Everyone. See the following
examples.
SeNetworkLogonRight = *S-1-5-32-554,*S-1-5-9,*S-1-5-32-544,*S-1-1-0
SeNetworkLogonRight = *S-1-5-11,*S-1-5-32-544,*S-1-1-0
7 Note
Administrators (S-1-5-32-544), Authenticated Users (S-1-5-11), Everyone (S-1-
1-0), and Enterprise Controllers (S-1-5-9) use well-known security identifiers
that are the same in every domain.
SeDenyNetworkLogonRight =
7 Note
The example is the same for Windows 2000 Server and for Windows Server
2003.
7 Note
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
2. Use the Netdom tool from the Windows 2000 Server Support Tools or from the
Windows Server 2003 Support Tools to reset the domain controller's machine
account password:
Console
Console
4. Start the Kerberos Key Distribution Center service, and then set the startup setting
to Automatic.
For more information about this issue, click the following article numbers to view the
articles in the Microsoft Knowledge Base:
323542 You cannot start the Active Directory Users and Computers tool because the
server is not operational
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where LDAP queries perform slowly on a
Windows Server computer that uses an AD LDS or an ADAM directory service.
Symptoms
On a Windows Server computer that uses an Active Directory Lightweight Directory
Services (AD LDS) or Active Directory Application Mode (AD/AM) directory service,
certain applications do not perform at expected performance levels.
When you enable field engineering (debug) logging to trace an LDAP query, the
following event log shows that the LDAP query is an inefficient query.
7 Note
The attributes that are used in this event are only examples.
Additionally, you experience high CPU utilization and a slow response time. If the
database is considerably bigger than physical memory available to the directory server,
you may also see increased disk IO while the processing such a query.
When you inspect the attributes in the search filter, you find that they all have indexes
that are defined. And if attributes do not have indexes that are defined, and you add the
indexes through a schema change, the problem persists or does not improves much.
Cause
When you create a network trace of the LDAP query, you notice that it is a paged query.
The LDAP server can only use one index while processing a paged query. This is because
the LDAP implementation for paged searches does not create an expensive context for
the query and thus only uses one index for a paged query.
Workaround
To work around this problem, you can send the query without using the paged query
control. This allows the LDAP server to optimize for more complex filters.
7 Note
By default, paged queries are enabled for some LDAP client libraries. Therefore, you
may have to write additional code in your application to enable and disable paged
queries as appropriate for your specific situation.
Status
Microsoft has confirmed that this is a problem.
References
How to configure Active Directory and LDS diagnostic event logging
Feedback
Was this page helpful? Yes No
This article solves the high Lsass.exe CPU usage on Active Directory Domain Controllers.
Symptoms
This problem may be seen in the following ways:
A System Center Advisor alert has been triggered. It calls out that the Lsass.exe
process is using a consistently large percentage of the CPU's capabilities (CPU
utilization counter).
A domain controller is responding slowly, or isn't responding at all to client service
requests for authentication or directory lookups.
Active Directory domain clients consistently or frequently stop requesting service
from a domain controller. Instead, they locate a different domain controller to gain
services from.
Performance monitoring using Perfmon.msc or Task Manager reveals that the
Lsass.exe process is using a consistently large percentage of the CPU's capabilities
(Process Object, % Processor Time counter).
Cause
This problem can be caused by many different single, or combined issues. Nearly each
cause and resolution for these issues are unique. In Windows Server 2008 and later, the
following tool is available to help determine the problem cause:
Resolution
To fix this issue, run the Performance Monitor's Active Directory Data Collector Set on
the domain controller while the problem is occurring. This tool uses performance
counters and tracing to monitor the issue. Then it compiles a report that shows details
of potential problems. These problems need to be investigated as possible causes.
After the report has compiled, go to Diagnostics > Reliability and Performance >
Reports > System > Active Directory Diagnostics. View the report or reports that have
been completed.
The report contains eight broad categories under Diagnostic Results that will contain
information and conclusions in the report. It won't always tell the exact cause of the
problem. But you can use it to determine where to investigate to find the exact cause.
When facing high CPU usage by Lsass.exe, check the Diagnostic Results portion of the
report. It shows general performance concerns. Also examine the Active Directory
category. It details what actions the domain controller is busy doing at that time. For
example, what LDAP queries are affecting performance.
Domain controllers are often most effected by remote queries from computers in the
environment asking expensive queries. Or they are subject to a higher volume of
queries. The Network portion of the report is useful to determine the remote clients that
are communicating most with the domain controller while the diagnostic was gathering
data.
More information
Local Security Authority Subsystem Service (Lsass.exe) is the process on an Active
Directory domain controller. It's responsible for providing Active Directory database
lookups, authentication, and replication.
For more information about how to troubleshoot high CPU usage of the Lsass.exe
process on an Active Directory domain controller, see Son of SPA: AD Data Collector
Sets in Win2008 and beyond.
Feedback
Was this page helpful? Yes No
This article describes how to configure Active Directory (AD) replication and Netlogon
remote procedure calls (RPCs) request backlog values in Windows Server.
Transmission Control Protocol (TCP) resets occur frequently, but a network trace
analysis doesn't provide the root cause.
Microsoft Exchange servers receive 401 errors intermittently when authenticating
to domain controllers.
Exchange servers fail to connect to domain controllers and report "The server is
unavailable."
Microsoft Outlook repeatedly prompts for user credentials when authenticating to
a domain controller.
You receive this error message when you sign in:
"The trust relationship between this workstation and the primary domain
failed."
Event ID 3210
Output
Output
This may lead to authentication problems. Make sure that this computer
is connected to the network. If the problem persists, please contact
your domain administrator.
Event ID 7
Output
The Netlogon service starts successfully with the given RPC backlog size.
Output
Output
Output
Additional Data
TCP Port:
<Configured Port>
User Action:
Make sure the same TCP port is not being used by other services such as
Netlogon and the Active Directory Domain Controller has been rebooted
after configuring the backlog limit value in registry.
) Important
This section contains instructions to modify the registry. Serious problems might
occur if the registry is modified incorrectly. As a precaution, back up the registry
before you modify it. For more information about how to back up, restore, and
modify the registry, see How to back up and restore the registry in Windows .
You can use Registry Editor to increase the RPC backlog limit values for DRSUAPI and
the Netlogon service as follows:
7 Note
Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
Restart the Netlogon service for the setting to take effect. You may also need to
restart the domain controller.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Transmission Control Protocol (TCP)
sessions created to the server ports 88, 464, 389 and 3268 are reset. Sessions using
Secure Sockets Layer (SSL) or Transport Layer Security (TLS) on ports 636 and 3269 are
also affected.
You may also notice requests on User Datagram Protocol (UDP) ports 88 and 464 don't
get a response.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 2012
Original KB number: 2000061
You're running the Windows Server roles Active Directory Domain Services (AD DS) or
Active Directory Lightweight Directory Services (AD LDS). Sporadically, you experience a
situation where TCP sessions created to the server ports 88, 464, 389 and 3268 are reset.
Sessions using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) on ports 636
and 3269 are also affected.
In a trace of the network traffic, you can see the frame with the TCP RESET (or RST) is
sent by the server almost immediately after the session is established using the TCP
three-way handshake. The client might be able to send some request data before the
RESET is sent, but this request isn't responded to nor is the data acknowledged.
In the case of UDP, you can see requests on ports 88 and 464 don't get a response.
The KDC registry entry NewConnectionTimeout controls the idle time, using a default of
10 seconds. However, based on the implementation of the scavenging, the effective
interval is 0-30 seconds. Therefore newly created sessions may be disconnected
immediately by the server sporadically.
Reset NewConnectionTimeout
For the KDC ports, many clients, including the Windows Kerberos client, will perform a
retry and then get a full timer tick to work on the session. LDAP applications have a
higher chance of considering the connection reset a fatal failure.
7 Note
The Microsoft Kerberos client uses TCP Kerberos authentication by default since
Windows Vista. Therefore, this issue likely occurs only with third-party products
that use UDP for Kerberos requests.
The KDC has a built-in protection against request loops and blocks Kerberos
authentication requests on source ports 88/UDP and 464/UDP. However, the
implementation has a bug in byte ordering, so source ports 22528/UDP and 53249/UDP
are blocked.
You have to exclude 22528/UDP and 53249/UDP from the ephemeral port range of UDP
on the client.
Feedback
Was this page helpful? Yes No
Provide product feedback
Domain Controller delayed response to
LDAP or Kerberos requests
Article • 02/19/2024
This article provides help to solve performance issues (such as logon delays and Outlook
hangs) that occur after you upgrade your Domain Controllers (DCs).
Symptoms
After upgrading your DCs, you may be affected by this issue. Possible symptoms are
logon delays, Outlook, and other application hangs, increasing Exchange queue.
A more obvious indicator is Event Warning Netlogon 5807 on the slow responding DC
with a high number of clients, like the following:
Description: During the past 4.23 hours, there have been 123450 connections to this
Domain Controller from client machines whose IP addresses don't map to any of the
existing sites in the enterprise. Those clients, therefore, have undefined sites and
may connect to any Domain Controller including those that are in far distant
locations from the clients. A client's site is determined by the mapping of its subnet
to one of the existing sites. To move the above clients to one of the sites, consider
creating subnet object(s) covering the above IP addresses with mapping to one of
the existing sites. The names and IP addresses of the clients in question have been
logged on this computer in the following log file
'%SystemRoot%\debug\netlogon.log' and, potentially, in the log file
'%SystemRoot%\debug\netlogon.bak' created if the former log becomes full. The
log(s) may contain additional unrelated debugging information. To filter out the
needed information, search for lines that contain text'NO_CLIENT_SITE:'. The first
word after this string is the client name and the second word is the client IP address.
The maximum size of the log(s) is controlled by the following registry DWORD value
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\LogFil
eMaxSize ; the default is 20000000 bytes. The current maximum size is 20,000,000
bytes. To set a different maximum size, create the above registry value and set the
desired maximum size in bytes.
Cause
For site-unmapped Client IPs, a DC performs name resolution, because since Vista and
the introduction of IPv6 a client may have multiple IPs. The IP address the client uses
during the LDAP UDP Netlogon ping to contact the DC may not be the only one
available. If the DC has no subnet configured for this IP, it tries finding a different one
having a mapping and would return the according Sitename to the client.
The typical setup when stepping into this issue is a Client- with a trusting Resource
Forest, where the Client IP Segments have no Subnet/Site match in the Resource Forest.
The Resource Forest DCs may log Event Warning Netlogon 5807 with a high number of
clients.
Resolution
There was an update released that allows turning off this DNS lookup:
increase MaxPoolThreads to 10 (counts per core) Ref. 315071 How to view and set
LDAP policy in Active Directory by using Ntdsutil.exe
Feedback
Was this page helpful? Yes No
This article describes a script that helps analyze Active Directory event ID 1644 in Windows Server.
Review the steps to use the script and then analyze your problems.
Event1644Reader.ps1 is a Windows PowerShell script that extracts data from 1644 events that are
hosted in saved Directory Service event logs. Then, it imports that data into a series of pivot tables
in a Microsoft Excel spreadsheet to help administrators gain insights about the LDAP workloads
that are being serviced by the domain controllers and clients that are generating those queries.
7 Note
The script is attached on the blog post with file name Event1644Reader.zip
1. Make sure that the domain controllers that you are troubleshooting capture enhanced **
1644 event metadata.
7 Note
Windows Server 2012 R2 added enhanced 1644 event logging by recording the
duration of LDAP queries and other metadata. The enhanced 1644 event logging was
backported to Windows Server 2012, Windows Server 2008 R2, and Windows Server
2008 by hotfix 2800945 .
7 Note
Setting field engineering log verbosity to 5 will cause other events to be logged in the
directory service event log. Reset field engineering back to its default value of 0 when
you are not actively collecting 1644 events. (This action does not require a restart.)
3. If the following registry entries exist, change the values to the desired threshold in
milliseconds. If a particular registry entry does not exist, create a new entry with that name,
and then set its value to the desired threshold in milliseconds.
ノ Expand table
When the Field Engineering logging level is enabled and the Search Time
Threshold (msecs) registry entry is not used or is set to 0, the default value of the
time threshold is 30,000 milliseconds. (This action does not require a restart.)
One strategy would be to set the registry value for both the Inefficient Search
Results Threshold and Expensive Search Results Threshold registry settings, and
then focus on events that are identified by Search Time hold (msecs). Start with a
larger value like 100 milliseconds and then incrementally decrease the value as you
optimize the queries that are occurring in your environment.
Event1644Reader.ps1 can parse events from multiple domain controllers.
Configure the field engineering, search time, expensive, and inefficient registry key
settings on all domain controllers on which you want to review LDAP searches.
4. Download the Event1644Reader.ps1 file from You can obtain the script from the Core
Infrastructure and Security Blog post How to find expensive, inefficient and long running
LDAP queries in Active Directory to the computer that will analyze saved Active Directory
Service EVTX files that contain 1644 events.
This computer should have Microsoft Excel 2010 or a later version installed and should have
sufficient disk space to host the directory service event logs that the script will parse.
5. Copy saved Directory Service event logs that contain 1644 events from the domain
controllers where you enabled 1644 event logging to the 1644 analysis computer.
6. In Windows Explorer, right-click the Event1644Reader.ps1 file, and then select Run with
PowerShell.
9. When you see the prompt as the following screenshot, take the following actions:
Press Enter to parse all EVTX files that are located in the same directory as the
Enent1644Reader.ps1 file.
Type the drive:\path path that contains the EVTX files to be parsed.
7 Note
Event1644Reader.ps1 parses 1644 events in all up-level directory service event logs that
are located in the targeted path every time that the script runs.
10. Open the worksheet to review data and walk through the series of tabs, and then save the
Excel spreadsheet as required. For more information about the tabs in the worksheet, see the
Walkthrough of the Excel spreadsheet created by 1644Reder.ps1 section.
7 Note
*.csv files that are built by the tool are not automatically removed. Consider purging
*.csv files after your investigation is complete.
More information
The following table summarizes the data that is contained in each tab:
ノ Expand table
Tab Description
RawData Each data field that is captured by event ID 1644 is imported into discrete columns.
Data Filtering is auto-enabled so that you can sort or filter on any column header. If
1644 event logs from multiple domain controllers resided in the same directory as the
PowerShell script or the admin-specified directory, use filters to view LDAP queries that
are targeting specific domain controllers.
Top_StartingNode Provides a sorted list of the directory partitions that are targeted by LDAP queries in a
given sample. If most of the queries are occurring in a single partition (schema,
configuration, or domain), consider adding that partition as a filter in the remaining
Tab Description
pivot tables. Drillthrough detail exposes the top filters (such as the LDAP query), the
client IPs that issued those queries, and the date and time stamps for those queries.
Top_Callers Lists client IP addresses that issued LDAP queries in descending search count order
with percentage of grand total. Percentage of running total helps you identify top
callers. (That is, the top 10 or 20 callers may be generating 80 percent of the query
volume, assuming that too many calls are your problem). Drillthrough detail exposes
filters and date and time steps that each client-issued LDAP queries in a given sample.
Top_Filters Lists most frequently issued LDAP queries in descending volume order. This includes
average search time. Drillthrough detail exposes the LDAP client's IP address and the
date and time when each query was submitted.
TotalSearchTime by Lists client IP addresses in descending order of total search time across all LDAP
Callers queries in the sample. Drillthrough detail identifies the LDAP queries and the date and
time when each query was issued.
TotalSearchTime by Lists LDAP queries in descending order of total search time. Drillthrough detail exposes
Filters the LDAP client's IP address and the date and time when each matching query was
submitted.
Search time ranks Displays the number of LDAP queries that occurred in time-based quartiles. Slower
queries are bad. Faster queries are good if they aren't issued too often. Microsoft
Exchange wants LDAP queries that are issued by Exchange servers to be resolved in 50
milliseconds or less. So, the first quartile group focuses on that time "bucket."
Blank Pivot This is a blank pivot table that you can change as required to show the specific data
for your scenario.
Scenario analysis
If LDAP queries are slow, or if CPU usage is high on domain controllers, this may be caused by
excessively issued queries, inefficient queries, some combination of these queries, Asynchronous
Thread Queue (ATQ) pool exhaustion, or lots of change notifications.
If clients issue expensive, inefficient, or lots of LDAP queries, use Event1644Reader.ps1 to collect
data on the domain controllers to identify the IP addresses of the clients. Then, map such queries
to the process ID, the process name, or the calling application on the client computers.
The following table lists the possible optimizations for this issue.
ノ Expand table
Optimization/mitigation Synopsis
Stop the excessive workload. If lots or LDAP queries cause service stops, focus on top calling
clients, and work to identify and eliminate the source of the
excessive workload.
Install an updated LDAP query Windows Server 2012 R2 contains an updated LDAP query
optimizer. optimizer that improves performance for most queries. Subsets of
the Windows Server 2012 R2 are backported to Windows Server
2008 R2 and Windows Server 2012 in hotfix 2862304 .
Make sure that clients are submitting Sending LDAP queries across the WAN introduces network latency
queries to site-optimal domain into the delivery of the LDAP query to the domain controller and its
controllers. reply to the client. Make sure that Active Directory sites and subnet
definitions exist for client and server computers in Active Directory.
Work with software developers to Even efficiently issued queries can beat down an appropriately
reduce the frequency at which queries sized and configured domain controller if queries are issued too
are issued. This includes the use of often.
caching. Applications may have to throttle their query volume or cache
query results to reduce network, LDAP, and CPU load.
Optimize the LDAP query to execute Query syntax may have to be restructured to execute more quickly.
more quickly. Moving query elements to the left or right within the filter can
improve performance.
Adding a double "not" may improve query performance.
Consider reducing the number of objects that are visited by
starting queries lower in the tree.
Reduce the number of attributes that are being returned by
queries.
Add indexes to Active Directory Adding indexes can improve query performance. This has the side
attributes as required. effect of increasing database size and may temporarily delay Active
Directory replication during index build.
Determine whether a code defect exists Defects in the LDAP query optimizer and other components can
in the query optimizer and other reduce throughput.
components.
Known issue
The values in the Excel spreadsheet are not displayed or rendered appropriately on computers
that use non-English languages.
For example, this occurs on a computer when the Get-Culture Windows PowerShell cmdlet
indicates the regional setting as follows:
PowerShell
PS C:\Windows\System32\WindowsPowerShell\v1.0> Get-Culture
LCID Name DisplayName
---- ---- -----------
1031 de-DE German (Germany)
PS C:\Windows\System32\WindowsPowerShell\v1.0> Get-UICulture
In this situation, numbers in the Excel spreadsheet are rendered as in the following screenshot:
To resolve this issue, change the Decimal symbol to a period (.) in the Region settings item in
Control Panel.
For more information about LDAP queries, see the following blog: How to find expensive,
inefficient, and long running LDAP queries in Active Directory
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Active Directory installation fails with
an error: Creating the NTDS Settings object for this Active Directory Domain Controller
on the remote AD DC.
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019
Original KB number: 2737935
Symptoms
After you start Active Directory installation in Windows Server by using Server Manager
or the AddsDeployment Windows PowerShell module, the installation stalls at the stage at
which you receive the following message:
Creating the NTDS Settings object for this Active Directory Domain Controller on
the remote AD DC dc1-full.corp.contoso.com
Regardless of how long you wait, the installation never proceeds beyond this point.
Additionally, when you examine the Directory Services event logs, you see the following
repeated events:
Event 1
Event 2
directory service:
dc1-full.corp.contoso.com
Additional Data
Error value:
Could not find the domain controller for this domain. (1908)
Event 3
Domain controller:
dc1-full.corp.contoso.com
Additional Data
Error value:
1908 Could not find the domain controller for this domain.
Cause
This issue occurs for one or more of the following reasons:
The server's built-in Administrator account has the same password as the built-in
domain Administrator account.
The NetBIOS domain prefix or UPN was not provided as credentials for installation.
Instead, only the user name Administrator was provided.
Resolution
To resolve this issue, follow these steps:
More information
This is a code defect in Windows Server 2012 and late.
If you set different passwords on the two Administrator accounts but do not provide the
domain, you receive a bad password error.
We do not recommend that you use the built-in Administrator for domain
administration. Instead, we recommend that you create a new domain user for each
administrator in the environment. Then, the actions of administrators can be audited
individually.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where clients cannot join or log on to the
domain.
Symptoms
Consider the following scenario. A Microsoft Windows XP-based client computer is
joined to a Microsoft Windows Server 2003 domain. Additionally, Windows Server 2003
Service Pack 1 (SP1) is installed on the authenticating domain controller. In this scenario,
you experience the following symptoms:
When you start the IPSEC Services component on the domain controller, you may
receive an error message that is similar to the following:
Additionally, the following events may be logged in the server's System log:
Cause
This problem can occur if the IPSec\Policy\Local registry key is deleted or when there is
a corrupted file in the policy store. The file may become corrupted if an interruption
occurs when the policy is being written to the disk.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
1. Delete the local policy registry subkey. To do this, follow these steps:
a. Click Start, click Run, type regedit in the Open box, and then click OK.
b. In Registry Editor, locate and then click the following subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local
2. Rebuild a new local policy store. To do this, Click Start, click Run, type regsvr32
polstore.dll in the Open box, and then click OK.
3. Verify that the IPSEC Services component is set to automatic, and then restart the
domain controller.
Workaround
To temporarily work around this problem, disable the IPSEC Services component, and
then restart the domain controller.
Feedback
Was this page helpful? Yes No
This article describes how to the change the AD to allow more or fewer machine
accounts in the domain.
Summary
By default, Windows 2000 allows authenticated users to join 10 machine accounts to the
domain.
This default was implemented to prevent misuse. But an administrator can make a
change to an object in Active Directory to override it.
More information
To calculate the number of workstations currently owned by a user, check the ms-DS-
CreatorSID attribute of machine accounts.
To modify Active Directory to allow more (or fewer) machine accounts on the domain,
use the Adsiedit tool.
2 Warning
Using Adsiedit incorrectly can cause serious problems that may require you to
reinstall your operating system. Microsoft cannot guarantee that problems
resulting from the incorrect use of Adsiedit can be solved. Use Adsiedit at your own
risk.
1. Install the Windows Support tools if they haven't already been installed. It's
necessary only for Windows 2000 and Windows Server 2003. For Windows Server
2008 and Windows Server 2008 R2, Adsiedit is installed automatically when you
install the Active Directory Domain Services role.
2. Run Adsiedit.msc as an administrator of the domain. Expand the Domain NC node.
This node contains an object that begins with "DC=" and reflects the correct
domain name. Right-click this object, and then select Properties.
3. In the Select which properties to view box, select Both. In the Select a property to
view box, select ms-DS-MachineAccountQuota.
4. In the Edit Attribute box, type the number of workstations that you want users to
be able to maintain concurrently.
5. Select Set > OK.
Feedback
Was this page helpful? Yes No
This article describes the mechanism used by Windows to locate a domain controller in
a Windows-based domain.
7 Note
This article applies to Windows 2000. Support for Windows 2000 ends on July 13,
2010. The Windows 2000 End-of-Support Solution Center is a starting point for
planning your migration strategy from Windows 2000. For more information, see
the Microsoft Support Lifecycle Policy.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 247811
Summary
This article details the process of locating a domain by its DNS-style name and its flat-
style (NetBIOS) name. The flat-style name is used for backward compatibility. In all other
cases, DNS-style names should be used as a matter of policy. This article also addresses
troubleshooting the domain controller location process.
On the client (the computer that's locating the domain controller), the Locator is
started as a remote procedure call (RPC) to the local Netlogon service. The Locator
DsGetDcName application programming interface (API) call is implemented by the
Netlogon service.
The client collects the information that's needed to select a domain controller.
Then it passes the information to the Netlogon service by using the DsGetDcName
call.
The Netlogon service on the client uses the collected information to look up a
domain controller for the specified domain in one of two ways:
For a DNS name, Netlogon queries DNS by using the IP/DNS-compatible
Locator. That is, DsGetDcName calls the DnsQuery call to read the Service
Resource (SRV) records and "A" records from DNS after it appends the domain
name to the appropriate string that specifies the SRV records.
Output
_service._protocol.DnsDomainName
Active Directory servers offer the Lightweight Directory Access Protocol (LDAP)
service over the TCP protocol. So clients find an LDAP server by querying DNS
for a record of the form:
_ldap._tcp.DnsDomainName
For a NetBIOS name, Netlogon performs domain controller discovery by using the
Microsoft Windows NT version 4.0-compatible Locator. That is, by using the
transport-specific mechanism, such as WINS.
The Netlogon service sends a datagram to the computers that registered the
name. For NetBIOS domain names, the datagram is implemented as a mailslot
message. For DNS domain names, the datagram is implemented as an LDAP User
Datagram Protocol (UDP) search. (UDP is the connectionless datagram transport
protocol that is part of the TCP/IP protocol suite. TCP is a connection-oriented
transport protocol.)
Each available domain controller responds to the datagram to indicate that it's
currently operational and returns the information to DsGetDcName.
Each available domain controller responds to the datagram to indicate that it's
currently operational and returns the information to DsGetDcName.
The Netlogon service caches the domain controller information so that later
requests need not repeat the discovery process. Caching this information
encourages consistent use of the same domain controller and a consistent view of
Active Directory.
When a client logs on or joins the network, it must be able to locate a domain controller.
The client sends a DNS Lookup query to DNS to find domain controllers, preferably in
the client's own subnet. So clients find a domain controller by querying DNS for a record
of the form:
Output
_LDAP._TCP.dc._msdcs.domainname
After the client locates a domain controller, it establishes communication by using LDAP
to gain access to Active Directory. As part of that negotiation, the domain controller
identifies which site the client is in based on the IP subnet of that client.
If the client is communicating with a domain controller that isn't in the closest (most
optimal) site, the domain controller returns the name of the client's site. If the client has
already tried to find domain controllers in that site, the client uses the domain controller
that isn't optimal. For example, the client sends a DNS Lookup query to DNS to find
domain controllers in the client's subnet.
Otherwise, the client does a site-specific DNS lookup again with the new optimal site
name. The domain controller uses some of the directory service information for
identifying sites and subnets.
After the client locates a domain controller, the domain controller entry is cached. If the
domain controller isn't in the optimal site, the client flushes the cache after 15 minutes
and discards the cache entry. It then attempts to find an optimal domain controller in
the same site as the client.
After the client has established a communications path to the domain controller, it can
establish the logon and authentication credentials. And if necessary for Windows-based
computers, it can set up a secure channel. The client then is ready to perform normal
queries and search for information against the directory.
The client establishes an LDAP connection to a domain controller to log on. The logon
process uses Security Accounts Manager. The communications path uses the LDAP
interface and the client is authenticated by a domain controller. So the client account is
verified and passed through Security Accounts Manager to the directory service agent,
then to the database layer, and finally to the database in the Extensible Storage engine
(ESE).
Troubleshooting the domain locator process
To troubleshoot the domain locator process:
1. Check Event Viewer on both the client and the server. The event logs may contain
error messages indicating that there's a problem. To view Event Viewer, select
Start, point to Programs > Administrative Tools, and then select Event Viewer.
Check the System log on both the client and the server. Also check the Directory
Service logs on the server and DNS logs on the DNS server.
3. Use the Ping utility to verify network connectivity and name resolution. Ping both
the IP address and the server name. You may also want to ping the domain name.
4. Use the Netdiag tool to determine whether networking components are working
correctly. To send detailed output to a text file, use the following command:
netdiag /v >test.txt
Review the log file, looking for problems, and investigate any implicated
components. This file also contains other network configuration details.
5. To fix minor problems, use the Netdiag tool with the following syntax:
netdiag /fix .
7. Use the NSLookup tool to verify that DNS entries are correctly registered in DNS.
Verify that the server host records and GUID SRV records can be resolved.
8. If either of these commands doesn't succeed, use one of the following methods to
reregister records with DNS:
10. Use the Ldp.exe tool to connect and bind to the domain controller to verify
appropriate LDAP connectivity.
11. If you suspect that a particular domain controller has problems, it may be helpful
to turn on Netlogon debug logging. Use the NLTest utility by typing this command:
nltest /dbflag:0x2000ffff . The information is then logged in the Debug folder in
12. If you still haven't isolated the problem, use Network Monitor to monitor network
traffic between the client and the domain controller.
References
For more information, see the Windows Resource Kit, Chapter 10, "Active Directory
Diagnostic, Troubleshooting, and Recovery."
Feedback
Was this page helpful? Yes No
This article provides a resolution for an issue that prevents the Netlogon service on
domain controllers from starting automatically after you upgrade to Windows Server
2016 or Windows Server 2019.
Symptoms
Assume that you have one or more computers that are running Windows Server 2012 or
Windows Server 2012 R2 and configured as domain controllers or member servers in an
Active Directory domain. You decide to do an in-place upgrade on the domain
controllers to Windows Server 2016 or Windows Server 2019.
After you upgrade the domain controllers, you notice that one or more of the following
symptoms occur:
Additionally, you may receive the following event in the System log:
Cause
This issue occurs because the in-place upgrade process doesn't set the startup value for
the Netlogon service type to Automatic on the upgraded server. When the Netlogon
service isn't running, a domain controller doesn't advertise itself as a domain controller,
and all the other functionality and dependencies of the Netlogon service fail. Any service
that depends on Netlogon to be running also fails.
Resolution
This issue can be avoided by letting the setup process install the latest updates during
the in-place upgrade.
If the issue already occurs, to resolve this problem, change the Netlogon service Startup
type to Automatic. To do this, follow these steps:
1. Click Start, type services.msc in the Start Search box, and then click Services
Desktop app.
2. Locate and double-click Netlogon, and then click Automatic in the Startup type
box.
3. Click OK, and then start the Netlogon service.
Although this action doesn't require a restart, we recommend that you restart the
computer to make sure that all services that depend on Netlogon are started and
correctly registered on the Network.
References
Windows Time Service settings aren't preserved during an in-place upgrade to Windows
Server 2016 or Windows 10 Version 1607
Feedback
Was this page helpful? Yes No
This article describes the support boundaries for Active Directory over NAT.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 978772
Summary
Network Address Translation (NAT) is a selection of network techniques that alter the
address information of network traffic while in transit so as to remove details about the
originating network. This is most often done by network devices, and is intended to
enable the easy use of private network address schemes, and sometimes as a less than
ideal security measure.
If you are tasked with configuring a network with NAT and you plan to run any Microsoft
Server solution (including Active Directory) across the NAT, please contact Microsoft
customer technical support using your preferred approach or visit Microsoft Support .
Additionally, you can contact Microsoft Consulting Sevices.
There is no explicit or implied guarantee that following any provided guidance will work
in any given scenario because it is untested. The support teams will work on issues that
arise from using the provided guidance to the limits of commercially reasonable effort.
The only configuration with NAT that was tested by Microsoft is running client on the
private side of a NAT and have all servers located on the public side of the NAT. The NAT
would also function as a DNS server.
Feedback
Was this page helpful? Yes No
This article describes an issue that slows down the progress of offline folder file sync
operations by Microsoft Sync Center.
Summary
When Microsoft Sync Center syncs offline files, the sync operation may take longer than
expected. This behavior occurs when the back-end file server enumerates unsorted
directory contents (a list in which the file names are not sorted alphabetically). This
affects Microsoft Sync Center performance when it syncs offline files with non-Microsoft
file servers.
More information
Microsoft Sync Center compares the local system's directory list against a list of files that
it receives from the remote file server. Sync Center does this by making query directory
calls against the remote file server through the Server Message Block protocol (CIFS,
SMB, SMB2, and SMB3). Microsoft file servers always return query directory results in
alphabetical order, sorted by file name. (The underlying NTFS file system maintains
sorted lists.)
Many underlying file systems do not maintain sorted lists. This includes the file systems
that are used by most third-party SMB protocol implementers and Microsoft file systems
such as FAT32. Therefore, most third-party file servers exhibit performance delays when
they sync offline files by using Sync Center.
7 Note
The SMB protocol does not require query directory results to be sorted.
Just how significantly performance is affected depends on several factors, including the
number of files, the length of the file names (both properties affect the total size of the
file metadata), and how unsorted the results are. When there are lots of files (hundreds
or thousands) with large file names that are profoundly out of order, more directory
queries of the local file system and more remote directory queries on the remote file
server are required.
You can ease this problem by using smaller folders (either in terms of file count or file
name size). It also helps if you can increase the extent to which files are recorded in
sorted order on the underlying file system.
The scenario affects performance only. Offline file syncing otherwise occurs successfully
and correctly.
Feedback
Was this page helpful? Yes No
This article applies to Windows 2000. Support for Windows 2000 ends on July 13, 2010.
The Windows 2000 End-of-Support Solution Center is a starting point for planning your
migration strategy from Windows 2000. For more information, see the Microsoft
Support Lifecycle Policy.
Symptoms
When you attempt to join a Windows 2000-based computer to a Microsoft Windows NT
4.0-based domain, you may receive the following error message:
The following error occurred attempting to join the domain "domainname": The
account is not authorized to login from this station.
Cause
This behavior can occur because the Local Group Policy, specifically those in the
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options folder have a restrictive setting.
Resolution
To work around this behavior, set the values back to what they would be if a clean install
had occurred.
Examine the preceding policies and set them back to their default settings.
Restart your computer and you should be able to join the domain.
Status
This behavior is by design.
Feedback
Was this page helpful? Yes No
This article describes several common error messages that can occur when you join
client computers that are running Windows to a domain. This article also provides
troubleshooting suggestions for these errors.
Error 1
An attempt to resolve the DNS name of a DC in the domain being joined has failed.
Please verify this client is configured to reach a DNS server that can resolve DNS
names in the target domain.
Resolution
When you type the domain name, make sure that you type the Domain Name System
(DNS) name and not the Network Basic Input/Output System (NetBIOS) name. For
example, if the DNS name of the target domain is contoso.com , make sure that you
enter contoso.com instead of the NetBIOS domain name of "contoso."
Additionally, verify that the computer can reach a DNS server that hosts the DNS zone
of the target domain or can resolve DNS names in that domain. Make sure that the
correct DNS server is configured on this client as the preferred DNS, and that the client
has connectivity to that server. To verify this, you can run one of the following
commands:
Console
Console
Error 2
An attempt to resolve the DNS name of a domain controller in the domain being
joined has failed. Please verify this client is configured to reach a DNS server that
can resolve DNS names in the target Domain.
Resolution
When you type the domain name, make sure that you type the DNS name and not the
NetBIOS name.
Additionally, verify that the computer can reach a DNS server that hosts the DNS zone
of the target domain or can resolve DNS names in that domain. Make sure that the
correct DNS server is configured on this client as the preferred DNS, and that the client
has connectivity to that server. To verify this, you can run one of the following
commands:
Console
Console
Error 3
An operation was attempted on a nonexistent network connection.
Resolution
When you type the domain name, make sure that you type the DNS name and not the
NetBIOS name. Additionally, restart the computer before you try to join the computer to
the domain.
Error 4
Multiple connections to a server or shared resource by the same user, using more
than one user name, are not allowed. Disconnect all previous connections to the
server or shared resource and try again.
Resolution
Restart the computer that you are trying to join to the domain to make sure that there
are no latent connections to any of the domain servers.
When you type the domain name, make sure that you type the DNS name and not the
NetBIOS name.
Error 5
Network name cannot be found.
Resolution
Verify that the computer can reach a DNS server that hosts the DNS zone of the target
domain or can resolve DNS names in that domain. Make sure that the correct DNS
server has been configured on this client as the preferred DNS, and that the client has
connectivity to that server. To verify this, you can run one of the following commands:
Console
Console
When you type the domain name, make sure that you type the DNS name and not the
NetBIOS name.
Resolution
Before joining the computer to the domain, make sure that you have cleared all mapped
connections to any drives.
Restart the computer that you are trying to join to the domain to make sure that there
are no latent connections to any of the domain servers.
When you type the domain name, make sure that you type the DNS name and not the
NetBIOS name.
The error may be transient. Try again later. If the issue persists, verify the status of the
DC that the client is connecting to (active connections, network connectivity, and so on).
You may want to restart the DC if the issue persists.
Error 7
The format of the specified network name is invalid.
Resolution
Verify that the computer can reach a DNS server that hosts the DNS zone of the target
domain or can resolve DNS names in that domain. Make sure that the correct DNS
server has been configured on this client as the preferred DNS, and that the client has
connectivity to that server. To verify this, you can run one of the following commands:
Console
Console
When you type the domain name, make sure that you type the DNS name and not the
NetBIOS name. Make sure that you have the most up-to-date drivers installed for the
client computer's network adapter. Verify connectivity between the client that is being
joined and the target DC over the required ports and protocols. Disable the TCP
Chimney offload feature and IP offloading.
Error 8
The directory service has exhausted the pool of relative identifiers.
Resolution
Make sure that the DC that hosts the relative ID (RID) operations master is online and
functional. For more information, see Event ID 16650: The account-identifier allocator
failed to initialize in Windows Server.
7 Note
You can use the netdom query fsmo command to determine which DC has the RID
Master role.
Verify that Active Directory is replicating between all DCs. You can use the following
command to detect any errors:
Console
Error 9
The remote procedure call failed and did not execute.
Resolution
Make sure that you have the most up-to-date drivers installed for the client computer's
network adapter. Verify connectivity between the client that is being joined and the
target DC over the required ports and protocols. Disable the TCP Chimney offload
feature and IP offloading.
A network device (router, firewall, or VPN device) is blocking connectivity over the
ports and protocols that are used by the MSRPC protocol.
A network device (router, firewall, or VPN device) is rejecting network packets
between the client that is being joined and the DC.
7 Note
Error 10
Changing the Primary Domain DNS name of this computer to "" failed. The name
will remain ".".The specified server cannot perform the operation.
Resolution
This error occurs when you use the domain join UI to join a Windows 7 or Windows
Server 2008 R2 workgroup computer to an Active Directory domain by specifying the
target DNS domain. To fix this error, see 2018583 Windows 7 or Windows Server 2008
R2 domain join displays error "Changing the Primary Domain DNS name of this
computer to "" failed...." .
Error 1
You have exceeded the maximum number of computer accounts you are allowed to
create in this domain.
Resolution
Make sure that you have permissions to add computers to the domain, and that you
have not exceeded the quota that is defined by your Domain Administrator.
To join a computer to the domain, the user account must be granted Create computer
object permissions in Active Directory.
7 Note
By default, a non-administrator user can join a maximum of 10 computers to an
Active Directory domain.
Error 2
Logon failure: The target account name is incorrect.
Resolution
Check that the domain controllers (DCs) are registered by using correct IP addresses on
the DNS server, and that their Service Principal Names (SPNs) are registered correctly in
their Active Directory accounts.
Error 3
Logon failure: the user has not been granted the requested logon type at this
computer.
Resolution
Make sure that you have permissions to add computers to the domain. To join a
computer to the domain, the user account must be granted the Create computer object
permission in Active Directory.
Additionally, make sure that the specified user account is allowed to log on locally to the
client computer. To do this, configure the Allow log on locally setting in Group Policy
under Computer Configuration > Windows Settings > Security Settings > Local
Policies > User Rights Assignment.
Error 4
Logon failure: unknown user name or bad password.
Resolution
Make sure that you use the correct user name and password combination of an existing
Active Directory user account when you are prompted for credentials to add the
computer to the domain.
Error 5
No mapping between account names and security IDs was done.
Resolution
This error is likely a transient error that is logged when a domain join searches the target
domain to determine whether a matching computer account was already created or
whether the join operation has to dynamically create a computer account on the target
domain.
Error 6
Not enough storage is available to complete this operation.
Resolution
This error can occur when the Kerberos token size is larger than the maximum default
size. If this situation, you have to increase the Kerberos token size of the computer that
you try to join to the domain. For more information, see the following Knowledge Base
articles:
935744 "Not enough storage is available to complete this operation" error message
when you use a domain controller to join a computer to a domain
327825 Problems with Kerberos authentication when a user belongs to many groups
Error 7
The account is not authorized to login from this station.
Resolution
This problem is related to mismatched SMB Signing settings between the client
computer and the DC that is being contacted for the domain join operation. Review the
following documentation to further investigate the current and recommended values in
your environment:
281648 Error message: The account is not authorized to login from this station 823659
Client, service, and program issues can occur if you change security settings and user
rights assignments
Error 8
The account specified for this service is different from the account specified for
other services running in the same process.
Resolution
Make sure that the DC through which you are trying to join the domain has the
Windows Time service started.
Feedback
Was this page helpful? Yes No
This article provides a resolution for troubleshooting AD Replication error 1908: Could not
find the domain controller for this domain.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2712026
7 Note
Home users: This article is only intended for technical support agents and IT professionals.
If you're looking for help with a problem, please ask the Microsoft Community .
Symptoms
1. REPADMIN.exe reports that replication attempt has failed with status 1908.
REPADMIN commands that commonly cite the 1908 status include but are not limited
to:
REPADMIN /ADD
REPADMIN /REPLSUM *
REPADMIN /REHOST
REPADMIN /SHOWREPL
Console
Console
DC=ForestDnsZones,DC=Contoso,DC=com
HQ\Contoso-DC02 via RPC
DC object GUID:1b136427-14f0-448a-965c-9cbb61400fcd._msdcs.Contoso.com/
Last attempt @ <DATE> <TIME> failed, result 1908 (0x774):
Could not find the domain controller for this domain.
<# consecutive failure>
<Last Success>
2. NTDS KCC, NTDS Replication events with the 1908 status are logged in the directory
service event log.
Active Directory events that commonly cite the 1908 status include but are not
limited to:
ノ Expand table
NTDS KCC Knowledge 1926 Warning The attempt to establish a replication link
Consistency to a read-only directory partition with the
Checker following parameters failed.
NTDS KCC Knowledge 1925 Warning The attempt to establish a replication link
Consistency for the following writable directory
Checker partition failed.
NTDS Replication 1943 Error Active Directory was unable to remove all
Replication of the lingering objects on the local
domain controller. However, some
lingering objects might have been deleted
on this domain controller before this
operation stopped. All objects had their
existence verified on the following source
domain controller.
Additional Data
Error Value:
Could not find the domain controller for this domain. 1908
3. When trying to force replication in Active Directory Sites and Services console
(dssite.msc) via the "Replicate now" option, we may receive below error:
Dialog message text: The following error occurred during the attempt to
synchronize naming context <Naming Context> from Domain Controller
<Source-DC-Name> to Domain Controller <Destination-DC-Name>: Could not
find the domain controller for this domain.
Failure Message: Could not find the domain controller for this domain.
Buttons in Dialog: OK
Dialog message text: Active Directory could not create the NTDS Settings object for
this Domain Controller CN=NTDS Settings,CN=<DC_Name>,CN=Servers,CN=
<SiteName>,CN=Sites,CN=Configuration,<DomainDN> on the remove domain
controller <Remote_DC_FQDN>. Ensure the provided network credentials have
sufficient permissions.
Failure Message: Could not find the Domain Controller for this domain.
Buttons in Dialog: OK
[INFO] Error - Active Directory Domain Services could not create the NTDS Settings
object for this Active Directory Domain Controller CN=NTDS Settings,CN=CONTOSO-
DC02,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=Contoso,DC=com on the remote AD DC
contoso-dc01.Contoso.com . Ensure the provided network credentials have sufficient
permissions. (1908)
[INFO] NtdsInstall for Contoso.com returned 1908
[INFO] DsRolepInstallDs returned 1908
[ERROR] Failed to install to Directory Service (1908)
Cause
Error Code 1908 represents the error that displays as "Could not find the domain controller
for this domain." This error has two primary causes:
An important concept to understand for this scenario is that the KDC used for replication
operations may be:
a. The destination DC
b. The source DC
c. An entirely different DC (not the source or destination DC).
Resolution
1. Verify the Key Distribution Service is running on the Target Domain Controller
Discover the Kerberos Key Distribution Center you are contacting. It can be
discovered by using a packet capture program like Network Monitor 3.4 .
a. Use Network Monitor to capture the reproduced error message. (You may need to
stop the DNS client service first so that you see the DNS query traffic)
b. Review the packet capture for the DNS query for a KDC: Sample Address Queries:
_kerberos.tcp.<SiteName>._sites.dc._msdcs.<Domain>.com
_kerberos._tcp.dc._msdcs.<Domain>.com
ノ Expand table
paused): 24 (0x18)
d. Verify that 10.10.1.11's KDC and Netlogon services are running. On discovered
Domain Controller(10.0.1.11), verify the KDC and Netlogon service status with SC
Query
Example - Query the KDC service with: "SC Query KDC" and the Netlogon Service
with: "SC Query Netlogon" These commands should return "State: Running"
Console
Verify that the Domain Controller passes the Advertising and SYSVOLCHeck tests and
is advertising as a Key Distribution Center and SysVol is ready. If SysVol is not ready,
the server will not be able to advertise as a Domain Controller.
Starting Test: SysVolCheck * The File Replication Service SYSVOL ready test
File Replication Service's SYSVOL is ready
..<DC Name> passed test SysVolCheck
3. Verify that source computer and target computer are within 5 minutes of each other.
More information
This error is one of the featured exercises in the following TechNet hands-on lab: TechNet
hands-on lab: Troubleshooting Active Directory replication errors
In this lab, you will walk through the troubleshooting, analysis, and implementation phases
of commonly encountered Active Directory replication errors. You will use a combination of
ADREPLSTATUS, repadmin.exe, and other tools to troubleshoot a five DC, three-domain
environment. AD replication errors encountered in the lab include -2146893022, 1256,
1908, 8453 and 8606.
Feedback
Was this page helpful? Yes No
This guide provides the fundamental concepts used when troubleshooting Active
Directory domain join issues.
Troubleshooting checklist
Domain Name System (DNS): Anytime you have an issue joining a domain, one of
the first things to check is DNS. DNS is the heart of Active Directory and makes
things work correctly, including domain join. Make sure of the following items:
DNS server addresses are correct.
DNS suffix search order is correct if multiple DNS domains are in play.
There are no stale or duplicate DNS records referencing the same computer
account.
Reverse DNS doesn't point to a different name as the A record.
The domain name, domain controllers (DCs), and DNS servers can be pinged.
Check for DNS record conflicts for the specific server.
Network trace: During an AD domain join, multiple types of traffic occur between
the client and some DNS servers and then between the client and some DCs. If you
see an error in any of the above traffic, follow the corresponding troubleshooting
steps of that protocol or component to narrow it down. For more information, see
Using Netsh to Manage Traces.
Domain join hardening changes: Windows updates released on and after October
11, 2022, contain additional protections introduced by CVE-2022-38042 . These
protections intentionally prevent domain join operations from reusing an existing
computer account in the target domain unless one of the following conditions
exist:
The user attempting the operation is the creator of the existing account.
The computer was created by a member of domain administrators.
ノ Expand table
1024- TCP RPC RPC Endpoint Mapper for DSCrackNames, SAMR and
65535 Netlogon calls between Client and Domain Controller
Output
Verify that the user account performing the domain join operation (or the security
group that owns the member of the domain join user) has been granted the
Access this computer from the network right in the default domain controllers
policy.
The default domain controllers policy is linked to the OU that hosts the DC
computer account that's servicing the domain join operation.
The DC servicing the domain join operation applies the policy successfully,
specifically the user rights settings defined in the default domain controllers policy.
Output
The domain join graphical user interface (GUI) can call the NetJoinDomain API twice to
join a computer to a domain. The first call is made without the "create" flag being
specified to locate a pre-created computer account in the target domain. If no account
is found, a second NetJoinDomain API call may be made with the "create" flag specified.
In another scenario, the 0x534 error code is logged when you attempt to change the
password for a machine account. However, the account can't be found on the targeted
DC, likely because the account was not created or due to replication latency or a
replication failure.
The 0x534 error code is commonly logged as a transient error when domain join
searches the target domain. The search determines whether a matching computer
account was pre-created or the join operation needs to dynamically create a computer
account on the target domain. Check the bit flags in the join options to see if the type of
join being performed is relying on a pre-created or newly created computer account.
Output
This error occurs when a network device (router, firewall, or VPN device) rejects network
packets between the client being joined and the DC.
Verify the connectivity between the client being joined and the target DC over the
required ports and protocols.
Disable bind time feature negotiation.
Disable TCP Chimney Offload and IP offload.
Output
Error 0x6D9 is logged when network connectivity is blocked between the joining client
and the helper DC. The network connectivity services the domain join operation over
port 135 or a port in the ephemeral range between 1025 to 5000 or 49152 to 65535. For
more information, see Service overview and network port requirements for Windows.
Output
1. Verify that the computer being joined points to valid DNS server IP addresses.
Invalid examples include:
2. Verify that all DNS servers configured on the client host the required zones and
valid records for a DC in the target domain. Check for the following
misconfigurations:
4. Check for network problems on the workgroup computer, target DC, or the
network connecting the computer and the target DC:
A broken Network Interface Card (NIC) on the client computer or the target
DC
A broken network switch that drops network packets between the client and
target DC
Output
This error is logged when the client computer lacks network connectivity on TCP port 88
between the client machine and the DC. To troubleshoot this issue, you can run the
following command to test the connection:
PowerShell
Expected Output:
The output indicates that the Kerberos Port TCP 88 is open between the client and the
DC.
Note: This information is intended for a network administrator. If you are not your
network's administrator, notify the administrator that you received this information,
which has been recorded in the file C:\WINDOWS\debug\dcdiag.txt.
The following error occurred when DNS was queried for the service location (SRV)
resource record used to locate an Active Directory Domain Controller (AD DC) for
domain "<domain_name>":
The error was: "This operation returned because the timeout period expired." (error
code 0x000005B4 ERROR_TIMEOUT)
The DNS servers used by this computer for name resolution are not responding.
This computer is configured to use DNS servers with the following IP addresses:
<ip_address>
Verify that this computer is connected to the network, that these are the correct
DNS server IP addresses, and that at least one of the DNS servers is running.
Check the network connectivity between the client and the Domain controller.
Run nltest /dsgetdc (DC Discovery) to verify if you can discover a DC.
For example:
Console
Expected Output:
Run DCDiag /v on the closest domain controller and verify if SRV records are
registered. For example: _ldap._tcp.dc._msdcs.<domain_name>.com .
Note: This information is intended for a network administrator. If you are not your
network's administrator, notify the administrator that you received this information,
which has been recorded in the file C:\WINDOWS\debug\dcdiag.txt.
If you are certain that the name is not a NetBIOS domain name, then the following
information can help you troubleshoot your DNS configuration.
The following error occurred when DNS was queried for the service location (SRV)
resource record used to locate an Active Directory Domain Controller (AD DC) for
domain "<NetBIOS_name>":
<ip_address>
Output
When you enter the domain name, make sure you enter the DNS Domain Name rather
than the NetBIOS name. For example, if the DNS name of the domain is contoso.com,
make sure you enter that name instead of just contoso.
Output
mm/dd/yyyy hh:mm:ss:ms NetpLdapBind: ldap_bind failed on <dc_fqdn>: 81:
Server Down
mm/dd/yyyy hh:mm:ss:ms NetpJoinCreatePackagePart: status:0x3a.
mm/dd/yyyy hh:mm:ss:ms NetpJoinDomainOnDs: Function exits with status of:
0x3a
mm/dd/yyyy hh:mm:ss:ms NetpJoinDomainOnDs: status of disconnecting from '\\
<dc_fqdn>': 0x0
mm/dd/yyyy hh:mm:ss:ms NetpResetIDNEncoding: DnsDisableIdnEncoding(RESETALL)
on '<domain_name>' returned 0x0
mm/dd/yyyy hh:mm:ss:ms NetpJoinDomainOnDs: NetpResetIDNEncoding on
'<domain_name>': 0x0
mm/dd/yyyy hh:mm:ss:ms NetpDoDomainJoin: status: 0x3a
Error 0x3a is logged when the client computer lacks network connectivity on TCP port
389 between the client computer and the DC. To troubleshoot this issue, use the
following command to test the connection:
PowerShell
Expected Output:
It indicates that the LDAP Port TCP 389 is open between the client and the DC.
Your computer could not be joined to the domain. You have exceeded the maximum
number of computer accounts you are allowed to create in this domain. Contact
your system administrator to have this limit reset or increased.
Output
The user account trying to join the machine to the domain has exceeded the limit
of 10 machines joined to the domain.
There is a GPO restriction to block authenticated users from joining a machine to
the domain.
Verify that the user account is a member of the group mentioned in the Add
Workstations to domain policy of the Default Domain Controller Policy GPO or the
Winning GPO.
The GPO setting is located at Computer Configuration > Policies > Windows Settings
> Security Settings > Local Policies User Rights Assignment > Add workstations to
domain.
To verify the default limit to the number of workstations a user can join to the domain,
see Default limit to number of workstations a user can join to the domain.
Feedback
Was this page helpful? Yes No
This article helps fix an issue where users can't join a computer to an Active Directory
domain.
Symptoms
You try to join a Windows Server 2008 R2 or a Windows 7 machine to an Active
Directory domain using Computer Name/Domain Changes under System Properties.
The destination domain has either Windows 2000, Windows Server 2003, or Windows
Server 2008 domain controllers and may have Windows NT 4.0 domain controllers
present. When trying to join the Windows Server 2008 R2 machine to the domain by
specifying the fully qualified domain name (FQDN) in the domain join UI, the operation
fails and you receive the error:
An Active Directory Domain Controller (AD DC) for the domain <target DNS domain
name> couldn't be contacted
Ensure that the domain name is typed correctly
When trying to join the Windows Server 2008 R2 computer to the domain by specifying
the NetBIOS name in the domain join UI, you receive a different error:
The following error occurred attempting to join the domain <NetBIOS target
domain name>. The specified domain either does not exist or could not be
contacted.
<DateTime> -----------------------------------------------------------------
<DateTime> NetpDoDomainJoin
<DateTime> NetpMachineValidToJoin: 'CLIENT-NAME'
<DateTime> OS Version: 6.1
<DateTime> Build number: 7600 (7600.win7_rtm.090713-1255)
<DateTime> SKU: Windows Server 2008 R2 Enterprise
<DateTime> NetpDomainJoinLicensingCheck: ulLicenseValue=1, Status: 0x0
<DateTime> NetpGetLsaPrimaryDomain: status: 0x0
<DateTime> NetpMachineValidToJoin: status: 0x0
<DateTime> NetpJoinDomain
<DateTime> Machine: CLIENT-NAME
<DateTime> Domain: Domain_Name
<DateTime> MachineAccountOU: (NULL)
<DateTime> Account: Domain_Name\admx054085
<DateTime> Options: 0x27
<DateTime> NetpLoadParameters: loading registry parameters...
<DateTime> NetpLoadParameters: DNSNameResolutionRequired not found,
defaulting to '1' 0x2
<DateTime> NetpLoadParameters: DomainCompatibilityMode not found, defaulting
to '0' 0x2
<DateTime> NetpLoadParameters: status: 0x2
<DateTime> NetpValidateName: checking to see if 'Domain_Name' is valid as type 3
name
<DateTime> NetpValidateName: 'Domain_Name' is not a valid Dns domain name:
0x2554
<DateTime> NetpCheckDomainNameIsValid [ Exists ] for 'Domain_Name' returned
0x0
<DateTime> NetpValidateName: name 'Domain_Name' is valid for type 3
<DateTime> NetpDsGetDcName: trying to find DC in domain 'Domain_Name', flags:
0x40001010
<DateTime> NetpDsGetDcName: failed to find a DC in the specified domain:
0x54b, last error is 0x0
<DateTime> NetpJoinDomainOnDs: NetpDsGetDcName returned: 0x54b
<DateTime> NetpJoinDomainOnDs: Function exits with status of: 0x54b
<DateTime> NetpDoDomainJoin: status: 0x54b
Domain joins by Windows Server 2003 computers to the same target domain succeed
by specifying the NetBIOS domain name in the domain join UI. Domain joins using the
FQDN also fail.
You can also successfully join the same Windows Server 2008 R2 machine to a different
Active Directory domain in the same forest specifying the FQDN domain name.
Cause
The errors occur if NT4Emulator is set to 0x1 in the following registry subkey of the
helper domain controller used to join the target domain:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
Resolution
To resolve this issue either delete the NT4Emulator registry value on the Active
Directory domain controllers in the destination domain if Windows NT 4.0 domain
controllers are no longer present or can be retired. Otherwise, set the following registry
value on the Windows 7 or Windows Server 2008 R2 client before attempting to join the
domain:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
3. If it does not exist, create a new REG_DWORD value named
NeutralizeNT4Emulator, and set the value to 0x1.
This registry setting allows the Active Directory domain controllers with the
NT4Emulator setting to respond normally to the requesting client (avoiding Windows
NT 4.0 emulation mode).
More information
In the case of the join by FQDN, the joining client does not receive an adequate
response to the LDAP pings it sends to the domain controllers at the beginning of the
domain join process. The helper domain controller responds but the joining client
considers the response incomplete.
After receiving the same replies from all domain controllers located using DNS, it falls
back to performing a NetBIOS name query for the FQDN domain name to locate a
domain controller, however this gets no response and the join operation fails. If the
NetBIOS scenario the client sends a NetLogonSamRequest to all domain controllers it
receives from the WINS query for the domain name. However it receives no adequate
response and fails with the second error.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you use the domain join
User Interface (UI) to join a Windows 7 or Windows Server 2008 R2 workgroup
computer to an Active Directory domain by specifying the target DNS domain name.
Symptoms
Using the domain join UI to join a Windows 7 or Windows Server 2008 R2 workgroup
computer to an Active Directory domain by specifying the target DNS domain name
fails with the following on-screen error:
Changing the Primary Domain DNS name of this computer to "" failed. The name
will remain "<DNS domain>.<top level domain>".
The error was:
The NETSETUP.LOG on the computer being joined contains the following text:
ノ Expand table
The Extended errors that make the "Changing the Primary DNS name..." error unrelated
to this KB include:
ノ Expand table
Extended Error
Cause
When a computer is joined to the domain, it attempts to register a Service Principal
Name to ensure that its DNS suffix is allowed in the target domain. The domain join UI
queries information from the Local Security Authority (LSA) policy database for the short
(NetBIOS) and long (DNS) names of the target domain.
The error described in the Symptoms section occurs because a function in the domain
join UI improperly performs a LDAP bind to a Domain Controller in the target domain by
its short name, which fails in one of the following conditions:
The Disable NetBIOS over TCP/IP checkbox has been disabled in the IPv4
properties of the computer being joined.
Connectivity over UDP port 137 is blocked between client and the helper DC
servicing the join operation in the target domain.
The TCP/IPv4 protocol has been disabled so that the client being joined or the DC
in the destination domain targeted by the LDAP BIND is running TCP/IPv6 only.
Resolution
Despite the appearance of the on-screen error described in the Symptoms section, the
domain join operation completes as evidenced by the status in the NETSETUP.LOG.
1. Click Start, click Run, type ncpa.cpl, and then click OK.
2. In Network Connections, right-click Local Area Connection, and then click
Properties.
3. Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
4. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, click
Advanced.
5. On the WINS tab, verify Enable NetBIOS Over TCP/IP is enabled, and then
click OK three times.
Verify end-to-end network connectivity over UDP port 137 over the network path
connecting the client being and the helper DC serving the join operation.
If the error occurred in an IPv6 only environment or you require a fix to resolve the
error, open a support incident with Microsoft Customer Service and Support
requesting a post RTM fix for Windows 7/Windows Server 2008 R2.
1. Click Start, click Run, type ncpa.cpl, and then click OK.
2. In Network Connections, right-click Local Area Connection, and then click
Properties.
3. Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
4. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, click
Advanced.
5. On the DNS tab, select these DNS Suffixes, click Add, type the FQDN of the
domain in the DNS Server dialog box, click Add, and then click OK three
times.
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot the issue that a machine creates outbound
sessions at a high rate.
When this issue occurs, the Netlogon service tries to locate domain controllers (DCs) for
domain users and resources, and establish the trust path between the users and the
resource domains.
In some scenarios, the issue may affect the communication between application servers
(For example, Exchange servers), or the communication between application servers and
backend servers (For example, web, database, or reporting servers). If the level of
application activity crosses a threshold, the application servers will fail to have sessions
with each other or backend servers.
Output
[lsass.exe]
UDP 0.0.0.0:54335 *:* 908
In the Netlogon log file (netlogon.log), many entries that resemble the following are
recorded:
Output
Output
Eventually, the requests to locate DCs fail, and the following logs are recorded:
Output
You can check more requests to establish patterns to identify which domains are
affected the most, and whether all the requests fail in the netlogon.log file. To search a
pattern, use a command as follows:
Console
In a memory dump of the LSASS process, threads are waiting with stack as follows:
Output
# Call Site
00 ntdll!RtlLeaveCriticalSection+0x29
01 Wldap32!ReferenceLdapRequest+0x44
02 Wldap32!LdapGetResponseFromServer+0x207
03 Wldap32!LdapWaitForResponseFromServer+0x27a
04 Wldap32!ldap_result_with_error+0x293
05 Wldap32!ldap_result+0x74
06 netlogon!NetpDcGetPingResponse+0xec
07 netlogon!NetpDcPingListIp+0x1df
08 netlogon!NetpDcGetNameSiteIp+0xa3
09 netlogon!NetpDcGetNameIp+0x188
0a netlogon!NetpDcGetName+0x11bb
0b netlogon!DsIGetDcName+0x463
0c netlogon!DsrGetDcNameEx2+0x3a0
0d kerberos!KerbGetKdcBinding+0x8e8
0e kerberos!KerbMakeSocketCall+0x165
0f kerberos!KerbGetTgsTicketEx+0x9ee
10 kerberos!KerbGetTgsTicket+0x84
11 kerberos!KerbGetServiceTicketInternal+0x739
12 kerberos!KerbGetServiceTicket+0xca
13 kerberos!KerbILogonUserEx2+0x1b2f
14 kerberos!LsaApLogonUserEx2+0xa6
15 lsasrv!NegLogonUserEx2Worker+0x7c7
16 lsasrv!NegLogonUserEx2+0x673
17 lsasrv!LsapCallAuthPackageForLogon+0xd0
18 lsasrv!LsapAuApiDispatchLogonUser+0x4ab
19 lsasrv!SspiExLogonUser+0x20e
1a sspisrv!SspirLogonUser+0x1eb
1b rpcrt4!Invoke+0x65
7 Note
When a DC isn't responsive (for example, DCs are offline or blocked by a firewall), the
Netlogon service backs up a queue of threads waiting to resolve DCs.
2. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters .
ノ Expand table
TcpTimedWaitDelay 30
MaxUserPort 65000
StrictTimeWaitSeqCheck 1
Windows Server 2019 introduces a new registry entry that enables the Netlogon service
not to use a new socket for each DC discovery attempt. The entry named
DCLocatorLdapConnectionCacheEnabled is in the registry path
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters . The value
7 Note
Feedback
Was this page helpful? Yes No
This article describes how to enable Lightweight Directory Access Protocol (LDAP) over
Secure Sockets Layer (SSL) with a third-party certification authority.
Summary
The LDAP is used to read from and write to Active Directory. By default, LDAP traffic is
transmitted unsecured. You can make LDAP traffic confidential and secure by using
SSL/Transport Layer Security (TLS) technology. You can enable LDAP over SSL (LDAPS) by
installing a properly formatted certificate from either a Microsoft certification authority
(CA) or a non-Microsoft CA according to the guidelines in this article.
There's no user interface for configuring LDAPS. Installing a valid certificate on a domain
controller permits the LDAP service to listen for, and automatically accept, SSL
connections for both LDAP and global catalog traffic.
The LDAPS certificate is located in the Local Computer's Personal certificate store
(programmatically known as the computer's MY certificate store).
7 Note
A private key that matches the certificate is present in the Local Computer's store
and is correctly associated with the certificate. The private key must not have
strong private key protection enabled.
The Enhanced Key Usage extension includes the Server Authentication
(1.3.6.1.5.5.7.3.1) object identifier (also known as OID).
The Active Directory fully qualified domain name of the domain controller (for
example, dc01.contoso.com) must appear in one of the following places:
The Common Name (CN) in the Subject field.
DNS entry in the Subject Alternative Name extension.
The certificate was issued by a CA that the domain controller and the LDAPS clients
trust. Trust is established by configuring the clients and the server to trust the root
CA to which the issuing CA chains.
Use the Schannel cryptographic service provider (CSP) to generate the key.
To request a Server Authentication certificate that is suitable for LDAPS, follow these
steps:
1. Create the .inf file. Following is an example .inf file that can be used to create the
certificate request.
[Version]
Signature="$Windows NT$
[NewRequest]
[EnhancedKeyUsageExtension]
;-----------------------------------------------
Cut and paste the sample file into a new text file named Request.inf. Provide the
fully qualified DNS name of the domain controller in the request.
2. Create the request file by running the following command at the command
prompt:
Console
A new file called Request.req is created. It's the base64-encoded request file.
3. Submit the request to a CA. You can submit the request to a Microsoft CA or to a
third-party CA.
4. Retrieve the certificate that's issued, and then save the certificate as Certnew.cer in
the same folder as the request file by following these steps:
a. Create a new file called Certnew.cer.
b. Open the file in Notepad, paste the encoded certificate into the file, and then
save the file.
7 Note
The saved certificate must be encoded as base64. Some third-party CAs return
the issued certificate to the requestor as base64-encoded text in an e-mail
message.
5. Accept the issued certificate by running the following command at the command
prompt:
Console
6. Verify that the certificate is installed in the computer's Personal store by following
these steps:
a. Start Microsoft Management Console (MMC).
b. Add the Certificates snap-in that manages certificates on the local computer.
c. Expand Certificates (Local Computer), expand Personal, and then expand
Certificates. A new certificate should exist in the Personal store. In the
Certificate Properties dialog box, the intended purpose displayed is Server
Authentication. This certificate is issued to the computer's fully qualified host
name.
For more information about creating the certificate request, see the following Advanced
Certificate Enrollment and Management white paper. To view this white paper, see
Advanced Certificate Enrollment and Management.
3. Type the name of the domain controller to which you want to connect.
Possible issues
Start TLS extended request
Schannel, the Microsoft SSL provider, selects the first valid certificate that it finds in
the local computer store. If there are multiple valid certificates available in the local
computer store, Schannel may not select the correct certificate.
Improvements
The original recommendation in this article was to put certificates in the Local Machine's
Personal store. Although this option is supported, you can also put certificates in the
NTDS Service's Personal certificate store in Windows Server 2008 and in later versions of
Active Directory Domain Services (AD DS). For more information about how to add the
certificate to the NTDS service's Personal certificate store, see Event ID 1220 - LDAP over
SSL.
AD DS preferentially looks for certificates in this store over the Local Machine's store.
This makes it easier to configure AD DS to use the certificate that you want it to use. It's
because there might be multiple certificates in the Local Machines Personal store, and it
can be difficult to predict which one is selected.
AD DS detects when a new certificate is dropped into its certificate store and then
triggers an SSL certificate update without having to restart AD DS or restart the domain
controller.
A new rootDse operation that's named renewServerCertificate can be used to manually
trigger AD DS to update its SSL certificates without having to restart AD DS or restart
the domain controller. This attribute can be updated using adsiedit.msc, or by importing
the change in LDAP Directory Interchange Format (LDIF) using ldifde.exe. For more
information on using LDIF to update this attribute, see renewServerCertificate.
Finally, if a Windows Server 2008 or a later version domain controller finds multiple
certificates in its store, it will random chose one of these certificates.
All these work for Windows Server 2008 AD DS and for 2008 Active Directory
Lightweight Directory Services (AD LDS). For AD LDS, put certificates into the Personal
certificate store for the service that corresponds to the AD LDS instance instead of for
the NTDS service.
Feedback
Was this page helpful? Yes No
The Windows updates KB5014668 and KB5014665 add support for Transport Layer
Security (TLS) 1.3 when using LDAP over SSL or issuing the StartTLS command. The
updates were released on 6/21/2022.
You may need to disable the TLS 1.3 support for compatibility reasons. This article
introduces how to disable or re-enable the TLS 1.3 support.
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Restart the Active Directory Domain Services service for the setting to be effective.
Feedback
Was this page helpful? Yes No
This article describes how to enable LDAP signing in Windows Server 2022, Windows
Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows 10, and
Windows 11.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 11 - all editions, Windows 10 - all editions
Original KB number: 935834
Summary
You can significantly improve the security of a directory server by configuring the server
to reject Simple Authentication and Security Layer (SASL) LDAP binds that do not
request signing (integrity verification), or to reject LDAP simple binds that are performed
on a clear text (non-SSL/TLS-encrypted) connection. SASL binds may include protocols
such as Negotiate, Kerberos, NTLM, and Digest.
If you must have more information to identify such clients, you can configure the
directory server to provide more detailed logs. This additional logging will log an Event
ID 2889 when a client tries to make an unsigned LDAP bind. The log entry displays the IP
address of the client and the identity that the client tried to use to authenticate. You can
enable this additional logging by setting the 16 LDAP Interface Events diagnostic
setting to 2 (Basic). For more information about how to change the diagnostic settings,
see How to configure Active Directory and LDS diagnostic event logging .
If the directory server is configured to reject unsigned SASL LDAP binds or LDAP simple
binds over a non-SSL/TLS connection, the directory server logs a summary Event ID
2888 one time every 24 hours when such bind attempts occur.
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
By default, for Active Directory Lightweight Directory Services (AD LDS), the registry key
is not available. Therefore, you must create a LDAPServerIntegrity registry entry of the
REG_DWORD type under the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<InstanceName>\Parameters
7 Note
The placeholder <InstanceName> represents the name of the AD LDS instance that
you want to change.
0: Signing is disabled.
2: Signing is enabled.
When you change this value, the new value takes effect immediately. You don't have to
restart the computer.
2. Select Start > Run, type ldp.exe, and then select OK.
4. In Server and in Port, type the server name and the non-SSL/TLS port of your
directory server, and then select OK.
7 Note
For an Active Directory Domain Controller, the applicable port is 389.
7. Type the user name and password, and then select OK.
If you receive the following error message, you have successfully configured your
directory server:
Event ID 2886
After starting DS services, Event ID 2886 is logged to remind administrators to enable
signing requirements:
Output
Some clients may currently be relying on unsigned SASL binds or LDAP simple
binds over a non-SSL/TLS connection, and will stop working if this
configuration change is made. To assist in identifying these clients, if
such binds occur this directory server will log a summary event once every
24 hours indicating how many such binds occurred. You are encouraged to
configure those clients to not use such binds. Once no such events are
observed for an extended period, it is recommended that you configure the
server to reject such binds.
For more details and information on how to make this configuration change to
the server, please see http://go.microsoft.com/fwlink/?LinkID=87923.
You can enable additional logging to log an event each time a client makes
such a bind, including information on which client made the bind. To do so,
please raise the setting for the "LDAP Interface Events" event logging
category to level 2 or higher.
Event ID 2887
When a problem client is detected but permitted, a summary event (Event ID 2887) of
the past 24 hours is logged:
Output
This directory server is not currently configured to reject such binds. The
security of this directory server can be significantly enhanced by
configuring the server to reject such binds. For more details and
information on how to make this configuration change to the server, please
see http://go.microsoft.com/fwlink/?LinkID=87923.
Summary information on the number of these binds received within the past 24
hours is below.
You can enable additional logging to log an event each time a client makes
such a bind, including information on which client made the bind. To do so,
please raise the setting for the "LDAP Interface Events" event logging
category to level 2 or higher.
Event ID 2888
When a problem client is rejected, a summary event (Event ID 2888) of the past 24 hours
is logged:
Output
Summary information on the number of such binds received within the past 24
hours is below.
You can enable additional logging to log an event each time a client makes
such a bind, including information on which client made the bind. To do so,
please raise the setting for the "LDAP Interface Events" event logging
category to level 2 or higher.
Number of simple binds rejected because they were performed without SSL/TLS:
<count of binds>
Number of Negotiate/Kerberos/NTLM/Digest binds rejected because they were
performed without signing: <count of binds>
Event ID 2889
When a problem client tries to connect, Event ID 2889 is logged:
Output
References
ADV190023: Microsoft Guidance for Enabling LDAP Channel Binding and LDAP
Signing
2020 LDAP channel binding and LDAP signing requirement for Windows
2020, 2023, and 2024 LDAP channel binding and LDAP signing requirements for
Windows (KB4520412)
How to configure Active Directory and LDS diagnostic event logging
Feedback
Was this page helpful? Yes No
This article describes how to turn on debug logging of the LDAP client (Wldap32.dll).
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Window 10 - all editions
Original KB number: 325616
Summary
In Windows Vista and newer versions of Windows, you can use Event Tracing for
Windows (ETW) to trace LDAP client activity, including encrypted (TLS or SASL) activity.
More information
To turn on LDAP client tracing, follow these steps:
<ProcessName>
7 Note
In this subkey, <ProcessName> is the full name of the process that you want
to trace, including its extension. For example: "ldp.exe." Inside this subkey, you
can place an optional entry that is named "PID" and that has a DWORD value.
If you set the value to a process ID, only the instance of the application that
has this process ID will be traced.
) Important
If you don't have such a registry subkey for at least one process, the trace file
will not contain data.
7 Note
In this command, "0x1a59afa3" is a trace flag. Such flags control what information
gets recorded, and the verbosity of data. You can use individual flags or combine
bit values to specify multiple flags simultaneously. For common tracing scenarios,
the following flag combinations are useful:
0x1A59AFA3. Log settings that should get the information that you
require most of the time.
0x18180380. Get information specifically on connection establishment
problems.
0x1bddbf73. Verbose session information.
For information about the available flags, see the "Values for trace flags"
section of "Using ETW to troubleshoot LDAP connections."
Console
To view the trace as text, use the netsh tool to decode the ETL file as a .txt file, as
follows:
Console
For more information about netsh trace convert , see the netsh trace convert help. To
do this, enter netsh trace convert /? at the command prompt.
Feedback
Was this page helpful? Yes No
This article provides some approaches to avoid the problem that LDAP Paged Queries
with subordinate referrals are not chased properly.
Symptoms
You have an application that searches the Active Directory with paged searches using
ldap_search_ext or ldap_search_ext_s, and it is set to chase referrals. When it searches off
the root of a domain NC, the paged searches end prematurely after the first page.
In the application, the paged cookie it receives is empty and thus the application ends
the query. In a network trace, you can verify that the paged query does return a non-
empty cookie along with one or more referrals. Most queries will see no result set when
chasing the referral, as often the objects searched for in the domain NC do not exist in
the subordinate NCs, unless they are also domain NCs.
The application may also receive an "operational error" after the first page.
A Domain Controller returns subordinate referrals for the following naming contexts:
1. When Searching the Forest root: Configuration NC (followed by a referral for the
Schema NC)
2. When Searching the Forest root: ForestDnsZones NC
3. DomainDnsZones NC
4. All child domains. And recursively all grand-child domains down the whole domain
tree.
Cause
There are multiple problems when chasing referrals during a paged query:
1. When chasing naming contexts that are located on the same server (see 1., and
maybe 2. and 3. above), the chasing is happening on the same LDAP session,
wiping the paged cookie returned in the primary query in the client LDAP runtime.
2. When the last referral chased also exceeds the page size, the referral cookie
received from the last NC chased is used to continue the primary search. This
causes the LDAP search to fail with an "operational error" as the cookie does not fit
the server knowledge about the index and index position of the search.
3. When the primary search is done using a simple bind without SSL, the chasing of
the referrals fails with "operational error", because the LDAP client is designed to
not send the clear-text credentials when chasing referrals.
Resolution
There is currently no resolution for the problem.
You can use the following approaches in your application to avoid the problems:
1. Use a base DN that avoids that the server returns subordinate referrals, for
example, search an OU under the domain root object.
2. Search the Global Catalog instead of the forest root domain NC. You need to
ensure all attributes you want are present in the GC, and that you really want the
whole forest instead of the domain tree you searched previously.
3. If you don't want the referrals to be chased automatically: As referrals are chased
by default, use ldap_set_option with flag LDAP_OPT_REFERRALS to turn off referral
chasing. You can always chase the referrals manually after completing the primary
query.
4. Use the control LDAP_SERVER_DOMAIN_SCOPE_OID when searching, it turns off
continuation referrals when searching domain roots.
Feedback
Was this page helpful? Yes No
This article provides workarounds for the issue when you run an LDAP query against a
domain controller, you obtain a partial attribute list.
Symptoms
When you run a Lightweight Directory Access Protocol (LDAP) request against a
Windows Server 2008-based domain controller, you obtain a partial attribute list.
However, if you run the same LDAP query against a Windows Server 2003-based domain
controller, you obtain a full attribute list in the response.
7 Note
You can run this query from the domain controller or from a client computer that is
running Windows Vista or Windows Server 2008.
The user account that you use to run the LDAP query has the following properties:
Cause
This issue occurs because the Admin Approval Mode (AAM) feature is enabled for the
user account in Windows Vista and in Windows Server 2008. It is also known as "User
Account Control" (UAC). For local resource access, the security system has a loopback
code so it uses the active Access Token from the interactive logon session for the LDAP
session and the access checks during the LDAP query processing.
For more information about the AAM feature, visit the following Microsoft TechNet Web
site: https://technet.microsoft.com/library/cc772207(WS.10).aspx
Workaround
To work around this issue, use one of the following methods.
Method 1
1. Use the Run as administrator option to open a Command Prompt window.
2. Run the LDAP query in the Command Prompt window.
Method 2
Specify the No prompt value for the following security setting:
User Account Control: Behavior of the elevation prompt for administrators in Admin
Approval Mode
For more information about how to specify the value of this security setting, visit the
following Microsoft TechNet Web site:
https://technet.microsoft.com/library/cc772207(WS.10).aspx
Method 3
1. Create a new group in the domain.
2. Add the Domain Admins group to this new group.
3. Grant the Read permission on the domain partition to this new group. To do this,
follow these steps:
a. Click Start, click Run, type adsiedit.msc, and then click OK.
b. In the ADSI Edit window, right-click DC=<Name>,DC=com, and then click
Properties.
c. In the Properties window, click the Security tab.
d. On the Security tab, click Add.
e. Under Enter the object names to select, type the name of the new group, and
then click OK.
f. Make sure that the group is selected under Group or user names, click to select
Allow for the Read permission, and then click OK.
g. Close the ADSI Edit window.
4. Run the LDAP query again.
Status
This behavior is by design.
More information
By default, the AAM feature is disabled for the built-in administrator account in
Windows Vista and in Windows Server 2008. Additionally, the AAM feature is enabled
for other accounts that are members of the built-in Administrators group.
whoami /all
If the AAM feature is enabled for the user account, the output resembles the following.
USER INFORMATION
----------------
GROUP INFORMATION
-----------------
The "Domain Admins" group is shown as enabled group with "Mandatory group,
Enabled by default, Enabled group" in whoami /all, but really is disabled for Allow ACEs.
This is a known problem in Windows Server 2008 R2 and Windows Server 2012.
Based on this output, the user account that you used to run the LDAP query has the
AAM feature enabled. When you run the LDAP query, you use a filtered access token
instead of a full access token. Even if full control permission for the Administrators
group is granted to the user object, you still do not have full control permission.
Therefore, you obtain only a partial attribute list.
Feedback
Was this page helpful? Yes No
This article discusses a problem in which a new session setup for LDAP services takes
longer than expected if it targets host names.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows 10 – all editions
Original KB number: 4559609
Symptoms
Lightweight Directory Access Protocol (LDAP) queries that target host names randomly
take longer than expected to respond.
Additionally, DNS client events such as the following may be logged In the event log:
7 Note
In this log entry, the <name> parameter can be any of the following:
This problem causes multiple issues that affect administrators, users, and applications.
These issues include but aren't limited to the following:
An LDAP connection against Windows Server 2008 R2 domain controllers (DCs) or
later version DCs takes about six seconds. The same connections against Windows
Server 2003 or Windows Server 2008 DCs usually takes less than one second.
When this occurs, the subsequent LDAP operations, such as bind and LDAP
searches, appear to have no additional delay after the initial LDAP connect.
The LDIFDE.EXE command is slow regardless of whether the/Sparameter is used.
The Microsoft System Center Active Directory Management Pack (SCOM ADMP)
health check script (AD_General_Response.vbs) experiences slow run times.
Microsoft Active Directory Users and Computers (ADUC) is slow to start or slow to
open OU containers. Extensions in the Active Directory Users and Computers snap-
in, DSA.MSC, uses the DC FQDN computer name as a domain name.
Microsoft Active Directory Administrative Center (ADAC) Extensions in the Active
Directory Administrative Center use the DC FQDN computer name as a domain
name.
Microsoft Group Policy Management Console (GPMC) doesn't consistently use
name resolution flags.
Visual Basic Script (VBS) scripts that make LDAP calls that reference the DC fully
qualified DNS name are slow to run.
.NET Framework applications that use System.DirectoryServices and
System.DirectoryServices.Protocols may experience delays when they create
server sessions.
Cause
Starting in Windows 7 and Windows Server 2008 R2, Windows introduced a change in
name lookup behavior to fix two earlier problem scenarios:
LDAP clients fall back to NTLM whenever the NetBIOS domain name is supplied as
the host name in the LDAP connection.
LDAP clients don't connect to a DC in the domain if a client has the same name as
the targeted NetBIOS domain name.
The delay occurs because one of the following two conditions is true:
You encounter a long wait time for a broadcast response. You don't see this delay
if NetBIOS over TCP/IP (NetBT) name resolution through broadcasts is turned off.
Delays in the DNS name resolution occur as the application queries for several
DNS names that don't exist.
The delays can be observed in a network trace that shows LDAP clients running NetBIOS
name lookups for a "[HOSTNAME]<0x1C>" record before they run a DNS lookup to
locate the application host computer (see Figure A).
Figure A
The network trace of a Windows Server 2003 or 2008 LDAP client showed that it directly
ran the DNS lookup for the host computer without performing the NetBIOS lookup for
the "<0x1C>" record.
Figure B
In the case of DNS, you see name queries for names that end in a DC computer name,
such as the following:
_ldap._tcp.Default-First-Site-Name._sites.ADDC01.contoso.com
_ldap._tcp.ADDC01.contoso.com
_ldap._tcp.Default-First-Site-Name._sites.ADDC01
_ldap._tcp.ADDC01
Resolution
When you target an LDAP server by host name instead of domain name, you should use
the LDAP_OPT_AREC_EXCLUSIVE session option to indicate that the target is a host
name instead of a domain name.
This option is set differently depending on the programming interface that is used. Use
the following information as reference.
Wldap32
If an Active Directory DNS server name is passed for theHostNameparameter,
ldap_set_option should be called to set the LDAP_OPT_AREC_EXCLUSIVE flag before
calling any LDAP function that creates the actual connection.
Doing this forces an A-record lookup and bypasses any SRV record lookup when the
computer resolves the host name. In some scenarios, it improves network performance.
For example, in a branch office that uses a dial-up connection, using A-Record lookup
can avoid forcing the dialup to query a remote DNS server for SRV records when it
resolves names.
ADSI
If you must specify a server, use the ADS_SERVER_BIND flag to avoid unnecessary or
incorrect queries to the DNS server. For more information, see this documentation of
ADsOpenObject() and related functions.
System.DirectoryServices
If your ADsPath includes a server name, specify the AuthenticationTypes.ServerBind
flag when you use the LDAP provider. Don't use this flag for paths that include a domain
name or for serverless paths. Specifying a server name without also specifying this flag
causes unnecessary network traffic.
For example:
System.DirectoryServices.Protocols
When you prepare a new LDAP connection, include an LdapDirectoryIdentifier object
that is constructed by using a host name and optional port that you want to contact,
and also includes a <fullyQualifiedDnsHostName> parameter that is set to True.
The new default behavior in Windows 7, Windows Server 2008 R2, and later versions can
be reverted to pre-Windows 7 behavior. This may reintroduce problems that affect
NetBIOS names as described in the "Cause" section. However, there are also scenarios in
which the Pre-Windows 7 behavior provides better results. Therefore, which setting
produces the better results depends on the main LDAP client use scenario.
The long-term solution should always be to get the application to use server and
domain names that have the appropriate flags when calling into LDAP, ADSI, or .NET
interfaces. You should use the correct flags to make the application independent from
scenario dependencies when the directory services client code has to decide the
resolution method in ambiguous situations.
You can revert to pre-Windows 7 behavior by setting the following registry value:
Subkey: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LDAP
Entry: UseOldHostResolutionOrder
Type: REG_DWORD
Value data: 1
As an additional approach, you can turn off name resolution by using broadcasting for
NetBt. See 819108 Settings for minimizing periodic WAN traffic to configure
NodeType as "p-mode."
References
For more information, see the following articles:
Ldap_init function
Feedback
Was this page helpful? Yes No
This article introduces how to troubleshoot the event ID 36884 issue that occurs when
you try to build a Lightweight Directory Access Protocol (LDAP) connection.
When you try to connect to the LDAPS connection point, the connection is dropped,
and you receive event ID 36884.
Output
Cause
LDAPS is looking for myldapserver.contoso.com to be associated with it. However,
myldapserver.contoso.com isn't covered by the SAN entries. Therefore, a server name
match isn't made, and the connection is dropped.
Use extra SAN(s) to cover the resolved HOST names on the certificate.
Configure the following registry value on the client to use the CNAME for the
server name comparison.
) Important
This section, method, or task contains steps that tell you how to modify the
registry. However, serious problems might occur if you modify the registry
incorrectly. Therefore, make sure that you follow these steps carefully. For
protection, back up the registry before you modify it so that you can restore it
if a problem occurs. For more information about how to back up and restore
the registry, see How to back up and restore the registry in Windows .
After the registry value is configured, the client computer uses ldap.contoso.com
to make the match. It's covered by the certificate SANs, so the connection is
allowed.
Feedback
Was this page helpful? Yes No
This article discusses steps about how to troubleshoot LDAP over SSL (LDAPS)
connection problems.
The Active Directory fully qualified domain name of the domain controller appears
in one of the following locations:
The common name (CN) in the Subject field.
The Subject Alternative Name (SAN) extension in the DNS entry.
The enhanced key usage extension includes the Server Authentication object
identifier (1.3.6.1.5.5.7.3.1).
The associated private key is available on the domain controller. To verify that the
key is available, use the certutil -verifykeys command.
The certificate chain is valid on the client computer. To determine whether the
certificate is valid, follow these steps:
1. On the domain controller, use the Certificates snap-in to export the SSL
certificate to a file that is named Serverssl.cer.
4. At the command prompt, type the following command to send the command
output to a file that is named Output.txt:
Console
certutil -v -urlfetch -verify serverssl.cer > output.txt
7 Note
To follow this step, you must have the Certutil command-line tool
installed.
The enhanced key usage extension includes the Client Authentication object
identifier (1.3.6.1.5.5.7.3.2).
The associated private key is available on the client computer. To verify that the key
is available, use the certutil -verifykeys command.
The certificate chain is valid on the domain controller. To determine whether the
certificate is valid, follow these steps:
1. On the client computer, use the Certificates snap-in to export the SSL
certificate to a file that is named Clientssl.cer.
4. At the command prompt, type the following command to send the command
output to a file that is named Outputclient.txt:
Console
7 Note
Feedback
Was this page helpful? Yes No
This article discusses LDAP session security settings and requirements after security
advisory ADV190023 is installed.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4563239
Summary
This article introduces the functional changes that are provided by security advisory
ADV190023 . Additionally, this article describes the security settings for each kind of
Lightweight Directory Access Protocol (LDAP) session, and what is required to operate
the LDAP sessions in a secure way.
ADV190023 discusses settings for both LDAP session signing and additional client
security context verification (Channel Binding Token, CBT). In the implementation, there
are two separate items:
When you determine the best path to improve security according to ADV190023, there
may be actions needed by application owners in both areas. However, the settings and
requirements to meet them are different. It's also quite possible that a solution for both
topics consists in a single change. For example, by moving from simple bind to SASL
using Kerberos or TLS with simple bind.
The new Channel Binding Token (CBT) option is the LDAP TLS implementation of the
Extended Protection for Authentication (EPA) scheme that is described in RFC 5056.
7 Note
Sessions on ports 389 or 3268 or on custom LDS ports that don't use TLS/SSL for a
simple bind: There's no security for these sessions. This is because credentials are
transmitted in clear text. Therefore, there's no secure key material to provide
protection. These sessions should be disabled by setting LDAPServerIntegrity to
Required.
Sessions on ports 389 or 3268 or on custom LDS ports that don't use TLS/SSL for a
Simple Authentication and Security Layer (SASL) bind.
Sessions that use TLS/SSL by using a predetermined port (636, 3269, or a custom
LDS port), or standard ports (389, 3268, or a custom LDS port) that use the
STARTTLS extended operation.
The SASL method that is chosen may have its own attack vectors, such as NTLMv1. But
the LDAP session itself is secure. If you're using Kerberos AES 256-bit encryption, that is
as good as it gets in 2020. The following policy guidelines apply:
The requirement for LDAPServerIntegrity is met because the TLS channel provides
signing. The level of security that the TLS channel provides depends on the TLS
client implementation.
The LdapEnforceChannelBinding setting has no bearing on this session option.
The LdapEnforceChannelBinding setting is used for this session option. When you
set this value to 2, the LDAP server requires CBT information (equivalent to EPA),
and it's required to pass verification.
The requirement for LDAPServerIntegrity is met because the TLS channel provides
signing. The level of security that it provides depends on the TLS client
implementation and whether CBT is required.
References
For more information, see the following articles:
Feedback
Was this page helpful? Yes No
This article describes how to make domain controllers to reply to LDAP Ping.
Symptoms
Consider the following scenario:
In this scenario, Windows Server 2008 or later OS doesn't respond to LDAP Ping (UDP
138 port) from client machine.
More information
In Windows Server 2003 or older, Windows Server operating systems reply to LDAP Ping
on UDP 138 port from client, the behavior however changed since Windows Server
2008.
To make Windows Server 2008 or later to reply to LDAP Ping, configure either of the
following settings.
Configure TCP/IP to use WINS server that can resolve client hostname to Windows
Server.
Note: DNS is the primary method of resolving name queries in Active Directory starting
with Windows Server 2000 and including Windows Server 2003, Windows Server 2008,
Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 and beyond.
References
For more information on DCLOCATOR, see:
Feedback
Was this page helpful? Yes No
This article describes how to use the online dbdump feature of Active Directory.
Summary
You can use the online dbdump feature in Ldp.exe to view the values that are stored in
the database while a domain controller is running. You trigger the online dbdump
feature by modifying the dumpDatabase attribute on the rootDSA.
The values that you specify for this attribute are the attributes other than the default
attributes that you want to dump. The values that you specify are the name for this
attribute. The dumpDatabase feature first checks that you have enough rights for
dumping the database. It then dumps the database into the Ntds.dmp file. The
Ntds.dmp file is located in the same folder as the database file (.dit). The default
attributes are:
DNT
PDNT
OBJ
RDNTyp
CNT
ABCNT
DelTime
NCDNT
ABVis
1. Start Ldp.exe on the domain controller that is logging the NTDS event 1645.
5. Edit for Values: name ncname objectclass objectguid instancetype. You must leave
one space between the attributes.
6. Click Enter. The Entry List box contains the following entry:
[Add]dumpdatabase: name ncname objectclass objectguid instancetype
You can also get this triggered by using an LDIFDE import file dump-db.txt like:
Dn:
Changetype: modify
Add: dumpdatabase
Dumpdatabase: name ncname objectclass objectguid instancetype
-
To import the file with LDIFDE, use a command line like ldifde /s \<targetserver> /i
/f dump-db.txt .
The internal reference points to 3947, although it should point to the new 3958 object
for dc=pdt,dc=net.
You may resolve this issue with the semantic checker of the latest version of the
Ntdsutil.exe tool.
Feedback
Was this page helpful? Yes No
This article describes how to manage Lightweight Directory Access Protocol (LDAP)
policies by using the Ntdsutil.exe tool.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 315071
Summary
To make sure that domain controllers can support service-level guarantees, you must
specify operational limits for many LDAP operations. These limits prevent specific
operations from adversely affecting the performance of the server. They also make the
server more resilient to some types of attacks.
LDAP policies are implemented by using objects of the queryPolicy class. Query Policy
objects can be created in the Query Policies container, which is a child of the Directory
Service container in the configuration naming context. For example, cn=Query-
Policies,cn=Directory Service,cn=Windows NT,cn=Services configuration naming
context.
InitRecvTimeout - This value defines the maximum time in seconds that a domain
controller waits for the client to send the first request after the domain controller
receives a new connection. If the client does not send the first request in this
amount of time, the server disconnects the client.
Default value: 20
7 Note
Default value: 20
MaxConnIdleTime - The maximum time in seconds that the client can be idle
before the LDAP server closes the connection. If a connection is idle for more than
this time, the LDAP server returns an LDAP disconnect notification.
Default value: 5
MaxPageSize - This value controls the maximum number of objects that are
returned in a single search result, independent of how large each returned object
is. To perform a search where the result might exceed this number of objects, the
client must specify the paged search control. It's to group the returned results in
groups that are no larger than the MaxPageSize value. To summarize, MaxPageSize
controls the number of objects that are returned in a single search result.
MaxValRange - This value controls the number of values that are returned for an
attribute of an object, independent of how many attributes that object has, or of
how many objects were in the search result. In Windows 2000, this control is hard-
coded at 1,000. If an attribute has more than the number of values that are
specified by the MaxValRange value, you must use value range controls in LDAP to
retrieve values that exceed the MaxValRange value. MaxValueRange controls the
number of values that are returned on a single attribute on a single object.
Minimum Value: 30
Default value: 1500
Start Ntdsutil.exe
Ntdsutil.exe is located in the Support tools folder on the Windows installation CD-ROM.
By default, Ntdsutil.exe is installed in the System32 folder.
2. At the LDAP policy command prompt, type Set <setting> to <variable> , and then
press ENTER. For example, type Set MaxPoolThreads to 8.
3. You can use the Show Values command to verify your changes.
5. To quit Ntdsutil.exe, at the command prompt, type q , and then press ENTER.
7 Note
This procedure only shows the Default Domain Policy settings. If you apply your
own policy setting, you cannot see it.
Reboot requirement
If you change the values for the query policy that a domain controller is currently using,
those changes take effect without a reboot. However, if a new query policy is created, a
reboot is required for the new query policy to take effect.
However, if changing the query isn't an option, increase the timeout value only on one
domain controller or only on one site. For instructions, see the next section. If the
setting is applied to one domain controller, reduce the DNS LDAP priority on the
domain controller, so that clients less likely use the server for authentication. On the
domain controller with the increase priority, use the following registry setting to set
LdapSrvPriority :
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
On the Edit menu, select Add Value, and then add the following registry value:
For more information, see How to optimize the location of a domain controller or global
catalog that resides outside of a client's site .
Sample script
You can use the following text to create a Ldifde file. You can import this file to create
the policy with a timeout value of 10 minutes. Copy this text to Ldappolicy.ldf, and then
run the following command, where forest root is the distinguished name of your forest
root. Leave DC=X as-is. It's a constant that will be replaced by the forest root name
when the script runs. The constant X doesn't indicate a domain controller name.
Console
To link the policy to a DC, use an LDIF import file like this:
Output
dn: CN=NTDS
Settings,CN=DC1,CN=Servers,CN=site1,CN=Sites,CN=Configuration, DC=X
changetype: modify
add: queryPolicyobject
queryPolicyobject: CN=Extended Timeout,CN=Query-Policies,CN=Directory
Service,CN=Windows NT,CN=Services,CN=Configuration,DC=X
Console
Output
7 Note
Ntdsutil.exe only displays the value in the default query policy. If any custom
policies are defined, they are not displayed by Ntdsutil.exe.
Feedback
Was this page helpful? Yes No
This article provides help to solve the delays that occur when domain members are
required to communicate to DCs on remote domains.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4550655
Symptoms
Assume that you have an Active Directory environment that has one or more forests,
and each forest has one or more domain trees. In this environment, a domain tree is a
DNS name root that is independent of the forest root.
You have member computers in all the domains of all the forests. You also have a
network security policy that limits the communication from your computers to the
servers and peers that are required for the business function of your computers and also
to the users who work with that business function.
In this scenario, you notice that domain members access domain controllers (DCs) in
domains other than the domain that they are a member of. They may access servers that
are different from the server that users log on to. This communication may be restricted
by the firewall rules that you have set.
This activity causes frequent delays and errors when the member computer tries
unsuccessfully to access the server ports of the other domain DCs.
When this problem occurs, you receive an error message that's based on the protocol
that's used, as follows:
However, domain members sometimes reach outside their own domain. They may do
this based on their configuration. They may also do this after they discover the overall
forest structure and then send requests to all domains that they discovered.
The configuration can be Group Policy settings that are linked to the scope of
policy settings for the domain members. Or, it can be policy settings on the Active
Directory site that the computer is in.
There may be applications that want to search or synchronize objects from all the
domains that they find. For example, the SharePoint topology discovery.
There is also the group of applications that search a domain root object by using LDAP
searches and that allow and receive continuation referrals. This means that they redirect
referrals to all child NCs (application partitions and child domains). Therefore, they
require access to child domain DCs.
The delays that you experience depend on the number of domains, the DCs that are
referenced, and the number of retries that are made by an application. The delay can
take many minutes. Some applications also eventually time out before all the DCs and
domains have returned errors frequently enough. In your analysis, you may see the
original LDAP query marked as successful because they received results from the
domain in which the query was started. However, the query is still delayed because it is
waiting for the referrals to be completed.
Recommendations
Microsoft does not have documentation about how to determine which DCs of any
domain in any forest in the scope of the enterprise are used based on a particular
configuration. There are also no rules to control which DCs can be accessed. This applies
to Windows and all Microsoft applications.
You must expect any domain member to reach out to all DCs of all forests. If you want
to restrict the domain members, you have to use a trial and error approach. If you find
that delays occur because additional DCs are contacted, you have to adopt firewall rules
that allow access to those DCs.
If you are not sure which ports are available or blocked by the firewall, use the PortQry
tool to test the settings. For more information, see New features and functionality in
PortQry version 2.0.
References
ADConnection Overview
LDAP Referrals
Handling and following referrals
Service overview and network port requirements for Windows
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you try to run the Active
Directory Installation Wizard.
Symptoms
When you try to run the Active Directory Installation Wizard on a Microsoft Windows
Server 2003 R2 server, the wizard does not finish, and you may receive the following
error message:
The Active Directory Installation Wizard cannot continue because the forest is not
prepared for installing Windows Server 2003. Use the Adprep command-line tool to
prepare both the forest and the domain. For more information about using the
Adprep, see Active Directory Help.
The version of the Active Directory schema of the source forest is not compatible
with the version of Active Directory on this computer.
Cause
This issue may occur when Active Directory has not been updated with the Windows
Server 2003 R2 schema extensions.
Resolution
To resolve this issue, run the adprep.exe /forestprep command from the Windows
Server 2003 R2 installation disk 2 on the schema master. To do this, insert the Windows
Server 2003 R2 installation disk 2, and then type the command:
<Drive>:\CMPNENTS\R2\ADPREP\adprep.exe /forestprep .
More information
The correct version of the ADPrep.exe tool for Windows Server 2003 R2 is 5.2.3790.2075.
You can verify the operating system support level of the schema by looking at the value
of the Schema Version registry subkey on a domain controller. You can find this subkey
in the following location:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
You can also verify the operating system support level of the schema by using the
Adsiedit.exe utility or the Ldp.exe utility to view the objectVersion attribute in the
properties of the cn=schema,cn=configuration,dc= <domain> partition. The value of
the Schema Version registry subkey and the objectVersion attribute are in decimal.
Installation disk 2 is specific to the edition of Windows Server 2003. For example, you
must use a Windows Server 2003 R2, Standard Edition installation disk to upgrade a
Windows Server 2003, Standard Edition-based computer. Installation disk 2 contains
installation files for the x86-based version and the x64-based version of Windows Server
2003 R2.
The Adsiedit.exe utility and the Ldp.exe utility are included with Windows Server 2003 R2
support tools. To install support tools, run Suptools.msi from the \Support\Tools folder
on installation disk 1.
Feedback
Was this page helpful? Yes No
This article describes how to find the current Schema Version. The original author of the
article was Yuval Sinay , Microsoft MVP.
7 Note
Method 1
1. Use ADSIEdit.msc or LDP.exe to navigate to:
CN=Schema,CN=Configuration,DC=contoso,DC=local.
Method 2
Use the DSQuery command line. Run the following command:
Console
Method 3
Use the Get-ItemProperty PowerShell cmdlet. Run the following command:
PowerShell
ノ Expand table
30 Windows Server 2003 RTM, Windows 2003 Service Pack 1, Windows 2003 Service Pack
2
7 Note
Method 2
Use the DSQuery command line:
Console
dsquery * "CN=ms-Exch-Schema-Version-
Pt,cn=schema,cn=configuration,dc=contoso,dc=local" -scope base -attr
rangeUpper
Method 3
Run the Get-ItemProperty PowerShell cmdlet:
PowerShell
Get-ItemProperty "AD:\CN=ms-Exch-Schema-Version-
Pt,cn=schema,cn=configuration,$((get-addomain).DistinguishedName)" -Name
rangeUpper
Microsoft corporation and/or its respective suppliers make no representations about the
suitability, reliability, or accuracy of the information and related graphics contained
herein. All such information and related graphics are provided "as is" without warranty
of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and
conditions with regard to this information and related graphics, including all implied
warranties and conditions of merchantability, fitness for a particular purpose,
workmanlike effort, title and non-infringement. You specifically agree that in no event
shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental,
special, consequential damages or any damages whatsoever including, without
limitation, damages for loss of use, data or profits, arising out of or in any way
connected with the use of or inability to use the information and related graphics
contained herein, whether based on contract, tort, negligence, strict liability or
otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of
damages.
Feedback
Was this page helpful? Yes No
This article helps to resolve the issue in which you see a batch of Event ID 4780 logged
in the primary domain controller (PDC) security event log.
You've changed the audit or system access control list (SACL) of container type objects
(organizational units and containers) in Active Directory where admin users and groups
are located. When you check the security event log, you see a batch of Event ID 4780
logged in the PDC every hour.
Output
Level: Information
Source: Microsoft-Windows-Security-Auditing
Message: The ACL was set on accounts which are members of administrators
groups.
Subject:
Security ID: *No String Type*
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 998
Target Account:
Security ID: *No String Type*
Account Name: <Account Name>
Account Domain: DC=contoso,DC=com
Additional Information:
Privileges: -
The reported accounts are all members of administrator-type groups. They're protected
by the AdminSDHolder task, and the Security Descriptor (SD) is overwritten from the
template SD.
When you inspect the discretionary access control list (DACL) of the reported users, it's
the same as AdminSDHolder DACL and the DACL of admin users that aren't reported in
Event ID 4780.
The SD differs from the template SD of the
AdminSDHolder object
The AdminSDHolder enforcement job runs on the PDC emulator once an hour. The job
builds a list of accounts it protects and ensures the current SD is the same as the
template SD of the AdminSDHolder object on the binary level.
The event is triggered by the different SD. The difference in the SD is in the SACL. The
SACL, by default, has three entries, and the inheritance is enabled.
The inheritance flag means that when the AdminSDHolder enforcement job writes the
SD to enforce AdminSDHolder, the codes merge the SACL written with the SACL of the
parent object. This action may lead to additional system access control entries (SACEs)
on the freshly written SD.
On the next run of the AdminSDHolder enforcement job, the different SACL leads to a
different SD. Then, a new SD will be built and written, but the same happens again. The
new SACL written will differ from the template on the AdminSDHolder object.
7 Note
If you have problems due to Event ID 4780 and the excessive updates, edit the SD of the
AdminSDHolder object to not inherit the SACL. Select Advanced in the AdminSDHolder
Properties window and select Disable inheritance on the Auditing tab of the Advanced
Security Settings for AdminSDHolder window. Here are the screenshots:
Avoid the entries inherited from the parent object. Copy or remove the existing entries
as needed. Alternatively, adjust the SACL to fit the needs of the protected users and
groups.
Feedback
Was this page helpful? Yes No
This article helps solve access denied errors that occur after you log on to a local
administrator domain account.
Symptoms
Consider the following scenario:
Cause
When you configure the first domain controller in a forest or a new domain, the user's
local account is converted to a domain security principal and is added to matching
domain built-in groups, such as Users and Administrators. Because there are no built-in
local Schema Admins, Domain Admins, or Enterprise Admins groups, these
memberships are not updated in the domain groups, and you are not added to the
Domain Admins group.
Workaround
To work around this behavior, use Dsa.msc, Dsac.exe, or the Active Directory Windows
PowerShell module to add the user to the Domain Admins and Enterprise Admins
groups as necessary. We do not recommend that you add the user to the Schema
Admins group unless you are currently performing a schema upgrade or modification.
After you log off and then log back on, the group membership changes will take effect.
More information
This behavior is expected and is by design.
Although this behavior has always been present in AD DS, improved security procedures
in business networks have exposed the behavior to customers who follow Microsoft best
practices for using the built-in Administrator account.
The built-in Administrator account makes sure that at least one user has full
administrative group membership in a new forest.
Feedback
Was this page helpful? Yes No
This article discusses an issue where applications that use down-level APIs of the
NetUser or NetGroup class like NetUserGetInfo or NetGroupGetInfo fails with the
ACCESS DENIED error.
Summary
You have an application that uses the down-level APIs of the NetUser or NetGroup class
like NetUserGetInfo , NetUserSetInfo , NetUserEnum , NetGroupGetInfo , NetGroupSetInfo ,
NetGroupEnum , NetLocalGroupGetInfo , NetLocalGroupSetInfo , and NetLocalGroupEnum . In
this scheme, the NetUser class APIs are also used to manage computer account.
The same APIs are used when you invoke the ADSI WINNT provider.
These APIs may fail with ACCESS DENIED although the calling account has sufficient
permissions on the target accounts. The reason for this is that the client-side API
implementation does not have a 1:1 relationship with Security Account Manager (SAM)
RPC APIs. The client side performs additional checks and preparation for these calls that
require additional permissions in Active Directory.
One application that uses these APIs is the cluster service, and in the cluster service log
you will see:
Another symptom of this effect might be excessive audit records in the Security
Eventlog of your DCs for these API calls and the objects quoted below, if successful or
failure access auditing for the calling account is enabled.
More information
The implementation of the APIs uses multiple RPC calls directed at the Domain
Controller, to set up the session and verify the domain. It accesses the following objects
with read access:
Domain Root Object: It looks up the primary domain of the Domain Controller and
opens the domain for reading, which in turn opens the AD object for the domain,
like DC=contoso,dc=com.
Builtin container: This is the root object of the builtin domain. It is opened as the
caller wants to verify its existence. Thus the caller needs read access to the
container CN=Builtin,DC=contoso,dc=com.
SAM server object: This object stores general permissions about general SAM
account access and enumeration. It will be used on certain calls only. The object
name is cn=server,cn=system,DC=contoso,dc=com.
In most Active Directory domains, permissions to these objects are granted based on
the membership in generic groups like Authenticated Users, Everyone or the Pre-
Windows 2000 Compatible Access group. The change to trigger the problem may have
been that the user was removed from the last group (maybe together with Everyone,
and/or the permissions on the objects listed were removed in a move to harden the
Active Directory permissions.
The approaches to resolve the problem are to either grant the required read
permissions or to change the application to use LDAP instead of the older APIs or the
ADSI WINNT provider. LDAP will not touch the objects above and it will also support the
granular permissions you may have set on the target object.
Excessive auditing
When you have auditing enabled on these objects, you will see up to three audit records
for the objects above for both opening and closing the objects, plus the actual target
object access. If the events are logged excessively, it makes sense to remove the entries
in the Auditing ACL so these generic access types are not logged anymore. The problem
is that the Domain Root object and the Builtin Container inherit to many subordinate
objects.
To solve this, you need to break inheritance at the builtin container and redefine the
ACEs that inherit to only apply to this object. You also need to touch the ACEs on the
Domain Root object so the problem SACEs don't apply to the domain root object
anymore. The exact steps depend on the actual SACL settings that are in effect in your
environment.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error message when non-administrator users who
have been delegated control try to join computers to a domain controller.
Symptoms
On a domain controller, non-administrator users may experience one or more of the
following symptoms:
After a specific user or a specific group is provided with the permission to add or
to remove computer objects to the domain on an organizational unit (OU) through
the Delegation Wizard, users can't add some of the computers to the domain.
When the user tries to join a computer to a domain, users may receive the
following error message:
Access is denied.
7 Note
Users who are members of the Account Operators group or who have been
delegated control can't create new user accounts or reset passwords when they
sign in locally or when they sign in through Remote Desktop to the domain
controller.
When users try to reset a password, they may receive the following error message:
Cause
These symptoms may occur if one or more of the following conditions are true:
A user or a group hasn't been granted the Reset Passwords permission for the
computer objects.
7 Note
Users have been delegated control of the Account Operators group or are
members of the Account Operators group. These users haven't been granted the
Read permission on the built-in OU in "Active Directory Users and Computers."
Resolution
To resolve the issue in which users can't join a computer to a domain, follow these steps:
1. Select Start, select Run, type dsa.msc, and then select OK.
2. In the task pane, expand the domain node.
3. Locate and right-click the OU that you want to modify, and then select Delegate
Control.
4. In the Delegation of Control Wizard, select Next.
5. Select Add to add a specific user or a specific group to the Selected users and
groups list, and then select Next.
6. In the Tasks to Delegate page, select Create a custom task to delegate, and then
select Next.
7. Select Only the following objects in the folder, and then from the list, click to
select the Computer objects check box. Then, select the check boxes below the
list, Create selected objects in this folder and Delete selected objects in this
folder.
8. Select Next.
9. In the Permissions list, click to select the following check boxes:
Reset Password
Read and write Account Restrictions
Validated write to DNS host name
Validated write to service principal name
To resolve the issue in which users can't reset passwords, follow these steps:
1. Select Start, select Run, type dsa.msc, and then select OK.
6. Under Permissions for Account Operators, click to select the Allow check box for
the Read permission, and then select OK.
7 Note
If you want to use a group or a user other than the Account Operators group,
repeat steps 5 and 6 for that group or that user.
Feedback
Was this page helpful? Yes No
Provide product feedback
Event ID 16650: The account-identifier
allocator failed to initialize in Windows
Server
Article • 02/19/2024
This article provides a solution to solve errors that occurs when you add objects to
Active Directory or restore a domain controller from a system state backup.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 839879
Symptoms
This article applies to Windows 2000 and all later versions. When you try to add new
users, groups, computers, mailboxes, domain controllers, or other objects to Active
Directory on a Microsoft Windows Server computer, you may receive the following error
message:
Cannot create the object because directory service was unable to allocate a relative
identifier.
When you restore a domain controller from a system state backup, the System log may
contain the following error message:
Event Type:Error
The account-identifier allocator failed to initialize properly. The record data contains
the NT error code that caused the failure. Windows will retry the initialization until it
succeeds; until that time, account creation will be denied on this Domain Controller.
Look for other SAM event logs that may indicate the exact reason for the failure.
You can also use the Dcdiag command together with the verbose switch to look for
additional errors. To do this, follow these steps:
1. Click Start, click Run, type cmd in the Open box, and then click OK.
2. At the command prompt, type DCdiag /v , and then press Enter.
When you type Dcdiag /v , you may see error messages that resemble the following:
You may also receive other errors in the system event log that can help you to
troubleshoot the problem:
Description: The maximum account identifier allocated to this domain controller has
been assigned. The domain controller has failed to obtain a new identifier pool. A
possible reason for this is that the domain controller has been unable to contact the
master domain controller. Account creation on this controller will fail until a new
pool has been allocated. There may be network or connectivity problems in the
domain, or the master domain controller may be offline or missing from the
domain. Verify that the master domain controller is running and connected to the
domain.
Cause
This problem occurs in one of the following scenarios:
When the relative ID (RID) Master is restored from backup, it tries to synchronize
with other domain controllers to verify that there are no other RID Masters online.
However, the synchronization process fails if there are no domain controllers
available to synchronize with, or if replication is not working.
7 Note
If the domain has always contained only one domain controller, the RID
Master will not try to synchronize with other domain controllers. The domain
controller has no knowledge of any other domain controllers.
The RID pool has been exhausted, or objects in Active Directory that are related to
RID allocation use incorrect values or are missing.
Resolution
Before you can delete the replication links to the Active Directory naming contexts, you
must identify the objectGUID value by using the Repadmin command. To do this, follow
these steps:
1. Click Start, click Run, type cmd in the Open box, and then click OK.
2. At the command prompt, type repadmin /showreps . You will see output that
resembles the following:
CN=Schema,CN=Configuration,DC=contoso,DC=comDefault-First-Site-
Name\DC02 via RPC objectGuid: <GUID> Last attempt @ <DateTime> was
successful.
3. Type repadmin /delete to delete the replication links. Specify the naming context
and the objectGUID as shown in the following examples:
Console
4. Restart the RID Master computer. The RID Master will initialize correctly.
1. Verify that the Everyone group has the Access this computer from the network user
right. The setting can be configured in the following location in the Group Policy
Object Editor: Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment .
2. Install the Windows 2000 Support Tools. These tools are available in the support
folder on the Windows 2000 and the Windows Server 2003 CD-ROMs. When you
have installed these tools, start ADSI Edit . To do this, follow these steps:
a. Click Start, click Run, type mmc in the Open box, and then click OK.
b. In Windows 2000, click Console, and then click Add/Remove Snap-in. In
Windows Server 2003, click File, and then click Add/Remove Snap-in.
c. In the Add/Remove snap-in, click Add, click ADSIEdit, and then click Add.
d. Click Close, and then click OK.
5. Expand domain, and then expand the distinguished name of the domain. For
example, expand DC=contoso, DC=com.
7. Right-click the domain controller that you want to check, and then click Properties.
8. Click the Select a property to view menu, and then click userAccountControl.
10. In the Integer Attribute Editor, type 532480 in the Value field, and then click OK.
To verify that the RID Master is replicating with at least one of its direct partners, follow
these steps:
The CN=RID Set object is in the right pane of ADSI Edit when the domain
controller is selected under OU=Domain Controllers in the left pane.
If no CN=RID Set object exists, you must demote that domain controller and then
promote it again to create the object.
2. If the CN=RID Set object exists, make sure that the rIDSetReferences attribute on
the domain controller's computer account object points to the distinguished name
of the RID Set object, as shown in the following example: CN=RID Set,
CN=DC01,OU=Domain Controllers,CN=contoso,DC=local
If the rIDSetReferences attribute does not point to the distinguished name of the
RID Set object, contact Microsoft Product Support Services for more information.
Status
This behavior is by design.
References
822053 Error message: "Windows cannot create the object because the Directory
Service was unable to allocate a relative identifier"
Feedback
Was this page helpful? Yes No
Summary
If you, as the administrator, delete one of the memberships of a special group, such as
Authenticated Users, from a Built-in Domain Local Users group on a domain controller
in Windows, you cannot readd the group by using the Active Directory Users and
Computers tool. To add one of the special groups to a domain local group on a domain
controller, use the net localgroup command.
For example, use the following command to add the Authenticated Users group back to
the Built-in Domain Local Users group on a domain controller:
More information
In Windows, there are certain special groups that are created by the system and that are
used for special purposes. A list of these special groups includes:
Authenticated Users
Anonymous Logon
Batch
Creator Owner
Creator Group
Dialup
Enterprise Domain Controllers
Everyone
Interactive
Network
Proxy
Restricted
Self
Service
System
Terminal Server User
Because you cannot alter the membership of these groups, the groups are not listed in
Active Directory Users and Computers ( Dsa.msc ). However, these groups are useful for
operations such as assigning permissions to directories, files, shared network directories,
or printers.
Users become members of these special groups depending on the operation that
they're trying to perform. For example, a user gains the Interactive group membership in
their token whenever they use a computer locally. The Network group would be added
to a user's token anytime that a user connects over the network to a computer.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that all members of a group may not be
returned when you enumerate members of a group by using the Active Directory
Service Interfaces WinNT provider.
Symptoms
When you enumerate members of a group by using the Active Directory Service
Interfaces (ADSI) WinNT provider, and you use a binding string, a problem may occur.
Some members of the group may not be returned if the group that you are
enumerating has members of the following:
A local group that contains domain users and domain groups as members
A domain local group that contains groups from trusted domains as members
Workaround
You can use the GetObject method to obtain the full member list. The GetObject
method uses the credentials for the currently logged on user. The following code
example demonstrates this.
VB
GetObject("WinNT://<server>/<group>,group")
If the account that you want to use for enumerating the group is not the currently
logged on user, you can use impersonation before you use the GetObject method.
Status
This behavior is by design.
VB
'Binding
Set oRoot = GetObject("WinNT:")
Set oTargetGroup = oRoot.OpenDSObject("WinNT://<server>/<group>,group", "
<domain>\<user>", "<password>",ADS_SECURE_AUTHENTICATION)'All of the
following are placeholders: <server> <group> <domain> <user> <password>
msgbox oTargetGroup.ADSPath
) Important
For more information, see User authentication issues with the Active Directory Service
Interfaces WinNT provider.
References
Active Directory Service Interfaces
Feedback
Was this page helpful? Yes No
This article helps fix an issue where audit policy settings with AuditPol and the Local
Security Policy (SECPOL.msc) show different results.
Symptoms
When viewing audit policy settings with AuditPol and the Local Security Policy
(SECPOL.msc), the settings may show different results.
Cause
AuditPol directly calls authorization APIs to implement the changes to the granular audit
policy. Secpol.msc manipulates the Local Group Policy Object, which results in writing
the changes to %SYSTEMROOT%\system32\GroupPolicy\Machine\Microsoft\Windows
NT\Audit\Audit.csv. The settings saved to the .csv file aren't applied directly to the
system at the time of modification, but are instead written to the file and read later by
the client-side extension (CSE). At the next group policy refresh cycle, the CSE applies
the modifications that are present in the .csv file.
Secpol.msc displays what is set in the local GPO. There's no "effective settings" view in
secpol.msc that will merge granular AuditPol settings and what is defined locally as seen
with secpol.msc.
Resolution
From an administrative command prompt, you can use AuditPol to view the defined
auditing settings by running:
Console
Feedback
Was this page helpful? Yes No
This article provides help to solve an error that occurs when you access Active Directory
information from Team Foundation Server Source Control Explorer.
Rapid publishing
Rapid publishing articles provide information directly from within the Microsoft support
organization. The information contained herein is created in response to emerging or
unique topics, or is intended supplement other knowledge base information.
Action
Create a Windows group in Active Directory (AD), and assign AD users to the group,
then...
Result
Error: Object reference not set to an instance of an object.
Cause
This issue is caused by a bug in the version control permission dialog window in Visual
Studio 2008\ Team Explorer 2008.
Resolution
This problem is resolved in Visual Studio 2008 SP1. If you are using Visual Studio 2008
RTM, there are two workarounds:
You can enter tf perm /? or review the MSDN documentation for this command
TF Permission command for more information about how to assign version
control permissions from command line.
Disclaimer
Microsoft and/or its suppliers make no representations or warranties about the
suitability, reliability, or accuracy of the information contained in the documents and
related graphics published on this website (the "materials") for any purpose. The
materials may include technical inaccuracies or typographical errors and may be revised
at any time without notice.
To the maximum extent permitted by applicable law, Microsoft and/or its suppliers
disclaim and exclude all representations, warranties, and conditions whether express,
implied or statutory, including but not limited to representations, warranties, or
conditions of title, non infringement, satisfactory condition or quality, merchantability
and fitness for a particular purpose, with respect to the materials.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where you can't add a user name or an object
name that only differs by a character with a diacritic mark.
Symptoms
You try to add a new user or a new object to the Active Directory directory service.
However, the user or the object is not added. Additionally, you may receive any one of
the following error messages:
Error message 1:
Error message 2:
Windows cannot create the new user object because the name username is
already in use. Select another name, and try again.
Error message 3:
Windows cannot create the specified object because: The specified user
already exists.
Error message 4:
The user logon name you have chosen is already in use in this enterprise.
Choose another logon name, and then try again.
7 Note
In these error messages, username is the name of the user or of the object that you
tried to add.
Cause
This problem occurs because the user name or the object name contains diacritic marks,
for example, German umlauts. A German umlaut character contains a dieresis over the
base character itself, such as in the following characters:
Ää
Öö
Üü
The German umlaut characters are interpreted to be the same as their base characters.
For example, the ü character is interpreted to be the same as the u character. When this
problem occurs, a user who is named Muller cannot be created if a user who is named
Müller already exists. Similarly, a user who is named Meissner cannot be created if a user
who is named Meißner already exists.
Resolution
To resolve this problem, use a different name for the user or for the object that you want
to add.
Status
This behavior is by design.
More information
Microsoft has published rules for valid characters for various object types that further
reduces the freedom of name choice. For more information, see Naming conventions in
Active Directory for computers, domains, sites, and OUs.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where you cannot start the Active Directory
Users and Computers tool because the server is not operational.
Symptoms
Any of the following symptoms may occur:
When you try to start the Active Directory Users and Computers tool, you receive
the following error message:
When you try to start the Active Directory Sites and Services tool, you receive the
following error message:
When you try to start the Active Directory Domains and Trusts tool, you receive the
following error message:
Cause
These issues may occur if TCP/IP filtering is configured to permit only port 80 for TCP/IP
traffic.
Resolution
Port 389 is used for Lightweight Directory Access Protocol (LDAP) connections. This port
is blocked if TCP/IP filtering is configured incorrectly. By default, TCP/IP filtering is
configured with the Permit All setting. To verify and correct this setting:
1. Right-click My Network Places on the domain controller on which you cannot start
Active Directory Users and Computers, and then click Properties.
2. Click Internet Protocol, and then click Properties.
3. Click Advanced.
4. Click Options.
5. Click TCP/IP Filtering, and then click Properties.
6. For the TCP/IP Port setting, click Permit All.
7. Restart the computer. This opens all TCP ports, including port 389.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
at the beginning of this article.
Feedback
Was this page helpful? Yes No
This article describes the potential compatibility issues in using domain user accounts
ending with the dollar sign ($) as a service account.
Summary
Starting in Windows 7/2008R2, there are potential compatibility issues with using
domain user accounts ending with the dollar sign ($) as a service account. Managed
service accounts are identified by ending in a dollar sign ($). The system may evaluate
the account as a managed service account and block the change.
More information
In the services console, if you enter a user account in a trusted domain that ends in the
dollar sign ($), it will warn you that "The name provided is not a properly formed
account name." This occurs because managed service accounts can't be used in a
trusted domain.
Feedback
Was this page helpful? Yes No
This article provides some steps to define Security Templates by using the Security
Templates Snap-In.
Summary
This step-by-step article describes how to create and define a new security template by
using the Security Templates snap-in in Microsoft Windows Server 2003.
With the Security Templates snap-in, you can create a security policy for your network or
computer by using security templates. A security template is a text file that represents a
security configuration. You can apply a security template to the local computer, import a
security template to Group Policy, or use a security template to analyze security. You can
use a predefined security template that is included in Windows Server 2003, modify a
predefined security template, or create a custom security template that contains the
security settings that you want. Security templates can be used to define the following
components:
Account Policies
Password policy
Account lockout policy
Kerberos policy
Local policies
Audit policy
User rights assignment
Security Options
4. In the Add/Remove Snap-in dialog box, click the Standalone tab, and then click
Add.
5. In the Add Standalone Snap-in dialog box, click Security Templates, click Add,
click Close, and then click OK.
A list of predefined security templates and their descriptions appears in the right
pane.
3. In the Template name box, type a name for the new template.
If you want, you can type a description in the Description box, and then click OK.
The new security template appears in the list of security templates. Note that the
security settings for this template are not yet defined. When you expand the new
security template in the console tree, expand each component of the template,
and then double-click each security setting that is contained in that component, a
status of Not Defined appears in the Computer Setting column.
4. To define Account Policies, Local Policies, or Event Log policies, follow these steps:
a. In the console tree, expand the component that contains the security setting
that you want to configure.
For example, to set a maximum password age policy, expand Account Policies.
b. In the right-pane, double-click the security setting that you want to configure.
For example, to set the maximum password age policy, double-click Password
Policy, and then double-click Maximum password age.
c. Click to select the Define this policy setting in the template check box, specify
the option or setting that you want as appropriate to the security setting, and
then click OK.
1. In the console tree, expand a predefined template that contains the settings that
you want to copy, right-click the component that you want to copy, and then click
Copy.
2. In the console tree, expand your custom template, right-click the appropriate
component, and then click Paste.
For example, to use the Account Policies settings from the Hisecdc template in
your custom template, expand Hisecdc, right-click Account Policies, and then click
Copy. Expand your custom template, right-click Account Policies, and then click
Paste.
1. Right-click the template that you want to copy, and then click Save As.
2. In the Save As dialog box, type a name for the security template in the File name
box, and then click Save.
The new security template appears in the list of security templates. Configure the
template with the settings that you want.
References
For more information about security templates in Windows Server 2003, see the
"Security Configuration Manager" topic in the Security section of the Windows 2003
Server documentation.
Feedback
Was this page helpful? Yes No
This article helps to fix the error "The directory datatype cannot be converted to or from
a native DS datatype".
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 907462
Symptoms
You are running or managing applications that use information from the Active
Directory directory service in Windows. You may receive errors when the applications
use information for linked attributes. For example, you may receive the following error:
In this case, when you export the affected object by using the LDIFDE utility (Ldifde.exe),
an attribute is listed. However, the attribute has no value.
This may be the expected behavior when the value is long. But the next line in the
output has the next attribute. For a group and its managedBy attribute, the output may
resemble the following:
...
showInAddressBook: <Address Book object DN>
managedBy:
legacyExchangeDN: <X500 name>
groupType: -2147483640
...
In a database dump with the RootDSE command verb dumpdatabase, the affected
groups will be shown as follows:
The link attribute ID is always 36, and the link partner is always 2.
For information about how to dump the database, see How to Use the Online Dbdump
feature of Active Directory .
Cause
An application can add an object link that refers to the internal root object of the Active
Directory database. This object does not have a name or any other properties that are
usable for applications. Therefore, the client applications display error messages that do
not indicate the cause of a problem.
Resolution
If you use domain controllers that are running Windows Server 2003 with Service Pack 1,
the problem does not occur. But the object with this invalid link is still in the database.
You can find the groups affected for a domain controller when you search the
NTDS.DMP file, as follows:
You cannot resolve the problem by deleting the attribute. If you delete the attribute, the
following error is logged in the Application Directory Services log:
If this error is logged, the object is in a broken state. To achieve the original state or to
delete the object, you can only run an authoritative restore on the object. To repair
objects that exhibit this behavior, we recommend that you delete and rebuild the object
by using the LDIFDE utility.
U Caution
If you have to keep certain attributes that you cannot set the value on, such as the
objectSid attribute or the SidHistory attribute, delete and then undelete the object.
(Windows Server 2003 Service Pack 1 retains the SidHistory attribute on when you
delete an object.) When you delete and undelete an object, you do not have to run a
semantic checker.
However, no tools currently exist to recover the attributes and the back-links. To restore
group memberships, you can use the Groupadd.exe tool. For more information, click the
following article number to view the article in the Microsoft Knowledge Base:
840001 How to restore deleted user accounts and their group memberships in Active
Directory
If you use the Microsoft Provisioning System, you can use the system to recover the
attributes and the back-links.
Some backup and recovery applications may offer a more convenient way of removing
these problematic attributes. The application must let you select attributes during a
restore operation. For example, an application must let you exclude the managedBy
attribute when you restore a deleted object.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section. This problem was first corrected in Microsoft Windows Server
2003 Service Pack 1.
Feedback
Was this page helpful? Yes No
This article describes how to diagnose and resolve a problem where event 5722 appears
in the system log of your domain controller.
7 Note
This article applies to Windows 2000. Support for Windows 2000 ends on July 13, 2010.
For more information, see the Microsoft Support Lifecycle Policy.
Summary
When you use Event Viewer to view the system log in a Windows domain controller, you
may find event 5722 logged. This problem may occur in either of two scenarios:
This article describes how to differentiate the two scenarios and how to resolve the
problem.
Symptoms
On a Microsoft Windows domain controller, the following event is logged in the system
log:
Cause
In a Microsoft Windows domain, starting with Windows 2000, a discrete communication
channel helps provide a more secure communication path between the domain
controller and the member servers or workstations. This channel is known as a secure
channel. When you join a computer to a domain, a computer account is created, and a
password is shared between the computer and the domain. By default, this password is
changed every 30 days. The secure channel's password is stored together with the
computer account on the primary domain controller (PDC). The password is replicated
to all replica domain controllers.
In this scenario, the computer's secure channel with the authenticating domain
controller is still valid.
When you join a computer to a domain by using a name that is already in use by
another computer, or when an existing computer account is reset. An existing
computer account may be reset by using Active Directory Users and Computers or
by using the Netdom.exe utility.
In this scenario, the computer's account password does not match the password
on the domain controller, and you cannot set a secure channel from the original
computer to the domain controller.
Resolution
2 Warning
If you use the ADSI Edit snap-in, the LDP utility, or any other LDAP version 3 client,
and you incorrectly modify the attributes of Active Directory objects, you can cause
serious problems. These problems may require you to reinstall Microsoft Windows
2000 Server, Microsoft Windows Server 2003, Microsoft Exchange 2000 Server,
Microsoft Exchange Server 2003, or both Windows and Exchange. Microsoft cannot
guarantee that problems that occur if you incorrectly modify Active Directory
object attributes can be solved. Modify these attributes at your own risk.
To resolve this problem, first determine which scenario is the cause of the problem. You
can follow these steps:
1. Note the date and the time that the event was logged in the system log.
2. Click Start, point to Programs, point to Resource Kit, and then click Tools
Management Console.
7 Note
ADSI Edit is included with the Windows Support Tools. You can install the
Windows Support Tools from the Support\Tools folder of the Windows 2000
Server CD-ROM.
On servers running Windows Server 2008 or Windows Server 2008 R2, ADSI Edit is
installed when you install the Active Directory Domain Services (AD DS) role to
make a server a domain controller. You can also install Windows Server 2008
Remote Server Administration Tools (RSAT) on domain member servers or stand-
alone servers. For specific instructions, see Installing or Removing the Remote
Server Administration Tools Pack .
To install ADSI Edit on computers running Windows Vista® with Service Pack 1
(SP1) or Windows 7, you must install RSAT.
5. In ADSI Edit, locate and then right-click the computer that is causing the problem.
6. Click Properties.
If the ntte value is not converted in the UI to a readable date and timestamp, run
the following command or proceed to step 9 for an alternate method:
Console
9. Copy the value that appears in the Value(s) box to the clipboard.
10. Click Start, point to Programs, point to Accessories, and then click Calculator.
14. To change the value from decimal to hexadecimal decimal numbering system, click
Hex.
16. Paste the hexadecimal number from the clipboard to a file in Notepad.
17. Count eight characters from the rightmost character of the hexadecimal string, and
then press SPACEBAR.
7 Note
This action splits the hexadecimal string into two hexadecimal strings.
18. If the hexadecimal string on the left side contains only seven characters, add a zero
to the beginning of the string.
Console
Console
21. Check whether the date and time that you noted in step 1 and the decoded date
and time that you noted in step 20 match.
22. If the date and time that event 5722 was logged and the decoded date and time
match, check whether the computer that is causing the problem has a secure
channel established with a domain controller by typing the following command at
a command prompt:
Console
If the problem computer has a valid secure channel established with a domain
controller, you receive output that is similar to:
Console
If the problem computer does not have a valid secure channel established with a
domain controller, you receive output that is similar to:
Console
7 Note
If Netlogon service logging is turned on for the domain controller, you confirm this
scenario by checking for a Netlogon.log entry that is similar to the following:
05/06 13:35:25 [MISC] NlMainLoop: Notification that trust account added (or
changed) TRUSTING_DOMAIN$ 0x#### 4
This message is not logged if a computer updates its own computer account password.
To resolve problems that are related to duplicate computer names, rejoin the original
computer to the domain.
You can ignore event 5722 if both of the following conditions are true:
If the date and time of event 5722 and the decoded date and time match.
A valid secure channel is established between the problem computer and a
domain controller.
7 Note
When both of these conditions are true, event 5722 is logged on the domain
controller when the computer tries to authenticate with a domain controller during
the computer account update process.
Administrators can also query Active Directory information from any computer in the
domain by using Ldp.exe. The version of Ldp.exe that is included in the Windows XP
Service Pack 2 Support Tools can also be used to decode the PwdLastSet value.
References
For additional information about enabling debug logging, click the following article
number to view the article in the Microsoft Knowledge Base:
109626 enabling debug logging for the Net Logon service
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where you fail to delete an orphaned NTDS
Settings from Active Directory Sites and Services.
Symptoms
When you try to delete an orphaned NTDS Settings from Active Directory Sites and
Services, you may receive the following error message: DSA object cannot be deleted.
Only one NTDS Settings ordinarily exists under each server in the Servers folder in Active
Directory Sites and Services. If two NTDS Settings are shown, the one that doesn't have
connection objects associated with it (in the right pane) is probably the orphaned NTDS
Settings.
Cause
The Dcpromo.exe demotion process must delete NTDS Settings from a server. However,
the Dcpromo.exe process may not delete NTDS Settings even if connection objects are
deleted. If you have multiple domain controllers, the Active Directory replication process
may not delete NTDS Settings from this domain controller.
Resolution
To work around this problem, complete the following procedure on a domain controller
that has an orphaned NTDS Settings:
Configuration NC
CN=Configuration,DC=domain, DC=com
CN=Sites
CN= your site name
CN=Servers
2. Locate the server that has an orphaned NTDS Settings. Right-click the orphaned
NTDS Settings, and then click Delete.
3. If you have multiple domain controllers, make sure that this change is replicated to
all domain controllers.
Configuration NC
CN=Configuration,DC=domain, DC=com
CN=LostAndFoundConfig
2. Right-click the orphaned NTDS Settings object, and then click Delete. Make sure
that the related server object doesn't exist before deleting the NTDS Settings
object.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
at the beginning of this article.
More information
ADSIEDIT is part of the Windows 2000 Support Tools.
Feedback
Was this page helpful? Yes No
This article helps fix an error that occurs when you run the Get-ADGroupMember cmdlet in
a scenario where a group has a member from a remote forest.
Symptoms
Assume that you use the Get-ADGroupMember cmdlet to identify the members of a group
in Active Directory Domain Services (AD DS). However, when you run the cmdlet for a
domain local group, the following error is returned:
7 Note
In a one-way trust, when using the Get-ADGroupMember cmdlet on a group from the
trusting forest, you receive the following errors if the group contains members from
the trusted forest:
As a workaround, use the Active Directory Users and Computers snap-in to view the
members of the group, or convert the one-way trust into a two-way trust.
Cause
This issue occurs if the group has a member from another forest whose account has
been removed from the account forest. The member is represented in the local domain
by a Foreign Security Principal (FSP). In the LDIFDE export of the group, a membership is
shown as follows:
member:
CN=S-1-5-21-3110691720-3620623707-1182478234-
698540,CN=ForeignSecurityPrincipals,DC=contoso,DC=com
member:
CN=S-1-5-21-3110691720-3620623707-1182478234-
695739,CN=ForeignSecurityPrincipals,DC=contoso,DC=com
When the source account with the SID is deleted, the FSP is not updated or removed to
reflect this deletion. You must manually verify that these FSP references are removed.
Resolution
To resolve this issue, enable logging for the resolution requests that concern these SIDs
and that are performed by the Active Directory Webservice. In this way, you can identify
the accounts that fail resolution. To do this, run the Get-ADGroupMember cmdlet on the
domain controller of contoso.com (where the placeholder represents the domain in
question).
PowerShell
PowerShell
You will see a file that's named c:\windows\debug\lsp.log, which tracks the SID-Name
resolution attempts. When you rerun the cmdlet on the domain controller where the
cmdlet was executed, the file will log the failures and will resemble the following:
Check for the following items to verify that this is the relevant section for this problem
(in the preceding sample output):
To find the FSP object, run the following command (replace domain names and SIDs):
PowerShell
PowerShell
References
How SIDs and account names can be mapped in Windows
Feedback
Was this page helpful? Yes No
This article describes how to change display names of Active Directory (AD) users.
Summary
When a new user is created in Active Directory, the Full name field is always generated
in FirstName LastName format. In turn, this field sets the Display Name field on creation,
so you end up with a FirstName LastName formatted global address list.
You can make this change by using the Adsiedit utility. Adsiedit not only changes the
default way the Display Name field is built, but also the Full Name (that is, the "cn") field,
that's why users appear in the chosen format when you look in the Users and
Computers snap-in.
ADSIEdit Instructions
2 Warning
If you use the ADSI (Active Directory Service Interfaces) Edit snap-in, the LDP utility,
or any other LDAP (Lightweight Directory Access Protocol) version 3 client, and you
incorrectly modify the attributes of Active Directory objects, you can cause serious
problems. These problems may require you to reinstall Microsoft Windows 2000
Server, Microsoft Windows Server 2003, Microsoft Exchange 2000 Server, Microsoft
Exchange Server 2003, or both Windows and Exchange. Microsoft cannot guarantee
that problems that occur if you incorrectly modify Active Directory object attributes
can be solved. Modify these attributes at your own risk.
6. Start Microsoft Management Console (MMC), and then add the ADSI Edit snap-in.
9. Expand the Configuration Container node, and then expand the Configuration
node.
7 Note
409 is the Locale ID for U.S. English. If you are in a multi-lingual environment,
you may need to make changes to the other codes. Most of the Asian codes
are already set.
13. Set the attribute to %<sn>.%<givenName>. Make sure that you select Set.
7 Note
The only tokens that can be formatted in the dislayName are %<sn>, %
<givenName>, and %<initials>.
15. In Active Directory Users and Computers, create a new User; the Full Name (and
thus, the Display Name) are built in accordance with your rule.
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft doesn't guarantee the
accuracy of this third-party contact information.
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows 10, version 1809 and later versions, Windows 7 Service Pack 1
Original KB number: 262177
Summary
Windows 7 Service Pack 1, Windows Server 2012 R2, and later versions offer the
capability of tracing detailed Kerberos events through the event log. You can use this
information when troubleshooting Kerberos.
) Important
The change in logging level will cause all Kerberos errors to be logged in an event.
In the Kerberos protocol, some errors are expected based on the protocol
specification. As a result, enabling Kerberos logging may generate events
containing expected false-positive errors even when there are no Kerberos
operational errors.
Other scenarios or errors require the attention of the System or Domain Administrators.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows .
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Para
meters
Registry Value: LogLevel
Value Type: REG_DWORD
Value Data: 0x1
7 Note
3. Quit Registry Editor. The setting will become effective immediately on Windows
Server 2012 R2, Windows 7, and later versions.
More information
Kerberos event logging is intended only for troubleshooting purpose when you expect
additional information for the Kerberos client-side at a defined action timeframe.
Restated, kerberos logging should be disabled when not actively troubleshooting.
From a general point of view, you may receive additional errors that are correctly
handled by the receiving client without user or admin intervention. Restated, some
errors captured by Kerberos logging don't reflect a severe problem that must be solved
or even can be solved.
For example, an event log 3 about a Kerberos error that has the error code 0x7
KDC_ERR_S_PRINCIPAL_UNKNOWN for Server Name cifs/<IP address> will be logged
when a share access is made against a server IP address and no server name. If this error
is logged, the Windows client automatically tries to fail back to NTLM authentication for
the user account. If this operation works, receive no error.
Feedback
Was this page helpful? Yes No
This article describes how to reset the Directory Services Restore Mode (DSRM)
administrator password for any server in your domain without restarting the server in
DSRM.
Applies to: Windows Server 2003, Windows Server 2008, Windows Server 2008 R2,
Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server
2022
Original KB number: 322672
Summary
Microsoft Windows 2000 uses the Setpwd utility to reset the DSRM password. In newer
versions of Microsoft Windows Server, that functionality has been integrated into the
NTDSUTIL tool. Note that you can't use the procedure that is described in this article if
the target server is running in DSRM. A member of the Domain Administrators group
sets the DSRM administrator password during the promotion process for the domain
controller. You can use Ntdsutil.exe to reset this password for the server on which you're
working, or for another domain controller in the domain.
To reset the password on the server on which you're working, type reset
password on server null. The null variable assumes that the DSRM password is
being reset on the local computer. Type the new password when you're
prompted. Note that no characters appear while you type the password.
-or-
To reset the password for another server, type reset password on server
servername, where servername is the DNS name for the server on which
you're resetting the DSRM password. Type the new password when you're
prompted. Note that no characters appear while you type the password.
Feedback
Was this page helpful? Yes No
More information
Phantom objects are low-level database objects that Active Directory uses for internal
management operations. Two common instances of phantom objects are as follows:
The tombstone lifetime has passed, but references to the object are still present in
the directory database.
A domain local group has a member user from another domain in the Active
Directory forest. Phantom objects are special kinds of internal database tracking
objects and can't be viewed through any LDAP or Active Directory Service
Interfaces (ADSI).
Object deletion
When an object is deleted from the active directory, the object follows the following
process.
The object moves to Stage 2 when the object is deleted by an administrator or through
another means.
The object has also been significantly modified from its original form:
The object moves to the DeletedObjects container (unless the object is flagged as
a special system object)
The object's DN attribute contains (esc)DEL:GUID
Most of the object's other attributes have been removed completely.
The schema of the object determines the attributes that are removed, and the attributes
that are kept after deletion. The designation of each attribute for an object class can be
changed.
The objects can't be seen from normal Active Directory management tools. You may
configure a low-level LDAP interface like LDP to view these objects.
The object moves to one of two possible states (Stage 3 or 4) when the tombstone
lifetime has expired. The default tombstone lifetime is 60 days.
You can't view these phantom objects through any LDAP or ADSI interface.
7 Note
During the removal of the global catalog from a domain controller, the read-only
objects that are removed from the global catalog do not go through the deletion
process. They are immediately removed from the database and any references to
them are unaffected.
During the addition of a member from a different domain to a local user group, the
local domain controller that is performing the addition to the group creates the
phantom object for the remote user.
If you change the foreign user's name or delete the foreign user, the phantoms must be
updated or removed in the group's domain from every domain controller in the domain.
The domain controller holding the infrastructure master (IM) role for the group's
domain handles any updates to the phantom objects.
You can't view these phantom objects through any LDAP or ADSI interface.
The IM compares the information about the phantom objects against the latest versions
on a global catalog server and makes changes to the phantoms as needed. The interval
can be customized by adding the Days per database phantom scan registry entry to the
following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
Type: DWORD
Default value: 2
Function: Specifies the interval in days that the IM compares the phantom objects
against the latest versions on a global catalog server.
7 Note
After the IM determines that the original object that the phantom object refers to has
changed or been deleted:
If the original object has been deleted, the receiving domain controllers delete the local
phantom object and remove the corresponding attribute that references it (such as the
member attribute on a group).
7 Note
Global catalog servers in the group's domain receive the special proxy replication
for the objects in the CN=Infrastructure,DC=DomainName,DC=... container.
However, they ignore them because a read-only copy of the object itself is already
instantiated in the local database. So they do not need the phantom to track the
group membership and will learn about the removal of the object with regular AD
replication.
If the infrastructure FSMO role and global catalog role reside on the same domain
controller, you continually receive event ID 1419 in the directory services event log.
There are two conditions where placing the Infrastructure Master role on a Global
Catalog is OK:
1. All Domain Controllers in the Domain are Global Catalog. In this situation, there
can't be any phantoms to clean up.
2. The Forest Mode is "Windows Server 2008 R2" and the Recycle Bin feature is
activated. In this mode, removed object links aren't phantomized but set to a
different state, and still present in the database.
For information on the AD Recycle Bin, see: Scenario Overview for Restoring Deleted
Active Directory Objects
For more information about FSMO role placement in the domain and how to transfer an
FSMO role to another domain controller, click the following article numbers to view the
articles in the Microsoft Knowledge Base:
Feedback
Was this page helpful? Yes No
This article describes the information about devices from Riverbed Technology that are
configured as RODCs.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 3192506
Summary
Microsoft offers commercially reasonable support for its software. If we can't resolve a
customer's problem when third-party software is involved, we'll request the involvement
of the third-party vendor. Depending on the scenario, Microsoft Support might ask the
customer to remove or reconfigure the component from the configuration to see
whether the problem persists. If the problem is confirmed to be caused or greatly
influenced by the third-party component, the component's vendor must be involved in
helping to resolve the problem. This policy also applies to devices from Riverbed
Technology, Inc.
More information
Riverbed Technology, Inc. makes intermediate network devices that aim to optimize
network traffic network by compressing and otherwise shaping traffic that travels over
loaded WAN connections.
The devices can intercept end-user SMB sessions and can achieve performance gains if
the Riverbed device can generate a valid signed checksum of the payload in the security
context of the server. To accomplish it, the device sets itself up as a trusted server
instance so that it can act as, and for a server that's in the scope of the network traffic
that's being optimized.
The current deployment approach (September 2016) involves either enabling read-only
domain controller (RODC) UserAccountControl settings on a regular computer account;
or using a highly privileged service account that has Replicate Directory Changes All
permissions. In some configurations, both types of accounts will be used. This approach
has a number of security consequences, which may not be obvious at the time of
configuration.
Expectations
When a computer account is set up as domain controller, it receives certain flags and
group memberships that allow it to perform security and Active Directory-specific
procedures. These include the following ones:
The account can impersonate any user in the Active Directory except those who
are marked as "sensitive and not allowed for delegation." Because of Kerberos
Protocol transition, the account can do this even without having the password for
impersonation-allowed users.
The "Replicate Directory Changes All" permission allows the device to access the
password hashes of all users in the domain, including sensitive accounts like
KrbTgt, Domain Controller accounts, and Trust relationships.
The account is eligible for monitoring as a domain controller by monitoring
solutions.
Based on the existence of these flags, "callers" (including administration tools)
expect a Windows-based server and try to access or interoperate with entities
representing themselves as domain controllers. This includes services that are
based on WMI, WinRM, LDAP, RPC, and Active Directory Web Services. Similarly,
applications, member computers, and partner domain controllers expect entities
that represent themselves as domain controllers to interact and respond in a
consistent, well-defined manner.
Security implications
As with any other computing device in a networking environment, Riverbed devices may
come under attack by malware. Because of their ability to impersonate Active Directory
users, Riverbed devices are attractive targets for such attacks.
Microsoft strongly recommends using the same level of physical and network protection
and auditing as you use for your Read-Write Domain Controllers (RWDCs).
Administration of these devices should follow current guidance regarding securing
privileged access at Securing privileged access. If you currently use Riverbed devices in
locations that aren't secure enough for RWDCs, we strongly recommend that you review
the placement of these devices.
Operational implications
Domain controllers have a special flag and additional objects associated with their
accounts that provide unique role identification. These are as follows:
Tools, services, and applications may query these attributes to generate a list of domain
controllers and then perform an operation, such as query, that assumes a normal DC
response. Riverbed devices don't implement the full set of Windows domain controller
services and do not respond to normal DC queries. Microsoft is aware of the following
problems that are caused by this configuration:
When a domain has transitioned to the Windows Server 2008 domain mode or
later, Microsoft recommends that you migrate the sysvol replication engine from
FRS to DFSR.
The DFSR migration tool (dfsrMig.exe) builds an inventory of all domain controllers
in the domain when the migration begins. This includes the DC-like accounts used
by the Riverbed devices. Riverbed devices don't respond to the changes to Active
Directory objects that are required for the migration to progress. So the DFSR
migration tool fails to complete, and administrators must ignore errors to proceed
to the next step in the sysvol migration. These false errors might overlap with
actual errors from real Windows Server-based computers.
Monitoring tools
Most server monitoring tools on the market support using Active Directory queries
to populate an inventory of client and server systems. Tools that leverage the
UserAccountControl or NTDS Setting object to find domain controllers may
incorrectly identify the Riverbed accounts as domain controller accounts. As a
result, Riverbed devices appear as manageable servers in this inventory list.
Many solutions then allow the remote deployment of monitoring agents or let you
query the device remotely for diagnostic information. However, Riverbed devices
don't support these interfaces, and the monitoring tools report them as triggering
failures.
In Windows Server 2012 and later versions, the GPMC can show the replication
status of Group Policy settings in the domain or per policy. Riverbed devices are
included in the list of eligible accounts for this status check.
Group Policy Management Console crashes when you click the target domain
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article explains how to change permissions so that non-administrators can view the
Active Directory deleted objects container.
Summary
When an Active Directory object is deleted, a small part of the object stays in the
deleted objects container for a specified time. It stays there so that other domain
controllers that are replicating changes will become aware of the deletion. By default,
only the System account and members of the Administrators group can view the
contents of this container. This article describes how to modify the permissions on the
deleted objects container.
You may have to modify the permissions on the deleted objects container if the
following conditions are true:
You have enterprise applications or services that bind to Active Directory with a
non-System account or a non-Administrator account.
These enterprise applications or services poll for directory changes.
More information
To modify the permissions on the deleted objects container so that non-administrators
can view this container, use the DSACLS.exe program. The DSACLS.exe program is
included with the Active Directory Application Mode (ADAM) Administration Tools.
For Windows Server 2008 and newer the tool is included in the operating system.
For Windows 2000 and Server 2003 you can get this done by obtaining and installing
the ADAM Administration Tools, follow these steps:
7 Note
This version of the ADAM Administration Tools is an upgrade from the version
in the Windows Server 2003 Support Tools. This version of the ADAM
Administration Tools is supported by Microsoft Windows Server 2003,
Standard Edition; Microsoft Windows Server 2003, Enterprise Edition;
Microsoft Windows Server 2003, Datacenter Edition; and Microsoft Windows
XP Professional.
2. To extract the contents of the file that you downloaded in step 1, double-click the
file, and then specify a directory when you are prompted.
3. In the directory that you extracted the file to in step 2, double-click the
Adamsetup.exe program to start the Active Directory Application Mode Setup
4. Review and accept the license terms, and then click Next.
After you have installed the ADAM Administration Tools, you can modify the
permissions on the deleted objects container. To do this, follow these steps:
1. Log on with a user account that is a member of the Domain Admins group.
2. Click Start, point to All Programs, point to ADAM, and then click ADAM Tools
Command Prompt.
3. At the command prompt, type a command that is similar to the following example:
dsacls "CN=Deleted Objects,DC=Contoso,DC=com" /takeownership.
When you type this command, use the name of the deleted objects container
for your domain.
Each domain in the forest will have its own deleted objects container. Output
that is similar to the following example should be displayed:
4. To grant a security principal permission to view the objects in the deleted objects
container, type a command that is similar to the following example: dsacls
"CN=Deleted Objects,DC=Contoso,DC=com" /g CONTOSO\EricLang:LCRP
In this example, the user "CONTOSO\EricLang" has been granted List Contents and Read
Property permissions on the deleted objects container in the "CONTOSO" domain. These
permissions let this user view the contents of the deleted objects container, but do not
let this user make any changes to objects in the container. These permissions are
equivalent to the default permissions that are granted to the Administrators group. By
default, only the System account has permission to modify objects in the deleted objects
container.
Feedback
Was this page helpful? Yes No
Symptoms
In an Active Directory Domain Services (AD DS) environment, Linux-integrated accounts
receive RC4-encrypted tickets instead of Advanced Encryption Standard (AES)-encrypted
tickets when they use Kerberos authentication. To troubleshoot this issue, go to the Key
Distribution Center (KDC).
In the log of Event ID 4769, the value of Ticket Encryption Type is 0x17 for the
affected computer. That corresponds to an RC4 encryption type.
Output
Source: Microsoft-Windows-Security-Auditing
Event ID: 4769
Task Category: Kerberos Service Ticket Operations
Level: Information
Computer: MyDC.contoso.com
Description:
A Kerberos service ticket was requested.
…
Service Information:
Service Name: MYLINUX
Service ID: CONTOSO\MYLINUX
Network Information:
Client Address: ::ffff:10.20.30.40
Client Port: 57499
Additional Information:
Ticket Options: 0x40810000
Ticket Encryption Type: 0x17
Failure Code: 0x0
Transited Services: -
After you run the klist command, the value of KerbTicket Encryption Type is
RSADSI RC4-HMAC(NT). That indicates that the encryption type is RC4.
Output
7 Note
Cause
This issue occurs because the operatingSystemVersion attribute value of Linux is set to
3.10.0x. AD DS reads the attribute value from left to right, stopping at the first decimal
point (.) If the first character of the value is a digit and the value is less than six, the KDC
determines that the requesting operating system might not support newer encryption
types. In this case, the value is 3. Therefore, the KDC ignores msDS-
SupportedEncryptionTypes and uses RC4 to encrypt the ticket.
For more information, see the specifications in TGS Exchange and Appendix A <58> of
Kerberos protocol extensions.
Solution
To resolve this issue, use one of the following methods:
For more information about how the KDC selects the encryption type, see Encryption
Type Selection in Kerberos Exchanges.
Feedback
Was this page helpful? Yes No
This article describes how to modify the filtered properties of an object in ACL Editor for
Directory Services objects.
Summary
The Per-Property Permissions tab for a user object that you view through Active
Directory Users and Computers may not display every property of the user object. This is
because the user interface for access control filters out object and property types to
make the list easier to manage. While the properties of an object are defined in the
schema, the list of filtered properties that are displayed is stored in the Dssec.dat file
that is located in the %systemroot%\System32 folder on all domain controllers. You can
edit the entries for an object in the file to display the filtered properties through the user
interface.
[User]
propertyname=7
To display the read and write permissions for a property of an object, you can edit the
filter value to display one or both of the permissions. To display both the read and write
permissions for a property, change the value to zero (0):
[User]
propertyname=0
To display only the write permission for a property, change the value to 1:
[User]
propertyname=1
To display only the read permissions for a property, change the value to 2:
[User]
propertyname=2
7 Note
After you edit the Dssec.dat file, you must quit and restart Active Directory Users
and Computers to see the properties that are no longer filtered.
7 Note
The ACL Editor called by ADSIEdit seems to ignore the contents of DSSEC.DAT and
shows all attributes by default.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where multiple tabs are missing when you
view user properties in Active Directory Users and Computers.
Symptoms
After installing the Remote Server Administration Tools for Windows 7 (Windows 7
RSAT) on a domain-joined Windows 7 client, you add the Role Administration Tools for
"AD DS Snap-ins and Command-line Tools":
You then start the Active Directory Users and Computers snap-in (DSA.MSC) and
examine the properties of a user. You notice that some or all of the following tabs are
missing: Published Certificates Password Replication Object Security Attribute Editor
Environment Sessions Remote Control Remote Desktop Services Profile Personal Virtual
Desktop UNIX Attributes Dial-in These tabs are visible when running DSA.MSC on the
console of Windows Server 2008 R2 servers.
Cause
Multiple root causes exist. See the Resolution section for more information.
Resolution
1. Enable "Advanced Features" via the View menu. This will show at least the
following new tabs:
Published Certificates
Password Replication
Object
Security
Attribute Editor
2. If still not seeing the "Environment", "Sessions", "Remote Control", "Personal Virtual
Desktop", and "Remote Desktop Services Profile" tabs, add the following RSAT
feature: "Remote Desktop Services Tools". Then restart DSA.MSC and enable the
Advanced View to make these tabs appear.
3. If still not seeing the "UNIX Attributes" tab, add the following RSAT feature: "Server
for NIS Tools". Restart DSA.MSC with Advanced View enabled to make this tab
appear.
4. The "Dial-In" tab will always be missing, as its libraries are not included in Remote
Server Administration Tools for Windows 7.
Feedback
Was this page helpful? Yes No
This article describes the naming conventions for computer accounts in Windows,
NetBIOS domain names, DNS domain names, Active Directory sites, and organizational
units (OUs) that are defined in Active Directory Domain Services (AD DS).
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 2012
Original KB number: 909264
Summary
This article discusses the following topics:
All objects that are named within AD DS, Active Directory Application Mode (ADAM), or
Active Directory Lightweight Directory Services (AD LDS) are subject to a name matching
process that's based on the algorithm that's described in the following article:
You can't add a user name or an object name that only differs by a character with a
diacritic mark .
In that article, this naming convention applies to computer names, OU names, and site
names.
Computer names
7 Note
For more information about the NetBIOS name syntax, see NetBIOS name syntax.
7 Note
A period character divides the name into a NetBIOS scope identifier and the
computer name. The NetBIOS scope identifier is an optional string of characters
that identify logical NetBIOS networks that run on the same physical TCP/IP
network. For NetBIOS to work between computers, the computers must have the
same NetBIOS scope identifier and unique computer names.
Disallowed characters: DNS host names can't contain the following characters:
comma (,)
tilde (~)
colon (:)
exclamation point (!)
at sign (@)
number sign (#)
dollar sign ($)
percent (%)
caret (^)
ampersand (&)
apostrophe (')
period (.)
parentheses (())
braces ({})
underscore (_)
white space (blank)
7 Note
The underscore has a special role. It's permitted for the first character in
SRV records by RFC definition. However, newer DNS servers might also
allow it anywhere in a name. For more information, see Complying with
Name Restrictions for Hosts and Domains.
7 Note
Reserved names per RFC: For more information, see RFC 952 .
GATEWAY
GW
TAC
Best practices: When you create names for computers in a Windows DNS
infrastructure, follow these guidelines:
Match the Active Directory domain name to the primary DNS suffix of the
computer name. For more information, see Disjointed namespaces.
Use a unique name for every computer in your organization. Avoid using the
same computer name for computers in different DNS domains.
Use ASCII characters. This guarantees interoperability with computers that aren't
running Windows.
When you use ASCII characters, don't use character case to indicate the owner
or the purpose of a computer. For ASCII characters, DNS isn't case-sensitive.
Windows and Windows applications don't preserve case in all situations.
Use only the characters that are listed in RFC 1123 . These characters include
A-Z, a-z, 0-9, and the hyphen (-). Windows DNS allows most UTF-8 characters in
names. Don't use extended ASCII or UTF-8 characters unless all the DNS servers
in your environment support them.
Domain names
The following sections describe NetBIOS domain names and DNS domain names.
7 Note
Disallowed characters: The DNS host name checking function verifies NetBIOS
domain names. These names can't contain the following characters:
comma (,)
tilde (~)
colon (:)
exclamation point (!)
at sign (@)
number sign (#)
dollar sign ($)
percent (%)
caret (^)
apostrophe (')
period (.)
parentheses (())
braces ({})
underscore (_)
white space (blank)
backslash (\)
slash (/)
7 Note
Computers that are members of an Active Directory domain can't have
names that contain only numeral. This is a DNS restriction.
7 Note
The 16th character of the name is reserved for identifying the functionality
that is installed on the registered network device.
A period character divides the name into a NetBIOS scope identifier and the
computer name. The NetBIOS scope identifier is an optional string of characters
that identify logical NetBIOS networks that run on the same physical TCP/IP
network. For NetBIOS to work between computers, the computers must have the
same NetBIOS scope identifier and unique computer names.
) Important
Disallowed characters: DNS domain names can't contain the following characters:
comma (,)
tilde (~)
colon (:)
exclamation point (!)
at sign (@)
number sign (#)
dollar sign ($)
percent (%)
caret (^)
ampersand (&)
apostrophe (')
period (.)
parentheses (())
braces ({})
underscore (_)
white space (blank)
7 Note
The underscore has a special role. It's permitted for the first character in
SRV records by RFC definition. But newer DNS servers might also allow it
anywhere in a name. When you create a domain, you receive a warning
message that states that an underscore character might cause problems for
some DNS servers. However, you can still create the domain. For more
information, see Complying with Name Restrictions for Hosts and
Domains.
Additional rules:
All characters preserve their case formatting except for ASCII characters.
The first character must be alphabetic or numeric.
The last character must not be a minus sign or a period.
The maximum name length is based on the requirements of SYSVOL paths, and
also on the MAX_PATH limitation of 260 characters.
A path in SYSVOL resembles the following example:
Console
7 Note
The AD FQDN domain name appears in the path two times. Therefore,
the length of an AD FQDN domain name is restricted to 64 characters.
The <CSE-specific path> might contain user input, such as the sign-in
script file name. Therefore, it can be significantly long.
Single-label domain namespaces: Single-label DNS names are names that don't
contain a suffix, such as .com , .corp , .net , .org , or companyname . For example,
host is a single-label DNS name. Most Internet registrars don't allow the
registration of single-label DNS names.
Generally, we recommend that you register DNS names for internal and external
namespaces with an Internet registrar. This includes the DNS names of Active
Directory domains, unless such names are subdomains of DNS names that are
registered by your organization name. For example, corp.example.com is a
subdomain of example.com . Registering your DNS name with an Internet registrar
may help prevent a name collision. A name collision might occur if another
organization tries to register the same DNS name, or if your organization merges
with another organization that uses the same DNS name.
Reserved names: See Table of reserved words. Don't use top-level internet domain
names, such as .com , .net , and .org on an intranet. If you use top-level internet
domain names on an intranet, computers on the intranet that also connect to the
internet might experience resolution errors. Additionally, avoid using names that
are used in internet-standard special features, such as .local .
Disjointed namespaces
A disjointed namespace occurs if a computer's primary DNS suffix doesn't match the
DNS domain of which it's a member. For example, a disjointed namespace occurs if a
computer that has the DNS name of dc1.contosocorp.com is in a domain that has the
DNS name of contoso.com .
Suppose a domain controller that's named DC1 resides in a Windows NT 4.0 domain
whose NetBIOS domain name is contoso . This domain controller is upgraded to
Windows 2000 Server. When this upgrade occurs, the DNS domain is renamed
contoso.com . In the original release version of Windows 2000 Server, the upgrade
routine clears the checkbox that links the primary DNS suffix of the domain controller to
its DNS domain name. Therefore, the primary DNS suffix of the domain controller is the
Windows NT 4.0 DNS suffix that was defined in the Windows NT 4.0 suffix search list. In
this example, the DNS name is DC1.northamerica.contoso.com .
The domain controller dynamically registers its service location (SRV) records in the DNS
zone that corresponds to its DNS domain name. However, the domain controller
registers its host records in the DNS zone that corresponds to its primary DNS suffix.
For more information about disjointed namespaces, see the following articles:
Other factors
Forests that connect to the internet: A DNS namespace that connects to the
internet must be a subdomain of a top-level or second-level domain of the
internet DNS namespace.
Best practices:
The DNS names of all the nodes that require name resolution include the
organization's internet DNS domain name. Because DNS is hierarchical, DNS
domain names grow when you add subdomains to your organization.
Therefore, you should choose an internet DNS domain name that is short and
easy to remember. Short domain names make the computer names also easy to
remember.
If the organization has an internet presence, use names that are relative to the
registered internet DNS domain name. For example, if you've registered the
internet DNS domain name contoso.com , use a DNS domain name such as
corp.contoso.com for the intranet domain name.
Don't use the name of an existing corporation or product as your domain name.
Doing this might cause a name collision later.
Avoid the use of underscores (_) in domain names. Applications might be very
RFC-obedient and reject the name. They might also not install or work in your
domain. You might also experience problems that affect older DNS servers.
Don't use the name of a business unit or a division as a domain name. Business
units and other divisions change, and these domain names can be misleading or
become obsolete.
Don't use geographic names that are difficult to spell and remember.
Avoid extending the DNS domain name hierarchy more than five levels from the
root domain. You can reduce administrative costs by limiting the extent of the
domain name hierarchy.
If you're deploying DNS in a private network, and you don't plan to create an
external namespace, register the DNS domain name that you create for the
internal domain. Otherwise, if you try to use it on the internet, or if you connect
to a network that connects to the internet, you might find that the name is
unavailable.
Site names
We recommend that you use a valid DNS name when you create a new site name.
Otherwise, your site will be available only where a Microsoft DNS server is used. For
more information about valid DNS names, see the DNS host names section.
Allowed characters: DNS names can contain only alphabetic characters (A-Z),
numeric characters (0-9), the minus sign (-), and the period (.). Period characters
are allowed only if they're used to delimit the components of domain style names.
7 Note
The underscore has a special role. It's permitted for the first character in
SRV records by RFC definition. But newer DNS servers might also allow it
anywhere in a name. For more information, see Complying with Name
Restrictions for Hosts and Domains.
Additional rules:
All characters except for ASCII characters preserve their case formatting.
The first character must be alphabetic or numeric.
The last character must not be a minus sign or a period.
7 Note
OU names
Allowed characters: All characters are allowed, even extended characters.
Although Active Directory Users and Computers lets you name an OU with
extended characters, we recommend that you use names that describe the
purpose of the OU and that are short enough to easily manage. Lightweight
Directory Access Protocol (LDAP) doesn't have any restrictions because the CN of
the object is put into quotation marks.
Disallowed characters: No characters are disallowed.
name).
You delete the OU. During the tombstone lifetime of the deleted OU, you create a child
domain that has the same name. Then, you delete the child domain, and then create it a
second time. In this scenario, a duplicate record name in the ESE database causes a
phantom-phantom name collision when the child domain is re-created. This problem
prevents the Active Directory Configuration container from replicating.
7 Note
This problem is not restricted to DC and OU name types. A similar name conflict
might also occur for other RDN name types under certain conditions.
ANONYMOUS X X X X
AUTHENTICATED X X X
USER
BATCH X X X X
BUILTIN X X X X
CREATOR GROUP X X X X
Reserved words for Windows NT Windows Windows Windows Server
names 4.0 2000 Server 2003 2008 and later
CREATOR GROUP X X X X
SERVER
CREATOR OWNER X X X X
CREATOR OWNER X X X X
SERVER
DIALUP X X X X
DIGEST AUTH X X
DOMAIN X
ENTERPRISE X
INTERACTIVE X X X X
INTERNET X X X
LOCAL X X X X
LOCAL SYSTEM X X
NETWORK X X X X
NETWORK SERVICE X X
NT AUTHORITY X X X X
NT DOMAIN X X X X
NTLM AUTH X X
NULL X X X X
PROXY X X X
REMOTE INTERACTIVE X X
RESTRICTED X X X
SCHANNEL AUTH X X
SELF X X X
SERVER X X X
SERVICE X X X X
Reserved words for Windows NT Windows Windows Windows Server
names 4.0 2000 Server 2003 2008 and later
SYSTEM X X X X
TERMINAL SERVER X X X
THIS ORGANIZATION X X
USERS X X
WORLD X X X X
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you use the NET.EXE /ADD
command with user or group names longer than 20 characters.
Applies to: Windows 10 - all editions, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2
Original KB number: 324639
Symptoms
When you use the NET.EXE command together with the /ADD switch and long user or
group names, this only redisplays the NET syntax. You receive no error message.
Example:
Console
The same action does work with the GUI Computer Management, Local Users, and
Groups Microsoft Management Console (MMC).
Cause
The NET.EXE command does not support names longer than 20 characters for reasons
of backward compatibility with LAN Manager 2.0.
Resolution
If the graphical user interface (GUI) method cannot be used and a scripting method is
required, use the Windows 2000 Resource Kit utility Cusrmgr.exe. Or, use VBScript, using
an application programming interface (API) that supports names longer than 20
characters.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
More information
In the example in the "Symptoms" section of this article, use the following Cusrmgr.exe
syntax:
Console
This issue may also occur with localized versions in which built-in groups exceed the 20
character name limit. For example, with the German name for "Authenticated Users" (19
characters): "Authentifizierte Benutzer" (25 characters).
The following sample VBScript may be adapted and used as an additional workaround.
It adds "Authenticated Users" to "Power Users" for the English and German version:
Dim oContainer
Dim oGroup
Dim oIADs
Dim oComputerInformation
Dim bolGroupSet
bolGroupSet = False
End If
Next
If bolGroupSet = True Then 'if bolGroupSet is False there was nothing done
MsgBox "Group added successfully", vbInformation, "AddGroup"
Else
MsgBox "No action has taken place!", vbExclamation, "AddGroup"
End If
##### script end #####
Workaround
To work around this issue in Windows Server 2008 and later, use the Add-
ADGroupMember PowerShell command, as described in the following TechNet article:
Add-ADGroupMember
If you are using PowerShell 5.1, use the Add-LocalGroupMember -Group PowerShell
command, as described in the following article:
Add-LocalGroupMember
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the Netlogon service doesn't start
when you start a Windows-based computer.
Symptoms
When you start your Windows 2000-based computer, the Netlogon service doesn't start,
even though the Startup type is set to automatic.
Message 1
Output
Message 2
Output
After your computer starts, you can manually start the Netlogon service.
Cause
This issue can occur if either of the following conditions exist:
The dependent services of the Netlogon service have been changed from the
default values and are not properly configured. You may be unable to access some
network resources on the computer because the Netlogon service is not started.
You removed Client for Microsoft Networks, and then reinstalled it. The
dependencies are not reset correctly if the Client for Microsoft Networks
component is removed and then reinstalled.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
4. In the Multi-String Editor dialog box, type the following strings on separate lines,
and then click OK:
LanmanServer
LanmanWorkstation
Feedback
Was this page helpful? Yes No
This article helps to resolve the issue in which outdated cached credentials are used
when you run an elevated task.
7 Note
When you use an administrator account for the first time on the computer, the
administrator group membership and password are cached locally on the
computer.
When you run an elevated task by selecting the Run as Administrator option again,
you're still prompted for an administrator credential.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For protection, back up
the registry before you modify it so that you can restore it if a problem occurs. For
more information about how to back up and restore the registry, see How to back
up and restore the registry in Windows .
To resolve this issue, you can create a registry entry for authenticating the user
credentials at a domain controller first by using the following steps:
1. Select the Windows logo key+ R and type regedit in the Run dialog box, and then
press Enter.
7 Note
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
3. On the Edit menu, point to New, and then select DWORD (32-bit) Value.
7 Note
When the value of the InteractiveLogonFirst registry entry is set to 1, the domain
controller verification is required when you run an elevated task. If the domain
controller isn't available, the system uses the cached credentials internally.
Feedback
Was this page helpful? Yes No
This article helps fix an error that occurs when processing the password change for a
user where the password is expired or set to change at next logon.
Symptoms
You have a server in a DMZ that's not member of a domain. For administration, you
have a series of local users that are administrators.
When you add a new user on the server for administration, you set an initial password
and set "User must change password at next logon". The user logs on to the server
through Remote Desktop Services. The user is prompted to change the password, and
after entering it, the user receives an error message "Not enough storage is available to
process this command":
If the RDS server has NLA enabled the attempt to log on to the server fails with the
expired password showing the error:
[Window Title]
Remote Desktop Connection[Content]
Cause
When processing the password change for a user where the password is expired or set
to change at next logon, Winlogon uses an anonymous token to process the password
change request.
The password change dialog allows changing passwords against remote computers as
well, so the API calls use remotable interfaces through RPC over Named Pipes over SMB.
For this protocol sequence, the RPC runtime reads a policy setting
"Server2003NegotiateDisable" from the key
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc .
This fails in the context of the anonymous token as the default permissions allow only
authenticated users, administrators, and LocalSystem to read the key.
When NLA is enabled, the user session request doesn't validate and thus fails.
Resolution
The approaches to avoid this problem are:
1. Change the password remotely. Note that currently the user in the context you run
the remote password change needs to be able to log on to the target server with
the default credentials (or already connected using SMB to the server at the time
of the password change already).
2. Change the permissions of the key
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Rpc to allow
anonymous to read the key. If the key doesn't exist, you may create it and then
add the read permissions for the anonymous account.
7 Note
For approach 2, in an attempt to recover from an error, it might happen that the
group policy service deletes the keys and recreates them using default permissions.
In this case, you have to reapply the permissions.
You can automate setting the permissions on using Registry Security Policy when the
machine is member of the domain. For workgroup machines you can import this text as
rpc-pol.inf file:
INF
---------------------------
[Unicode]
Unicode=yes
[Version]
signature="$CHICAGO$"
Revision=1
[Registry Keys]
"MACHINE\SOFTWARE\Policies\Microsoft\Windows
NT\rpc",0,"D:PAR(A;CIIO;KA;;;CO)(A;CI;KA;;;SY)(A;CI;KA;;;BA)(A;CI;KR;;;S-1-
5-7)(A;CI;KR;;;BU)"
------------------------------
More information
The functionality to change workgroup or remote member machine passwords needs to
take a number of compatibility requirements into account. The scenario is very much a
borderline topic by today.
For RDS sessions secured with NLA, it's not allowing starting a remote session with an
expired password to begin with. If you want to use NLA, you have to change the
password remotely up-front in a session authenticated with another user.
Feedback
Was this page helpful?
Yes No
Summary
Windows uses many different mechanisms for changing passwords. This article
describes those mechanisms.
More information
The supported password-change protocols are:
Change-password operations require that the user's current password be known before
the change is allowed. Set-password operations don't have this requirement, but are
controlled by the Reset Password permissions on the account.
When you're using LDAP (method 5), the domain controller and the client must both be
able to use 128-bit SSL to protect the connection. If the domain controller isn't
configured for SSL or if appropriately long keys aren't available, the password-change
write is denied.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you reset the password of a
user.
Symptoms
You have the task to manage users in your domain and you need to reset the password
of a user. You can right-click the user and select Reset Password and enter the new
password. After you click OK, you receive the error message:
Windows cannot complete the password change for <user name> because:
The System cannot find the path specified
The password for the user isn't changed afterwards. The same task may work with other
administrator user accounts, and also for the same administrator accounts on other
workstations. Resetting the user password may also work through other tools, for
example using the LDIFDE as outlined in How to set a user's password with Ldifde.
Cause
The dialog handler function encrypts the new password strings when it pulls them from
the edit controls. The encryption fails because it doesn't find the supporting files in the
user AppData folder in the following location:
%AppData%\Microsoft\Protect\<user sid>
This may happen if the AppData user shell folder is redirected to a different location
without moving or copying the original data. The folder location is specified in the
AppData registry value in the following registry location:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell
Folders
Resolution
To resolve the problem, either move or copy the original data to the redirected location,
or revert the redirection of the AppData folder.
Using the Process Monitor tool, you can see the LSASS.EXE process will fail to open files
in the AppData path after the new password dialog is acknowledged. For more
information about the Process Monitor tool, visit the following Microsoft Web site:
Process Monitor v3.60
More information
Microsoft recommends using Folder Redirection Policies to redirect parts of the user
profile to different locations. These policies also allow the contents of the folder to be
moved automatically.
Feedback
Was this page helpful? Yes No
For example, poor performance might occur when using scripts or tools (such as
Cacls.exe, Xcacls.exe, icacls.exe, Dsacls.exe, and Subinacl.exe) to call the functions to edit
security settings.
The problem may show up when you have many trusted domains or forests (applies to
both external and forest trusts), and/or some of these domains or forests are offline or
slow to respond.
When the functions are called for an isolated name (the format is AccountName in
contrast to domain\AccountName), a remote procedure call (RPC) is made to domain
controllers on all trusted domains/forests. This issue might occur if the primary domain
has many trust relationships with other domains/forests or if it's doing many lookups at
a same time. For example, a script is configured to run at the startup of many clients, or
many trusted domains/forests use the same script simultaneously.
7 Note
Here's how to create a registry entry to disable the lookup of isolated names in trusted
domains/forests:
) Important
This article contains instructions to modify the registry. Severe issues might occur if
the registry is modified incorrectly. As a precaution, back up the registry before you
modify it. For more information about how to back up, restore, and modify the
registry, see How to back up and restore the registry in Windows .
2. Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa .
7 Note
More information
The lookup functions can directly target a domain controller on an appropriate domain
for the following name formats that contain an authoritative domain of a security
principal:
NetBIOSDomainName\AccountName
DnsDomainName\AccountName
AccountName@DnsDomainName
For more information, see Network access validation algorithms and examples for
Windows.
Feedback
Was this page helpful? Yes No
Provide product feedback
Redirect the users and computers
containers in Active Directory domains
Article • 02/19/2024
You can use redirusr and redircmp to redirect user, computer, and group accounts that
are created by earlier-version APIs. So they are put in admin-specified organizational
unit (OU) containers.
Summary
In a default installation of an Active Directory domain, user, computer, and group
accounts are put in CN=objectclass containers instead of a more desirable OU class
container. Similarly, the accounts that were created by using earlier-version APIs are put
in the CN=Users and CN=computers containers.
) Important
More information
Users, computers, and groups created by earlier-version APIs place objects in the DN
path that's specified in the WellKnownObjects attribute. The WellKnownObjects attribute
is located in the domain NC head. The following code example shows the relevant paths
in the WellKnownObjects attribute from the CONTOSO.COM domain NC head.
Dn: DC=CONTOSO,DC=COM
conosle
wellKnownObjects (11):
B:32:6227F0AF1FC2410D8E3BB10615BB5B0F:CN=NTDS Quotas,DC=CONTOSO,DC=COM;
B:32:F4BE92A4C777485E878E9421D53087DB:CN=Microsoft,CN=Program
Data,DC=CONTOSO,DC=COM;
B:32:09460C08AE1E4A4EA0F64AEE7DAA1E5A:CN=Program Data,DC=CONTOSO,DC=COM;
B:32:22B70C67D56E4EFB91E9300FCA3DC1AA:CN=ForeignSecurityPrincipals,DC=CONTOS
O,DC=COM;
B:32:18E2EA80684F11D2B9AA00C04F79F805:CN=Deleted Objects,DC=CONTOSO,DC=COM;
B:32:2FBAC1870ADE11D297C400C04FD8D5CD:CN=Infrastructure,DC=CONTOSO,DC=COM;
B:32:AB8153B7768811D1ADED00C04FD8D5CD:CN=LostAndFound,DC=CONTOSO,DC=COM;
B:32:AB1D30F3768811D1ADED00C04FD8D5CD:CN=System,DC=CONTOSO,DC=COM;
B:32:A361B2FFFFD211D1AA4B00C04FD7D83A:OU=Domain
Controllers,DC=CONTOSO,DC=COM;
B:32:AA312825768811D1ADED00C04FD8D5CD:CN=Computers,DC=CONTOSO,DC=COM;
B:32:A9D1CA15768811D1ADED00C04FD8D5CD:CN=Users,DC=GPN,DC=COM;
For example, the following operations use earlier-version APIs, which rely on the paths
defined in the WellKnownObjects attribute:
Domain Join UI
NET COMPUTER
NET GROUP
NET USER
NETDOM ADD, where the /ou command is either not specified or supported
It's helpful to make the default container for user, computer, and security groups an OU
for several reasons, including:
The best practice is to arrange security principals into an OU hierarchy that mirrors
your organizational structure, geographic layout, or administration model.
The target domain must be configured to run in the Windows Server 2003 domain
functional level or higher. For the Windows Server 2003 domain functional level, it
means that:
Windows Server 2003 ADPREP /FORESTPREP or newer
Windows Server 2003 ADPREP /DOMAINPREP or newer
All domain controllers in the target domain must run Windows Server 2003 or
newer.
Windows Server 2003 domain functional level or higher must be enabled.
Windows Server 2008 and newer versions of the Active Directory Users and
Computers snap-in feature a Protect object against accidental deletion check box
that you can select when you create a new OU container. You can also select it on
the Object tab of the Properties dialog box for an existing OU container.
Redirecting CN=USERS affects the default location for new users, groups, and trust
user accounts. Trust user accounts are hidden in most UI admin tools, but you can
show and move them in tools like LDIFDE and LDP. The CN of the account is
<downlevel domain name>$, for example, "contoso$".
If you experience Exchange Server Active Directory preparation failures, make sure
you're running the latest cumulative update and security update.
2. Transition the domain to the Windows Server 2003 domain functional level or
newer in either the Active Directory Users and Computers snap-in (Dsa.msc) or the
Domains and Trusts (Domains.msc) snap-in. For more information about increasing
the domain functional level, see How to raise domain and forest functional
levels .
3. Create the OU container where you want users and groups who are created with
earlier-version APIs to be located, if the OU container that you want doesn't exist.
4. Run Redirusr.exe at the command prompt by using the following syntax. In the
command, container-dn is the distinguished name of the OU that will become the
default location for newly created user and group objects created by down-level
APIs:
Console
c:\windows\system32\redirusr container-dn
Redirusr is installed in the %SystemRoot%\System32 folder on Windows Server 2003-
based or newer computers. For example, to change the default location for users
who are created with down-level APIs such as Net User to the OU=MYUsers OU
container in the CONTOSO.COM domain, use the following syntax:
c:\windows\system32>redirusr ou=myusers,DC=contoso,dc=com
7 Note
To delete the container, you have to move out the default users and groups to
other OUs and containers, and also the trust user accounts. These trust
accounts can be shown and moved using tools like LDIFDE and LDP. We
recommend keeping the container unchanged and the default accounts in
place for consistency.
2. Transition the domain to the Windows Server 2003 domain in the Active Directory
Users and Computers snap-in (Dsa.msc) or in the Domains and Trusts
(Domains.msc) snap-in. For more information about increasing the domain
functional level, see How to raise domain and forest functional levels .
3. Create the OU container where you want computers that are created with earlier-
version APIs to be located, if the desired OU container doesn't exist.
redircmp container-dn
Console
C:\windows\system32>redircmp ou=mycomputers,DC=contoso,dc=com
7 Note
Error message 1:
Error, could not locate the Primary Domain Controller for the current domain:
The specified domain either does not exist or could not be contacted.
Redirection was NOT successful.
Error message 2:
Error, could not locate the Primary Domain Controller for the current domain:
The specified domain either does not exist or could not be contacted.
Redirection was NOT successful.
Error message 1:
C:>redirusr OU=usersou,DC=contoso,dc=comDC=company,DC=com
Error, unable to modify the wellKnownObjects attribute. Verify that the domain
functional level of the domain is at least Windows Server 2003: Unwilling To
Perform Redirection was NOT successful.
Error message 2:
C:>redircmp ou=computersou,DC=contoso,dc=comdc=company,dc=com
Error, unable to modify the wellKnownObjects attribute. Verify that the domain
functional level of the domain is at least Windows Server 2003: Unwilling To
Perform
Error message 1
C:>redircmp OU=computersou,DC=contoso,dc=comDC=company,DC=com
Error, unable to modify the wellKnownObjects attribute. Verify that the domain
functional level of the domain is at least Windows Server 2003: Insufficient
Rights Redirection was NOT successful.
Error message 2:
C:>redirusr OU=usersou,DC=contoso,dc=comDC=company,DC=com
Error, unable to modify the wellKnownObjects attribute. Verify that the domain
functional level of the domain is at least Windows Server 2003: Insufficient
Rights Redirection was NOT successful.
Error message 1:
Error, unable to modify the wellKnownObjects attribute. Verify that the domain
functional level of the domain is at least Windows Server 2003: No Such Object
Redirection was NOT successful.
Error message 2:
Error, unable to modify the wellKnownObjects attribute. Verify that the domain
functional level of the domain is at least Windows Server 2003: No Such Object
Redirection was NOT successful.
Output
Feedback
Was this page helpful? Yes No
This article describes how to rename an object after a replication collision has occurred.
Summary
When a replication collision occurs, objects that were created on two or more different
domain controllers with the same RDN (Relative Distinguished Name) and in the same
container may be renamed. For example, the name changes from
CN=APPSRV,OU=Domain Controllers,DC=domain,DC=com to the following:
CN=APPSRVCNF:b9e0025c-f9b0-48f0-ba7b-a77447716911,OU=Domain
Controllers,DC=domain,DC=com
Many tools and wizards, including the Active Directory Installation Wizard, may not work
correctly because of the length of the new name of the object. Therefore, after the
conflicting objects have been manually resolved, it is best to change the name back to
the original name.
7 Note
To get the changed RDN, you can use the LDIFDE utility. This utility can support
batch operations that are based on the LDIF (LDAP Data Interchange Format) file
format standard. You can export all the information from Active Directory to a file
by using this utility.
For example, if you want to export the following information to a file that is named
Bluesky.txt, type the following at a command prompt, and then press ENTER:
Console
Running this command exports all information from the Active Directory to the
specified file (Bluesky.txt). From the specified text file, you can find the new RDN.
For more information about LDIFDE utility program, see Step-by-Step Guide to
Bulk Import and Export to Active Directory.
The new RDN contains characters that you cannot use in a literal string; therefore,
you have to encode the RDN by using Base 64. After the following RDN is encoded
in Base 64:
CN=APPSRVCNF:b9e0025c-f9b0-48f0-ba7b-a77447716911,OU=Domain
Controllers,DC=domain,DC=com
Q049QVBQU1JWQ05GOmI5ZTAwMjVjLWY5YjAtNDhmMC1iYTdiLWE3NzQ0Nzc
xNjkxMSxPVT1Eb21haW4gQ29udHJvbGxlcnMsREM9ZG9tYWluLERDPW
3. Rename the changed RDN. To rename the changed RDN follow these steps:
a. Create a file with an extension .ldf. When you modify attributes in Active
Directory, it is important that the following format be followed:
dn:: represents the current RDN in base 64. The (::) instructs Ldifde that the
following string is Base 64 encoded.
Running this command changes the RDN, using the LDIFDE utility, to the new
RDN that is specified by you in the LDIF file (Changerdn.ldf).
When you run this command, you may receive an output that is similar to the
following:
Connecting to "appsrv.domain.com"
Logging in as current user using SSPI
Importing directory from file "changedc.ldf"
Loading entries
1: CN=APPSRVCNF:b9e0025c-f9b0-48f0-ba7b-a77447716911,OU=Domain
Controllers,DC=domain,DC=com
Entry DN: CN=APPSRVCNF:b9e0025c-f9b0-48f0-ba7b-
a77447716911,OU=Domain Controllers,DC=domain,DC=com change: dn
Renaming to cn=APPSRV with deleteold of 1
Entry modified successfully.
1 entry modified successfully.
The command has completed successfully.
This process can change the name back to Appsrv. This change is relational so
all references to this object are changed in the Active Directory.
When you correct the name on the domain controllers' objects, ensure that you change
the name back to what it had been originally. This change does not rename the domain
controller. If you rename a domain controller, it is not supported in Windows 2000.
Feedback
Was this page helpful? Yes No
This article describes how to restrict use of a computer to one domain user only.
Symptoms
When you create trust connection/s from one domain(forest) to another, users have the
option to sign in different domain/s than their home domain (The domain that host
their account/s).
Cause
Trust connection/s from one domain to another or/and one forest to another enable
user to log in different domain/s than their home domain (The domain that host their
account/s). The "Authenticated Users" group on each computer allow users from trusted
domain to be authenticated and logon to computer.
Resolution
1. Create a new domain-wide GPO and enable "Deny logon locally" user right to the
source domain user account/sIn the target domain.
7 Note
Some services (Like Backup software services) may effect by this policy, and
wouldn't function. To eliminate future problems, apply this policy and use
GPO security filter feature.
2. Choose on "Manage".
4. Select on "Groups".
7. Add the require user/s or and group/s to the "Users" local group.
2. Write "Gpedit.msc"
3. Enable "Deny logon locally" user right to the source domain user accounts.
7 Note
Some services (Like Backup software services) may effect by this policy, and
wouldn't function.
More information
Community Solutions Content Disclaimer
Microsoft corporation and/or its respective suppliers make no representations about the
suitability, reliability, or accuracy of the information and related graphics contained
herein. All such information and related graphics are provided "as is" without warranty
of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and
conditions with regard to this information and related graphics, including all implied
warranties and conditions of merchantability, fitness for a particular purpose,
workmanlike effort, title and non-infringement. You specifically agree that in no event
shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental,
special, consequential damages or any damages whatsoever including, without
limitation, damages for loss of use, data or profits, arising out of or in any way
connected with the use of or inability to use the information and related graphics
contained herein, whether based on contract, tort, negligence, strict liability or
otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of
damages.
Feedback
Was this page helpful? Yes No
This article describes limitations to the resultant set of policy (RSoP) planning mode
when you try to use it across multiple forests.
Applies to: Windows 10 - all editions, Windows Server 2012 R2, Windows Server 2016,
Windows Server 2019
Original KB number: 910206
Symptoms
You cannot use the RSoP planning mode to plan for scenarios that span forests in
Windows Server 2003 and later versions. For example, you cannot plan for a scenario in
which a user logs on to a workstation in Forest 1 from Forest 2. When you try to run
RSoP planning mode in a cross-forest environment, you receive the following Group
Policy error message:
Cause
This issue occurs because RSoP planning mode does not support cross-forest scenarios.
In many scenarios, RSoP cannot validate the information that is returned from a domain
controller that is located in another forest. The Authenticated Users group must have
read permissions for relevant policies to successfully read a particular policy in a cross-
forest environment.
Feedback
Was this page helpful? Yes No
This article describes how to set a user's password by using the Ldifde tool.
More information
The password attribute used by Active Directory is "unicodePwd". This attribute can be
written under restricted conditions, but cannot be read. This attribute can only be
modified, not added on object creation or read by a search.
To modify this attribute, the client must have a 128-bit Secure Sockets Layer/Transport
Layer Security(SSL/TLS) or SASL encrypted connection to the server. The High Encryption
pack must be installed on both the client and the server.
7 Note
When you want to use SASL encryption, you can use the "/h" argument of LDIFDE.
When you use a base-64 encoder, you must make sure that it supports Unicode, or
you will create an incorrect password.
There are two ways to modify the unicodePwd attribute. The first is analogous to a
typical user change-password operation. In this case, the modify request must contain
both a delete operation and an add operation. The delete operation must contain the
current password enclosed in quotation marks and be Base64 encoded as described in
RFC 1521. The add operation must contain the new password enclosed in quotation
marks and be Base64 encoded.
SSL/TLS:
ldifde -i -f chPwd.ldif -t 636 -s \<dcname> -b \<username> \<domain> \
<password>
SASL:
ldifde -i -f chPwd.ldif -h -s \<dcname> -b \<username> \<domain> \<password>
If the password does not fulfill the criteria of the enforced Password Policies, then it will
throw an error:
Add error on entry starting on line 1: Unwilling To Perform The server-side error is
"A device attached to the system is not functioning
RFC 1521
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft does not guarantee the
accuracy of this third-party contact information.
Feedback
Was this page helpful? Yes No
This article describes some applications and application programming interfaces (APIs)
must have access to the token-groups-global-and-universal (TGGAU) attribute on user
account objects, or on computer account objects in the Active Directory directory
service.
Summary
Some applications have features that read the token-groups-global-and-universal
(TGGAU) attribute on user account objects or on computer account objects in the
Microsoft Active Directory directory service. Some Win32 functions make it easier to
read the TGGAU attribute. Applications that read this attribute or that call an API
(referred to as a function in the rest of this article) that reads this attribute don't succeed
if the calling security context doesn't have access to the attribute.
More information
The token-groups-global-and-universal (TGGAU) attribute is a dynamically computed
value on computer account objects and on user account objects in Active Directory. This
attribute enumerates the global group memberships and the universal group
memberships for the corresponding user account or computer account. Applications
can use the group information that is provided by the TGGAU attribute to make various
decisions about a specific user when the user isn't logged on.
For example, an application can use this information to determine whether a user has
been granted access to a resource that the application controls access for. Applications
that require this information can read the TGGAU attribute directly by using either
Lightweight Directory Access Protocol interfaces or Active Directory Services Interfaces.
However, Microsoft Windows Server 2003 introduced several functions (including the
AuthzInitializeContextFromSid function and the LsaLogonUser function) that simplify
reading and interpretation of the TGGAU attribute. Therefore, applications that use
these functions may unknowingly be reading the TGGAU attribute.
For applications to be able to directly read this attribute or indirectly read this attribute
(through the use of an API), the security context that the application runs in must have
been granted read access to the TGGAU object on the user objects and on the computer
objects. You do not expect applications to assume that they have access to TGGAU.
Therefore, you can expect applications to be unsuccessful when access is denied. In this
situation, you (the user) may receive an error message or a log entry that explains that
access was denied while trying to read this information, and that provides instructions
about how to obtain access (as described later in this article).
For domains that use existing applications, you can handle these applications by adding
the security contexts that those applications run as to the Pre-Windows 2000
Compatible Access group. Instead, you can select the "Permissions compatible with
pre-Windows 2000 servers" option during the DCPromo process when you create a
domain. (On Windows Server 2003, this option is worded as follows: "Permissions
compatible with pre-Windows 2000 server operating systems".) This selection adds
the Everyone group to the Pre-Windows 2000 Compatible Access group, and thereby
grants the Everyone group read access to the TGGAU attribute and to many other
domain objects.
When a new Windows Server 2003 domain is created, the default access compatibility
selection is Permissions compatible only with Windows 2000 or Windows Server 2003
operating systems. When this option is set, the Pre-Windows 2000 Compatibility
Access group includes only the Authenticated Users built-in security identifier, and read
access to the TGGAU attribute on objects is limited. In this case, applications that require
access to the TGGAU group are denied access unless the account under which the
applications run has domain administrator rights or similar user rights.
Enabling Applications to read the TGGAU
attribute
To simplify the process of granting read access on the token-groups-global-and-
universal (TGGAU) attribute to users who must read the attribute, Windows Server 2003
introduces the Windows Authorization Access (WAA) group.
On new installations of Windows Server 2003 domains, the WAA group is granted
access to the read TGGAU attribute on user objects and on group objects.
If the domain isn't in pre-Windows 2000 compatibility access mode, you may have to
enable certain applications to read the TGGAU. Because the Windows Authorization
Access Group doesn't exist on Windows 2000, it's recommended that you create a
domain local group for this purpose, and that you add the user or computer account
that requires access to the TGGAU attribute to that group. This group would have to be
given access to the tokenGroupsGlobalAndUniversal attribute on user objects, on
computer objects, and on iNetOrgPerson objects.
If the mixed mode domain isn't in pre-Windows 2000 compatibility access mode, you
can grant permissions by means of the WAA group:
The WAA group is automatically created when a Windows Server 2003 domain
controller is promoted to the Floating Single Master Operations Server.
The WAA group isn't automatically granted access to the TGGAU attribute on
mixed-mode domains and on upgraded domains.
After the Windows Authorization Access (WAA) group has access to the TGGAU
attribute, you can place the accounts that require access in the WAA group.
If the domain isn't in pre-Windows 2000 compatibility access mode, add to the WAA
group those accounts that require access to TGGAU. In new installations of Windows
Server 2003, the WAA group already has read access to TGGAU on user objects and on
computer objects.
Feedback
Was this page helpful? Yes No
This article describes the Lingering Object Liquidator (LoL) tool for finding and removing
lingering objects.
Introduction
The Lingering Object Liquidator (LOL) is a tool to automate the discovery and removal
of lingering objects. The tool uses the DRSReplicaVerifyObjects method, which is
leveraged by the repadmin /removelingeringobjects command and the repldiag tool in
combination with the removeLingeringObject rootDSE primitive that's used by LDP.EXE.
See this ASKDS blog post for detailed instructions on tool usage.
Key features
Removes all the lingering objects across all domain controllers (DCs) without any
prompting.
Performs an (n * (n-1)) comparison across every DC in the forest.
Performs topology detection, which lets you pick and choose DCs to use for
Lingering object comparison (source and target).
Exports a list of lingering objects as a CSV file, so that it can be edited offline and
then imported back into the tool to remove the objects if necessary (useful for
advanced removal operations).
Saves the contents of the object in a log file in case a new object must be hydrated
from the lingering object.
Tools requirements
Download and run Lingering Object Liquidator on a DC or member computer in
the forest you want to remove lingering objects from.
The Microsoft .NET Framework 4.5.2 must be installed on the computer that's
running the tool.
Permissions: The user account running the tool must have Domain Administrator
credentials for each domain in the forest that the executing computer resides in.
Members of the Enterprise Administrators group have domain administrator
credentials in all domains within a forest by default. Domain Administrator
credentials are sufficient in a single domain or a single domain forest.
You must enable the Remote Event Log Management (RPC) firewall rule on any DC
that needs scanning. Otherwise, the tool returns an "Exception: The RPC server is
unavailable" error.
ノ Expand table
Walkthrough
7 Note
You will receive error 8453 if the tool isn't run as elevated.
Fast detection populates the Naming Context, Reference DC, and Target DC lists by
querying the local DC. Thorough detection does a more exhaustive search of all
DCs and leverages DC Locator and DSBind calls. Be aware that Thorough detection
will likely fail if one or more DCs are unreachable.
Naming Context
Reference DC
This is the DC you'll compare to the target DC. The reference DC hosts a writeable
copy of the partition.
7 Note
All DCs in the forest are displayed even if they are unsuitable as reference DCs
(ChildDC2 is an RODC and is not a valid Reference DC since it doesn't host a
writable copy of a DC).
Target DC
3. Click Detect to use these DCs for the comparison or leave all fields blank to scan
the entire environment.
The tool does a comparison with all DCs for all partitions in a pair-wise fashion
when all fields are left blank. In a large environment, this comparison will take a
great deal of time (possibly even days) as the operation targets (n * (n-1)) number
of DCs in the forest for all locally held partitions. For shorter, targeted operations,
select a naming context, reference DC, and target DC. The reference DC must hold
a writable copy of the selected naming context. Be aware that clicking Stop doesn't
actually stop the server-side API, it just stops the work in the client-side tool.
During the scan, several buttons are disabled, and the current count of lingering
objects is displayed on the status bar at the bottom of the screen, together with
the current tool status. During this execution phase, the tool is running in an
advisory mode and reading the event log data that's reported on each target DC.
When the scan is complete, the status bar updates, buttons are re-enabled, and
total count of lingering objects is displayed. The Results pane at the bottom of the
window updates with any errors encountered during the scan.
If you see error 1396 or error 8440 in the status pane, you're using an early beta-
preview version of the tool and should update to the latest version. - Error 1396 is
logged if the tool incorrectly used an RODC as a reference DC. - Error 8440 is
logged when the targeted reference DC doesn't host a writable copy of the
partition.
Results of the scan are logged in the Results pane. Many more details of all
operations are logged in the linger<Date-TimeStamp>.log.txt file in the same
directory as the tool's executable.
The Export button allows you to export a list of all lingering objects listed in the
main pane into a CSV file. View the file in Excel, modify if necessary and use the
Import button later to view the objects without having to do a new scan. The
Import feature is also useful if you discover abandoned objects (not discoverable
with DRSReplicaVerifyObjects) that you need to remove.
The tool dumps a list of attributes for each object before removal and logs this
along with the results of the object removal in the removedLingeringObjects.log.txt
log file. This log file is in the same location as the tool's executable.
C:\tools\LingeringObjects\removedLingeringObjects<DATE-TIMEStamp.log.txt
After all objects are identified, they can be bulk-removed by selecting all objects
and then Remove, or exported into a CSV file. The CSV file can later be imported
again to do bulk removal. Be aware that there's a Remove All button that leverages
the repadmin /removelingeringobject method of lingering object removal
Support: While this tool has been thoroughly tested in many environments, it's
provided to you as-is: There will be no official Microsoft support provided.
Add a comment to this blog post , or submit an idea to our UserVoice Feedback
page--ensure you code the idea using the "Lingering Object Liquidator" category.
Access the Troubleshooting Active Directory Lingering Objects TechNet Virtual Lab if
you would like practice using this tool in a lab environment containing lingering objects.
Workflow
More information
ノ Expand table
This article provides a solution to an error that occurs when try to add more than 64
logon workstations.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1
Original KB number: 938458
Symptoms
In Active Directory Users and Computers, you try to add more than 64 logon
workstation entries on the Logon To tab in the user account properties dialog box. After
you do this, you may receive the following error message:
This property is limited to 64 values. You must remove some of the existing values
before you can add new ones.
Cause
This problem occurs because the User-Workstations attribute has a Range-Upper value
of 1,024 characters. When you enter the NetBIOS computer names by using Active
Directory Users and Computers, the NetBIOS name has a maximum length of 16
characters. Therefore, you can store only 64 logon workstation entries.
Status
This behavior is by design.
7 Note
You can change the rangeUpper value on the User-Workstations attribute in the
schema to a value up to 8192 to allow more entries in the list. Microsoft does not
recommend higher values as you might hit object size limits.
More information
rangeUpper is the Ldap-Display-Name for the Range-Upper value. Range-Upper is the
maximum value or the maximum length of an attribute. The User-Workstations attribute
is defined in the userWorkstations property of a user. The User-Workstations attribute is
a single-valued property that represents a comma-separated list of NetBIOS computer
names.
For more information about the User-Workstations attribute, visit the following
Microsoft Web site: User-Workstations attribute
Feedback
Was this page helpful? Yes No
This article describes symptoms, cause, and resolution steps for cases where AD
operations fail with Win32 error 8589.
7 Note
Home users: This article is only intended for technical support agents and IT
professionals. If you're looking for help with a problem, please ask the Microsoft
Community .
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2703028
Symptoms
Error 8589: "The DS cannot derive a service principal name (SPN) with which to
mutually authenticate the target server because the corresponding server object in
the local DS database has no serverReference attribute.
You will see any of the following errors/warning when troubleshooting Active Directory
replication.
1. DCDIAG reports that the Active Directory Replications test has failed with error
status (8589): The DS cannot derive a service principal name (SPN) ith which to
mutually authenticate the target server because the corresponding server object in
the local DS database has no serverReference attribute.
The DS cannot derive a service principal name (SPN) with which to mutually
authenticate the target server because the corresponding server object in the
local DS database has no serverReference attribute.
Event String: The attempt to establish a replication link for the following
writable directory partition failed.
Directory partition:
DC=ForestDnsZones,DC=contoso,DC=com
Source domain controller:
CN=NTDS Settings,CN=DCSRV01,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=contosoDC=com
Source domain controller address:
User Action
Verify if the source domain controller is accessible or network connectivity is
available.
Additional Data
Error value:
8589
The DS cannot derive a service principal name (SPN) with which to mutually
authenticate the target server because the corresponding server object in the
local DS database has no serverReference attribute.
3. REPADMIN.EXE reports that the last replication attempt has failed with status 8589
REPADMIN commands that commonly cite the 8589 status include but are not
limited to:
REPADMIN /SHOWREPL
REPADMIN /SHOWREPS
REPADMIN /REPLSUM
REPADMIN /SYNCALL
The DS cannot derive a service principal name (SPN) with which to mutually
authenticate the target server because the corresponding server object in the
local DS database has no serverReference attribute.
4. Events in the Directory Services event log that cite the error status 8589
Events, which commonly cite the 8589 status, include but are not limited to:
ノ Expand table
NTDS KCC 1925 The attempt to establish a replication link for the
following writable directory partition failed.
Cause
The event most commonly occurs on a DC after a replication partner has been forcefully
demoted and repromoted prior to allowing end-to-end replication to complete. This can
also happen when you rename a domain controller and the serverReference attribute is
not updated. The serverReference attribute in this instance is the Server object viewable
in the Active Directory Sites and Services MMC (adsiedit.msc). The server object is the
parent object of the domain controller's NTDS Settings object.
Resolution
Verify the serverReference attribute is not missing or set to an incorrect value and
update it to the correct value.
1. Find the domain controller that is referenced in the event ID 1411. There are a few
options we can use to find this. The simples is to use ping (option A). If ping fails,
use PowerShell (option B). If PowerShell is not an option, then you can use ldp.exe
(option C). (Note: if your DCs are 2003 and you are not able to install PowerShell
on it, you may use PowerShell from a Windows 7 domain joined client or a
Windows 2008 or Windows 2008 R2 server)
Option A
Use NSLookup or ping to find the DC listed in <source DC NTDS Settings Obejct
GUID>._msdcs.contoso.com
Example:
Ping 3dab7f9b-92e7-4391-b8db-71df532c1493._msdcs.contoso.com
Console
Option B
Use PowerShell to find the DC referenced. There are two PowerShell methods you
can use. To do this open the "Active Directory Module for Windows PowerShell"
Method 1: Run the following two PowerShell cmdlets. In the first cmdlet, replace
the partition name CN=Configuration,DC=contoso,DC=com with the DN of your
Configuration partition. Replace the server name DCSRV01.contoso.com with the
name of your domain controller. In the second cmdlet, replace the GUID 3dab7f9b-
92e7-4391-b8db-71df532c1493 with the GUID in your event ID 1411.
PowerShell
Method 2: Another PowerShell option is to run the following and then search the
output text file. Replace the DCSRV01.contoso.com with a DC in your environment.
PowerShell
Option C
Use Ldp.exe
a. Click Start, and then click Run
b. Type LDP.exe and then press ENTER.
c. On the Connections menu, click Bind and click OK.
d. On the View menu, click Tree.
e. In BaseDN, click the drop-down list arrow, click the distinguished name of your
Configuration partition and click OK.
f. In the Options menu, click Controls.
g. In the Controls dialog box, expand the Load Predefined menu, click Return
deleted objects and click OK.
7 Note
Option D
a. Obtain repadmin /showrepl output from the destination DC reporting the 8589
status.
b. Using the repadmin /showrepl output obtained from the previous step, identify
the 8589 replication status within the output and document the date and time-
stamp following the Last Attempt message.
c. Using the date and timestamp from the previous step, locate the corresponding
event ID 1411 in the Directory Services event log on the destination DC. Take
note that the DSA object GUID listed in the repadmin /showrepl output is
different from what is reported in the event ID 1411.(see example scenario
below)
d. Then find the domain controller listed in the event ID 1411, by either checking
the NTDS Settings Properties General Tab or by pinging the GUID in the event
ID.
e. Bind to the Source DC using ADSIEDIT or Active Directory Users and Computers
and open up the Attribute Editor and copy the value in serverReference. Paste in
the value of this attribute on the destination DCs copy of the object. (Step 2)
2. Once you have located the server being referenced using one of the above
methods, do the following:
a. Click Start, and then click Run
b. Type ADSIEDIT.msc and press ENTER
c. Right-click " ADSI Edit " and select " Connect to... "
d. In " Connection Point " under " Select a well known Naming Context: " select "
Configuration " and click OK.
e. On left pane, expand " Configuration "
f. Next expand " CN=Configuration,DC=contoso,DC=com "
g. Next expand " CN=Sites "
h. Under CN=Sites, expand the site in which the server is located. Example:
Default-First-Site-Name
i. Under that site expand CN=Servers. Example: If DCSRV02 is in the Default-First-
Site-Name site in Contoso.com, you should be in: CN=DCSRV02, CN=Servers,
CN=Default-First-Site-Name, CN=Sites, CN=Configuration, DC=contoso,
DC=com
j. Right click on the domain controller (found using Option A, B, or C) and select
Properties.
k. In the " Attribute Editor " tab scroll down to serverReference attribute.
l. The serverReference should be similar to CN=DCSRV02,OU=Domain
Controllers,DC=Contoso,DC=com If it's missing or incorrect then change it to
the correct value.
m. Close ADSIEDIT.msc
More information
Example Scenario
1. Obtain repadmin /showrepl output from the destination DC reporting the 8589
status.
2. Using the repadmin /showrepl output obtained from the previous step, identify the
8589 replication status within the output and document the date and time-stamp
following the Last Attempt message.
DC=Contoso,DC=com
CN=Configuration,DC=Contoso,DC=com
Using the date and timestamp from the previous step, locate the corresponding event
ID 1411 in the Directory Services event log on the destination DC. Take note that the
DSA object GUID listed in the repadmin /showrepl output is different from what is
reported in the event ID 1411.
The call was denied. Communication with this directory service might be affected.
Additional Data
Error value:
8589 The DS cannot derive a service principal name (SPN) with which to mutually
authenticate the target server because the corresponding server object in the local
DS database has no serverReference attribute.
Click Cancel and then view the properties for the server object (5thWardCorpDC in this
example) select the Attribute Editor tab (Server 2008 and later) or use ADSIEDIT to edit
the object on Server 2003
Notice that the serverReference attribute is not set in the following image
Bind to the Source DC using ADSIEDIT or Active Directory Users and Computers and
open up the Attribute Editor and copy the value in serverReference. Paste in the value of
this attribute on the destination DCs copy of the object.
After the serverReference attribute is set correctly for the domain controller is shows as
follows:
Feedback
Was this page helpful? Yes No
This article describes how to remotely administer computers by using the Administration
Tools Pack.
Applies to: Windows 10 - all editions, Windows 7 Service Pack 1, Windows Server 2012
R2
Original KB number: 304718
Summary
This article describes options to administer computers that are running Windows Server
2003, Windows XP, or Microsoft Windows 2000. Additionally, this article discusses how
to download the Windows Server 2003 Administration Tools Pack (Adminpak). This
article also discusses the various compatibility issues that occur when you remotely
administer Windows 2000-based computers from Windows XP-based computers and
from Windows Server 2003-based computers and vice versa.
Introduction
The following topics are discussed in this article:
Options to remotely administer computers that are running Windows Server 2003,
Windows XP, or Windows 2000.
Download locations for the original-release (RTM), Service Pack 1, and Service Pack
2 versions of the Windows Server 2003 Administration Tools Pack
Issues that are specific to the administration of 64-bit versions of Windows
Compatibility issues that occur when Windows 2000 Professional-based computers
that have Windows 2000 administration tools installed are upgraded to Windows
XP.
Compatibility issues that occur when Windows 2000-based domain controllers are
upgraded to Windows Server 2003-based domain controllers.
Known issues that may occur when you use administration tools from the original-
release (RTM), Service Pack 1, and Service Pack 2 versions of the Windows Server
2003 Administration Tools Pack to manage Windows 2000-based, Windows XP-
based, and Windows Server 2003-based computers
Windows Server 2003 and Windows 2000 installation media contain command-line and
graphical administrative tools that can be used to locally and in most cases remotely
administer up-level and down-level operating systems with a high degree of
interoperability.
To remotely administer computers that are running Windows Server 2003 or Windows
2000 from computers that are running Windows Server 2003, Windows XP, or Windows
2000, use one of the following methods:
Install and use graphical administrative tools that are packaged in the
Administration Tools Pack to remotely administer computers that are running
Windows Server 2003, Windows XP, or Windows 2000. Where interoperability
problems exist between operating systems, perform administrative tasks on the
console of the target computer or on a computer that is running the same
operating system as the computer that is being remotely administered.
Use command-line tools and scripts to locally and remotely administer computers
that are running Windows Server 2003, Windows XP, or Windows 2000. These tools
and scripts include Active Directory Service Interfaces (ADSI), Windows Net.exe
commands, and the tools that are packaged with Suptools.msi. Where
interoperability problems exist between operating systems, perform administrative
tasks on the console of the target computer or on a designated computer for
administrative tasks that is running the same operating system as the remote
computer that is being administered. For example, the Windows Server 2003
Service Pack 2 (SP2) Support Tools will install on a computer that is running
Windows XP Professional. However, the tools are not guaranteed to work correctly
in this scenario. Tools that are known to have issues include the following:
Dfsutil.exe
Netdiag.exe
Netcap.exe
Ntfrsutil.exe
If you want to run these tools against a Windows Server 2003 SP2-based computer, we
recommend that you run them from a computer that is running Windows Server 2003
SP2. You can use the Remote Desktop feature to connect to a Windows Server 2003
SP2-based computer that is running the Support Tools.
7 Note
The Windows 2000 Administration Tools Pack is located in the I386 folder on the
Windows 2000 Server-family CD and installs on computers that are running Windows
2000. Most of the tools in the Windows 2000 Adminpak can remotely administer
Windows 2000 in addition to the 32-bit and 64-bit versions of Windows XP Professional
and the 32-bit and 64-bit versions of Windows Server 2003.
The Windows Server 2003 Administration Tools Pack is located in the I386 folder of the
Windows Server 2003 CD and is available as a free download on www.microsoft.com . The
following table summarizes the operating systems on which you can install the
Adminpak from Windows 2000, from Windows Server 2003 original (RTM), from
Windows Server 2003 Service Pack 1 (SP1), or from Windows Server 2003 Service Pack 2.
Additionally, the table summarizes the operating systems that the Adminpaks from
these sources can remotely administer.
ノ Expand table
Installs and
runs on these
operating
systems
Windows Yes No No No
2000
Professional
Windows Yes No No No
2000 Server
family
2008
Remotely
manages
these
operating
systems
You must remove earlier beta versions of the Windows Server 2003 Administration
Tools Pack before you install the final release version.
7 Note
In some limited cases, servers must be administered from clients that are
running the same operating system. For example, some remote administration
operations against Windows 2000-based servers can be performed only from
Windows 2000-based clients. Similarly, some operations against Windows
Server 2003-based computers can be performed only from Windows Server
2003-based clients or from Windows XP-based clients. This article documents
these limitations or restrictions for each tool that is included in the
Administration Tools Pack.
Error message 1
Error message 2
Setup Failed - Due to an error, Windows Server 2003 Administration Tools Pack
Setup Wizard was unable to finish.
You cannot install the Windows 2000 Adminpak.msi file on Windows Server 2003-
based computers or on Windows XP-based clients. These tools no longer work on
these operating systems and are not supported. Use the Windows Server 2003
version of the Administration Tools Pack on Windows XP-based computers.
The Windows Server 2003 Administration Tools Pack cannot be installed or run on
Windows 2000-based computers. If you try to install the Windows Server 2003
Administration Tools Pack on a Windows 2000-based computer, you receive the
following error message: Windows Server 2003 Administration Tools Pack can only
be installed on Windows XP Professional with hotfix Q329357 applied, or on
Windows XP Professional SP1 or later, or on computers that are running Windows
Server 2003 operating systems.
Service pack level mismatch. Obtain the Administration Tools Pack that matches
the service pack level of your operating system.
Similarly, the command-line utilities from the Windows Server 2003 Administration
Tools Pack run only on computers that are running Windows XP or Windows Server
2003. Command-line utilities in the Windows Server 2003 Administration Tools
Pack do not run if there is a DLL mismatch or an entry-point error. Such a
mismatch or error may occur if you copy the utilities to a Windows 2000-based
computer. If you try to install the Windows 2000 Administration Tools Pack on a
Windows Server 2003-based computer, you receive the following error message:
Windows 2000 Administration Tools are incompatible with Windows Server 2003
operating systems. Install Windows Server 2003 Administration Tools Pack.
If you are using Windows XP Professional with Service Pack 2 and the Windows
Server 2003 Administration Tools Pack, you cannot administer Cluster servers.
However, if you are using Windows XP Professional with SP1 and the Windows
Server 2003 Administration Tools Pack, you can manage Cluster servers.
Most Windows Server 2003 administration tools work the same as their Windows
2000 counterparts. Sometimes, the Windows Server 2003 administration tools offer
increased functionality with regard to their Windows 2000 counterparts. For
example, the new drag-and-drop feature of the Windows Server 2003 Users and
Computers snap-in is fully functional against Windows 2000-based domain
controllers. In other cases, increased functionality in Windows Server 2003
administration tools is not turned on or is not supported when you administer
Windows 2000-based computers.
Cancel this upgrade, remove Windows 2000 Administration Tools, and then restart
the upgrade.
Complete this upgrade, and then immediately install the Windows Server 2003
Administration Tools Pack by running the Adminpak.msi Windows Installer package
file. Adminpak.msi is located in the \i386 folder of your Windows Server 2003 CD.
7 Note
If the Windows 2000 administration tools were left in place when the Windows
2000-based computer was upgraded to Windows Server 2003, do not try to
remove the Windows 2000 Administration Tools icon that appears in the Add or
Remove Programs item in Control Panel.
If you try to remove the Windows 2000 administration tools by using the Add or
Remove Programs tool, you may receive the following error message:
Ignore this error message. When you install the Windows Server 2003 Administration
Tools Pack, the Windows 2000 Administration Tools icon is replaced by the Windows
Server 2003 Administration Tools Pack icon.
7 Note
The version of Adminpak that is included in the I386 folder of the installation media
for the 64-bit versions of Windows Server 2003 is called Wadminpak.msi. The
Wadminpak.msi file is identical to and interchangeable with the Adminpak.msi file
that can be downloaded from www.microsoft.com and that is included with 32-bit
versions of Windows Server 2003 Service Pack 2. For ease of installation, you can
install the Windows Server 2003 SP2 Adminpak.msi file on 32-bit or 64-bit versions
of Windows XP Professional or on 32-bit or 64-bit versions of Windows Server
2003. Similarly, you can install Wadminpak.msi on 32-bit or 64-bit versions of
Windows XP Professional or on 32-bit or 64-bit versions of Windows Server 2003.
To install the Windows Server 2003 Administration Tools Pack, follow these steps:
1. Download the Windows Server 2003 Service Pack 2 Administration Tools Pack. To
do this, visit the following Microsoft Web site: Microsoft Download Center
Perform a keyword search for "adminpak" for the "Windows XP" or "Windows
Server" operating system.
You must remove earlier versions of the Administration Tools Pack before you can
install a later version, including the final release.
If you cannot use Add or Remove Programs in Control Panel to remove earlier
versions of the Administration Tools Pack, you can use the MSIZap tool from the
Support\Tools\Suptools.msi package to remove the older cached package.
If the Windows Server 2003 Beta 3 version of the Administration Tools Pack is
installed, follow these steps:
Console
rem
rem RAS user snap-in extension - registry key cleanup, Beta 3 to RC1
rem upgrades only.
rem
rem use Reg.exe to delete the old key that was created by the Beta 3
rem RAS user extension snapin.
rem
reg delete HKEY_CLASSES_ROOT\RasDialin.UserAdminExt /f
reg delete HKEY_CLASSES_ROOT\RasDialin.UserAdminExt.1 /f
reg delete HKLM\SOFTWARE\Microsoft\MMC\NodeTypes\{19195a5b-6da0-
11d0-afd3-00c04fd930c9}\Extensions\NameSpace /f
For more information about how to remotely install the Administration Tools Pack,
click the following article numbers to view the articles in the Microsoft Knowledge
Base:
816102 How to use Group Policy to remotely install software in Windows Server
2003
7 Note
You must remove earlier versions of Adminpak.msi (Beta 3, RC1, RC2) before you
install Windows XP SP1 on your Windows XP-based computer. If you have installed
Windows XP SP1 on a Windows XP-based computer that has the Administration
Tools Pack beta 3 version installed, you cannot use Add or Remove Programs in
Control Panel to remove earlier versions of the Administration Tools Pack.
More information
This issue occurs because the Active Directory Installation Wizard (Dcpromo.exe) in
Windows 2000 uses an internal feature of the Windows 2000 version of Adminpak.msi
to install menu shortcuts on domain controllers. You can safely ignore this warning in
Winnt32.exe and continue the upgrade. After the upgrade is complete, install the
Windows Server 2003 version of Adminpak.msi from the I386 folder of the installation
media to make sure that you have the latest version of the domain administration tools.
The Schema may be modified on this Domain Controller check box has been
removed from the Change Schema Master dialog box. By default, schema updates
are enabled on Windows Server 2003-based domain controllers.
The original-release version of the Windows Server 2003 Administration Tools Pack
includes LDAP signing. Windows 2000 domain controllers that are being remotely
administered by Windows 2000-based computers that are running Service Pack 4
(SP4), by Windows XP-based computers, or by Windows Server 2003-based
computers that are using NTLM authentication must have Windows 2000 SP3
installed.
When you click Show Services Node on the View menu, the Services Node
enabled command has been removed on Windows XP clients.
When the Service Pack 1 version of Active Directory Sites and Services is started on
64-bit systems, it may not edit Group Policy. Additionally, you receive the following
error message:
Windows cannot find gpedit.msc. Make sure you typed the name correctly, and
then try again. To search for a file, click the Start button, and then click Search.
Modify the syntax of your command line or shortcut to use the following syntax:
%windir%\syswow64\mmc.exe %systemroot%\system32\dssite.msc -32
There are no known issues when Windows 2000-based forests are administered
from Windows Server 2003-based clients or from Windows XP Professional-based
clients.
The original-release version of the Windows Server 2003 Administration Tools Pack
includes LDAP signing. Windows 2000 domain controllers that are being remotely
administered by Windows 2000-based computers that are running Service Pack 4
(SP4), by Windows XP-based computers, or by Windows Server 2003-based
computers that are using NTLM authentication must have Windows 2000 SP3
installed.
The Dial-in tab that configures Routing and Remote Access dial-in or VPN access
and callback settings is removed when the original-release version of the
Administration Tools Pack is installed on Windows XP-based clients.
Install Q837490 on the pre-Service Pack 2 Windows XP-based client. This hotfix
adds the remote access dial-in tab on pre-Service Pack 2 Windows XP-based
clients that are running the original-release version of the Windows Server 2003
Active Directory Users and Computers snap-in, Dsa.msc, that is installed by the
original-release version of the Windows Server 2003 Adminpak.msi.
Start Active Directory Users and Computers from a Windows Server 2003-based
computer or from a Windows 2000-based computer that is accessed over
Terminal Services or Remote Desktop Access.
Start Active Directory Users and Computers from the console of a Windows
Server 2003-based computer or of a Windows 2000-based computer.
To manage dial-in properties on the user account, use the remote access policy
administration model. The remote access policy administration model was
introduced in Windows 2000 to address the limitations of the earlier dial-in
account permission model. The remote access policy administration model uses
Windows groups to manage remote access permissions.
Customers who use the recommended administration model that is named "remote
access policy administration model," can use the administration package from Windows
XP to manage remote access permission for users in Active Directory. Settings on the
Dial-in tab are not typically used for VPN or wireless deployments. There are several
exceptions. For example, administrators who deploy dial-up networks may use callback
number. In these cases, use Terminal Services or Remote Desktop to access a Windows
Server 2003-based or Windows 2000-based computer, or log on to the console of a
Windows Server 2003-based computer or of a Windows 2000-based computer to
manage the Dial-in tab.
The remote access policy administration model has the following benefits:
Detailed administration
Administrators who manage dial-in permission must also have access to the whole user
account. The user account has many more security properties. In the policy
administrative model, a separate group can be created to grant dial-in permissions.
Additionally, permissions to manage access to that group can be granted to a different
administrator.
Most Microsoft Windows programs use groups for access control. Groups reduce the
additional attempt of managing separate permissions network access. You can use the
same groups for controlling access to dial-up, VPN, wireless network, or file shares.
There are many challenges that are introduced when you are deploying more than one
access technology at the same time. The permissions and the settings for dial-up, VPN,
and wireless technologies may be different. For example, contractors may be permitted
to access wireless networks but may not be permitted to connect from home by VPN.
Wireless may require different security settings with regard to VPN and dial-up
connections. Callback settings may be useful when you are connecting from a local area
code. However, you may want to disable callback when the user is connecting from an
international telephone number.
You can configure the remote access policy administration model in the Remote Access
Policies node of the Routing and Remote Access snap-in when the domain is configured
in Windows 2000 native mode or a later version. To remotely manage the remote access
dial-in tab in Active Directory Users or Computers or in Internet Authentication Server
(IAS) from a Windows XP-based computer, use Terminal Services or Remote Desktop to
access a Windows Server 2003-based or Windows 2000-based computer. Or, log on to
the console of a Windows Server 2003-based computer or of a Windows 2000-based
computer to configure these settings directly.
When the Service Pack 1 version of Active Directory Users and Computers is
started on 64-bit systems, it may not always edit Group Policy. Additionally, you
receive the following error message:
Windows cannot find gpedit.msc. Make sure you typed the name correctly, and then try
again. To search for a file, click the Start button, and then click Search.
Modify the syntax of your command line or shortcut to use the following syntax:
%windir%\syswow64\mmc.exe %systemroot%\system32\dsa.msc -32 back
Authorization Manager
This has been added to the Administration Tools Pack in the Windows Server 2003 RC1
version and later versions.
Certification Authority
Because of extensive schema changes, you cannot use Windows XP Professional-based
clients to administer Windows 2000-based computers, and you cannot use Windows
2000-based clients to administer Windows Server 2003-based computers. To administer
Windows Server 2003-based computers, perform remote administration from the
console or from a Terminal Services session on the destination computer, or use
Windows 2000-based clients to manage Windows 2000 Server-based computers and
Windows XP-based and Windows Server 2003-based clients.
Cluster Administrator
If you are using Windows XP Professional with Service Pack 2 and the Windows Server
2003 Administration Tools Pack, you cannot administer Cluster servers. However, if you
use Windows XP Professional with SP1 and Windows Server 2003 Administration Tools
Pack, you can manage Cluster servers.
DHCP
Windows 2000 tools cannot generate a dump file of Windows Server 2003
Dynamic Host Configuration Protocol (DHCP) configurations because of code
changes.
Configures connection priority in the Q321557 and SP3 release of Windows 2000
Ntfrs.exe.
If you are using a Windows XP-based client, you must use the Windows XP SP1
update to administer Windows Server 2003 DFS.
Adminpak now includes the Windows Server 2003 DFS Server Help file.
DNS
When you access a Domain Name System (DNS) server through an IP address, some
information that is returned, such as Forwarder information, will be incorrect. To work
around this problem, access the DNS server through a host name instead of through an
IP address. This issue applies to the original-release version of the Windows Server 2003
Administration Tools Pack.
The original-release version of the Windows Server 2003 Administration Tools Pack
includes LDAP signing. Windows 2000 domain controllers that are being remotely
administered by Windows 2000-based computers that are running Service Pack 4 (SP4),
by Windows XP-based computers, or by Windows Server 2003-based computers that
are using NTLM authentication must either have Windows 2000 SP3 installed.
In the Windows Server 2003 SP2 version of Adminpak.msi, two new options are available
to control drag-and-drop behavior in the Active Directory Users and Computers snap-in
and in the Active Directory Sites and Services snap-in:
By default, a warning dialog box is presented when you try to perform a drag-and-
drop operation. You can dismiss the warning dialog box for the session. However,
the dialog box will appear again the next time that you start the snap-in.
You can disable drag-and-drop capabilities by setting the first part of the
DisplaySpecifiers attribute to 0 (zero) in the configuration naming context in
Active Directory. Because this is a forest-wide setting, drag-and-drop capabilities
will be disabled for every domain in the forest. To disable the drag-and-drop
feature, follow these steps:
7 Note
You must have the Active Directory Service Interfaces (ADSI) Edit tool installed
to complete this procedure. ADSI Edit is included with the Windows Server
2003 SP2 Support Tools. For more information, click the following article
number to view the article in the Microsoft Knowledge Base:
892777 Updates to the Windows Server 2003 Support Tools are included in
Windows Server 2003 Service Pack 2
1. If you have the Active Directory Users and Computers snap-in or the Active
Directory Sites and Services snap-in open, close the snap-ins.
2. Click Start, click Run, type adsiedit.msc in the Open box, and then click OK.
3. Expand Configuration.
4. Expand CN=Configuration,DC=ForestRootName.
5. Right-click CN=DisplaySpecifiers, and then click Properties.
6. In the list of attributes, double-click flags.
7. In the Integer Attribute Editor dialog box, type 1 in the Value box.
8. Click OK two times.
9. Close ADSI Edit.
Microsoft Exchange
The Microsoft Exchange Simple Mail Transfer Protocol (SMTP) and Network News
Transfer Protocol (NNTP) DLL files were added to Adminpak.msi. The additional
Staxmem.dll, Smtpapi.dll, Smtpadm.dll, Smtpsnap.hlp, and Nntpsnap.hlp files were
added to Adminpak.msi to allow 32-bit Windows XP Professional-based clients to
administer the release of Exchange after Microsoft Exchange 2000.
Help
The Ntcmds.chm Help file was added to support command-line administration.
The Windows XP Professional Help files are reinstalled when the Administration
Tools Pack is removed. Windows XP Professional versions of the Ntart.chm and
Ntcmds.chm files are backed up during the installation of the Administration Tools
Pack and are restored during removal.
IisApp.vbs
Iisback.vbs
IisCnfg.vbs
IisFtp.vbs
IisFtpdr.vbs
Iisvdir.vbs
Iisweb.vbs
All scripts are compatible with Microsoft Internet Information Services (IIS) 6.0 only.
IISCnfg: When you use the iiscnfg /export command, the destination file (the file
that you specify after the /f switch) is created on the remote computer (the
Windows Server-based computer). For example, to export the metabase, type the
following command:
Console
When you run this command, the D:\Config.xml file is created on the remote
server. To import the metabase, type the following command:
Console
7 Note
These commands are one line each. They have been wrapped for readability.
IISCnfg checks that the D:\Config.xml file (the file that you specify after the /f
switch) exists on both the local and the remote computer (RemoteServer).
However, the actual import uses only the file on the remote server. When you
import or copy the Config.xml file from the remote server, use the same path on
the local computer.
Netsh
The netsh dhcp server ip dump command output is truncated. The output from
this command that is issued from a Windows Server 2003-based computer against
a Windows Server 2003-based DHCP server returns the following output:
The same command that is issued from a Windows XP-based client is truncated as
follows:
Dhcp Server 220.0.80.23 Add Optiondef 100 "Byte Array" BYTE 1 comment=""
4 Dhcp Server 220.0.80.23 Add Optiondef 101 "String Array" STRING 1
comment="" hello Dhcp Server 220.0.80.23 Add Optiondef 102 "IP Array"
IPADDRESS 1 comment="" 4.4.4.4
By default, the netsh dhcp server command does not run from Windows XP-
based clients. For example, the following command runs successfully from a
Windows Server 2003-based computer but does not run from a Windows XP-
based client:
If you run this command from a Windows XP-based client, you receive the
following error message:
To remotely administer a DHCP server from a Windows XP-based client, install the
Administration Tools Pack, and then type the following command at the command
prompt:
Console
The Service Pack 2 Adminpak installs a 32-bit Network Load Balancing Manager
that does not bind on 64-bit versions of Windows.
Ntdsutil.exe
The authoritative restore command in Ntdsutil depends on Ntdsbsrv.dll. Ntdsbsrv.dll is
not included in Windows XP Professional or in the Windows Server 2003 Administration
Tools Pack. Perform authoritative restores from the console of Active Directory-based
domain controllers. If you must run this command on Windows XP-based clients, copy
the Ntdsbsrv.dll file from a release version of a Windows Server 2003 installation.
Object Picker
The original-release version of the Windows Server 2003 Administration Tools Pack
introduces LDAP signing. Windows 2000 domain controllers that are being remotely
administered by Windows 2000-based computers that are running Service Pack 4 (SP4),
by Windows XP-based computers, or by Windows Server 2003-based computers that
are using NTLM authentication must have Windows 2000 SP3 installed.
Remote Desktop
Connect to Console mode is supported against Windows Server 2003-based and
Windows XP-based computers only.
Remote Storage
Cross-version administration is not supported. Remote Storage administration
from Windows 2000-based computers is not supported against Windows Server
2003-based and Windows XP-based computers. Perform remote administration
from a Windows 2000-based computer, from the console of the destination
computer, or over a Terminal Services session.
No known issues.
Telephony
No known issues.
UDDI
No known issues.
Windows cannot find 'gpedit.msc'. Make sure you typed the name correctly and
then try again. To search for a file click the Start button and then click Search
When you try to modify a GPO from any one of the snap-ins that is listed earlier, a call is
made to start the Gpedit.msc file. Currently, the snap-ins that call the Gpedit.msc file are
32-bit tools. However, on x64-based versions of Windows Server 2003, Gpedit.msc is a
64-bit snap-in. This problem will be corrected in a future release of a 64-bit
Adminpak.msi package. To work around this problem, use either of the following
methods.
Method one
Modify the GPOs from a computer that is running a 32-bit version of Windows Server
2003, a 32-bit version of Windows XP, or a version of Windows 2000.
Method two
Use the following commands to start the snap-ins, and then modify the GPOs:
For more information, click the following article number to view the article in the
Microsoft Knowledge Base:
304718 How to use the Administration Tools Pack to remotely administer computers
that are running Windows Server 2003, Windows XP, or Windows 2000
WINS
The change to the Windows Internet Name Service (WINS) remote procedure call (RPC)
API among Windows Server 2003, Windows XP Professional, Windows 2000, and
Windows NT 4.0 prevents the remote administration of Windows NT 4.0-based WINS
servers from Windows 2000 versions of the WINS Microsoft Management Console
(MMC) snap-in and from Windows Server 2003 versions of the WINS MMC snap-in. This
is not a regression, because Windows 2000 shares the same limitation.
Feedback
Was this page helpful? Yes No
This article describes how to use the Directory Service command-line tools to perform
administrative tasks for Active Directory in Windows Server 2003. The following tasks are
broken down into task groups.
Console
user_dn specifies the distinguished name (also known as the DN) of the user
object that you want to add.
sam_name specifies the security account manager (SAM) name used as the
unique SAM account name for this user (for example, Linda).
4. To specify the user account password, type the following command, where
password is the password that is to be used for the user account:
Console
dsadd user <user_dn> -pwd password
7 Note
To view the complete syntax for this command, and to obtain more information
about entering more user account information, at a command prompt, type dsadd
user /? .
Console
user_dn specifies the distinguished name of the user for which the password
will be reset.
new_password specifies the password that will replace the current user
password
4. If you want to require the user to change this password at the next logon process,
type the following command:
Console
If a password is not assigned, the first time the user tries to log on (by using a blank
password), the following logon message is displayed:
After the user has changed the password, the logon process continues.
You must reset the services that are authenticated with a user account if the password
for the service's user account is changed.
7 Note
To view the complete syntax for this command, and to obtain more information
about entering more user account information, at a command prompt, type dsmod
user /? .
Console
7 Note
As a security measure, instead of deleting that user's account, you can disable user
accounts to prevent a particular user from logging on. If you disable user accounts
that have common group memberships, you can use disabled user accounts as
account templates to simplify user account creation.
After you delete a user account, all of the permissions and memberships that are
associated with that user account are permanently deleted. Because the security
identifier (SID) for each account is unique, if you create a new user account that has the
same name as a previously deleted user account, the new account does not
automatically assume the permissions and memberships of the previously deleted
account. To duplicate a deleted user account, you must manually re-create all
permissions and memberships.
7 Note
To view the complete syntax for this command, and to obtain more information
about entering more user account information, at a command prompt, type dsrm
/? .
Console
group_dn specifies the distinguished name of the group object that you want
to add.
sam_name specifies the SAM name that is the unique SAM account name for
this group (for example, operators).
{yes|no} specifies whether the group you want to add is a security group (yes)
or a distribution group (no).
{l|g|u} specifies the scope of the group you want to add (domain local [l],
global [g], or universal [u]).
If the domain in which you are creating the group is set to the domain functional level
of Windows 2000 mixed, you can select only security groups with domain local scopes
or global scopes.
To view the complete syntax for this command, and to obtain more information about
entering more group information, at a command prompt, type dsadd group /? .
Console
group_dn specifies the distinguished name of the group object that you want
to add.
member_dn specifies the distinguished name of the object that you want to
add to the group.
In addition to users and computers, a group can contain contacts and other groups.
To view the complete syntax for this command, and to obtain more information about
entering more user account and group information, at a command prompt, type dsmod
group /? .
group_dn specifies the distinguished name of the group object for which you
want to change the group type.
{yes|no} specifies that the group type is set to security group (yes) or
distribution group (no).
To convert a group, the domain functionality must be set to Windows 2000 Native or
higher. You cannot convert groups when the domain functionality is set to Windows
2000 Mixed.
To view the complete syntax for this command, at a command prompt, type dsmod group
/? .
Console
group_dn specifies the distinguished names of the group object to which the
scope will be changed.
{l|g|u} specifies the scope that the group is to be set to (local, global, or
universal). If the domain is still set to Windows 2000 mixed, the universal
scope is not supported. Also, it is not possible to convert a domain local
group to global group or vice versa.
7 Note
You can only change group scopes when the domain functional level is set to
Windows 2000 native or higher.
Delete a group
1. Click Start, and then click Run.
The group_dn specifies the distinguished name of the group object to be deleted.
7 Note
By default, local groups that are provided automatically in domain controllers that are
running Windows Server 2003, such as Administrators and Account Operators, are
located in the Builtin folder. By default, common global groups, such as Domain Admins
and Domain Users, are located in the Users folder. You can add or move new groups to
any folder. Microsoft recommends that you keep groups in an organizational unit folder.
To view the complete syntax for this command, at a command prompt, type dsrm /? .
Console
The user_dn specifies the distinguished name of the user object for which you
want to display group membership.
To view the complete syntax for this command, at a command prompt, type dsget user
/? .
How to manage computers
The following sections provide detailed steps to manage computers.
Console
The computer_dn specifies the distinguished name of the computer you want to
add. The distinguished name indicates the folder location.
To view the complete syntax for this command, at a command prompt, type dsadd
computer /? .
To modify the properties of a computer account, use the dsmod computer command.
Console
group_dn specifies the distinguished name of the group object to which you
want to add the computer object.
computer_dn specifies the distinguished name of the computer object to be
added to the group. The distinguished name indicates the folder location.
When you add a computer to a group, you can assign permissions to all of the
computer accounts in that group, and then filter Group Policy settings on all accounts in
that group.
To view the complete syntax for this command, at a command prompt, type dsmod group
/? .
Console
7 Note
When you reset a computer account, you break the computer's connection to
the domain. You must rejoin computer account to the domain computer
account after you reset it.
To view the complete syntax for this command, at a command prompt, type dsmod
computer /? .
Console
When you disable a computer account, you break the computer's connection with the
domain and the computer cannot authenticate to the domain.
To view the complete syntax for this command, at a command prompt, type dsmod
computer /? .
Console
dsadd ou <organizational_unit_dn>
To view the complete syntax for this command, at a command prompt, type dsadd ou
/? .
7 Note
To view the complete syntax for this command, at a command prompt, type dsrm /? .
7 Note
If you delete an organizational unit, all of the objects that it contains are deleted.
The parameter specifies the parameter to use. For the list of parameters, see the
online help for the d squery user command.
To view the complete syntax for this command, at a command prompt, type dsquery
user /? .
Find a contact
1. Click Start, and then click Run.
The parameter specifies the parameter to use. For the list of parameters, see the
online help for the dsquery user command.
Find a group
1. Click Start, and then click Run.
The parameter specifies the parameter to use. For the list of parameters, see the
online help for the dsquery user command.
By default, local groups that are provided automatically in domain controllers that are
running Windows Server 2003, such as Administrators and Account Operators, are
located in the Builtin folder. By default, common global groups, such as Domain Admins
and Domain Users, are located in the Users folder. You can add or move new groups to
any folder. Microsoft recommends that you keep groups in an organizational unit folder.
3. At the command prompt, type the command dsquery computer -name <name> .
The name specifies the computer name that the command searches for. This
command searches for computers whose name attributes (value of CN attribute)
match name.
To view the complete syntax for this command, at a command prompt, type dsquery
computer /? .
The parameter specifies the parameter to use. For the list of parameters, see the
online help for dsquery ou .
To view the complete syntax for this command, at a command prompt, type dsquery ou
/? .
The parameter specifies the parameter to use. There are several attributes of a
server that you can search by using this command. For the list of parameters, see
online help for dsquery server.
The parameter specifies the parameter to use. There are several attributes that you
can search by using this command. For more information about LDAP searches,
see the Windows Server 2003 Resource Kit.
References
For more information about the Directory Services command-line tools in Windows
Server 2003, click Start, click Help and Support Center, and then type directory service
command-line tools in the Search box.
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2012 R2 , Windows Server 2016, Windows Server 2019,
Windows Server 2022
Original KB number: 305144
Summary
When you open the properties for a user account, click the Account tab, and then either
select or clear the check boxes in the Account options dialog box, numerical values are
assigned to the UserAccountControl attribute. The value that is assigned to the
attribute tells Windows which options have been enabled.
To view user accounts, click Start, point to Programs, point to Administrative Tools, and
then click Active Directory Users and Computers.
The following table lists possible flags that you can assign. You can't set some of the
values on a user or computer object because these values can be set or reset only by the
directory service. Ldp.exe shows the values in hexadecimal. Adsiedit.msc displays the
values in decimal. The flags are cumulative. To disable a user's account, set the
UserAccountControl attribute to 0x0202 (0x002 + 0x0200). In decimal, it's 514 (2 + 512).
7 Note
You can directly edit Active Directory in both Ldp.exe and Adsiedit.msc. Only
experienced administrators should use these tools to edit Active Directory. Both
tools are available after you install the Support tools from your original Windows
installation media.
ノ Expand table
SCRIPT 0x0001 1
ACCOUNTDISABLE 0x0002 2
HOMEDIR_REQUIRED 0x0008 8
LOCKOUT 0x0010 16
PASSWD_NOTREQD 0x0020 32
PASSWD_CANT_CHANGE 0x0040 64
TRUSTED_FOR_DELEGATION - When this flag is set, the service account (the user or
computer account) under which a service runs is trusted for Kerberos delegation.
Any such service can impersonate a client requesting the service. To enable a
service for Kerberos delegation, you must set this flag on the userAccountControl
property of the service account.
NOT_DELEGATED - When this flag is set, the security context of the user isn't
delegated to a service even if the service account is set as trusted for Kerberos
delegation.
UserAccountControl values
Here are the default UserAccountControl values for the certain objects:
7 Note
Feedback
Was this page helpful? Yes No
This article describes the issues that affect a Windows Server-based domain controller
(DC) running as a guest OS in virtual hosting environments. It also discusses things to
consider when a DC runs in a virtual hosting environment.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 888794
Summary
A virtual hosting environment lets you run multiple guest operating systems on a single
host computer at the same time. Host software virtualizes the following resources:
CPU
Memory
Disk
Network
Local devices
By virtualizing these resources on a physical computer, host software lets you use fewer
computers to deploy operating systems for testing and development, and in production
roles. Certain restrictions apply to an Active Directory DC that runs in a virtual hosting
environment. These restrictions don't apply to a DC that runs on a physical computer.
This article discusses the things to consider when a Windows Server-based DC runs in a
virtual hosting environment. Virtual hosting environments include:
For more information about the current status of system robustness and security for
virtualized DCs, see the following article:
Virtualizing Domain Controllers using Hyper-V.
7 Note
If you are using third-party virtualization hosts, consult the virtualization host
documentation for specific guidance and recommendations.
This article supplements the Virtualizing Domain Controllers article by providing more
hints and considerations that weren't in scope for the Virtualizing Domain Controllers
article.
The Active Directory service helps preserve the integrity of the Active Directory
database if a power loss or other failure occurs. To do so, the service runs
unbuffered writes, and tries to disable the disk write cache on the volumes that
host the Active Directory database and log files. Active Directory also tries to work
in this manner if it's installed in a virtual hosting environment.
7 Note
You must disable the write cache for all components that use Extensible
Storage Engine (ESE) as their database format. These components include
Active Directory, the File Replication Service (FRS), Windows Internet Name
Service (WINS), and Dynamic Host Configuration Protocol (DHCP).
As a best practice, consider installing uninterruptable power supplies on
virtual machine hosts.
In a production environment, you should make daily system state backups from
two different DCs.
7 Note
When the virtual machine host takes a snapshot of a virtual machine, the
guest OS doesn't detect this snapshot as a backup. When the host supports
the Hyper-V Generation ID, this ID would be changed when the image is
started from a snapshot or replica. By default, the DC would consider itself to
be restored from a backup.
To ensure that such DCs can be accessed during cluster system startup, deploy at
least two DCs in the computer's domain on an independent hosting solution
outside this cluster deployment. You can use physical hardware or another virtual
hosting solution that doesn't have an Active Directory dependency. For more
information about this scenario, see Avoid creating single points of failure.
7 Note
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where you receive the Windows Time Service
event IDs 24, 29, and 38 on a host server.
7 Note
If you are a Small Business customer, find additional troubleshooting and learning
resources at the Support for Small Business site.
Symptoms
When a virtualized domain controller is running in a guest operating system on a host
server that is running Windows Server 2008 with Hyper-V, and the Windows Time
Service (W32Time) synchronizes with a primary domain controller, Windows Time
Service event IDs 24, 29, and 38 may be logged in the System log on the virtualized
domain controller.
If you enable Windows Time Services Debug logging on the domain controller,
information that resembles the following is logged in the Debug log:
Cause
On a host server that is running Windows Server 2008 with Hyper-V, virtualized domain
controllers that are running on a guest operating system are allowed to synchronize
their system clocks with the clock of the host operating system. The events that are
listed in the Symptoms section are recorded in the System log because domain
controllers have their own time synchronization mechanism. If domain controllers
synchronize time from their own source and synchronize time from the host, the domain
controller time can change frequently. Because many domain controller tasks are tied to
the system time, a jump in the system time can cause lingering objects to be left in
caches, and may cause replication to stop.
Resolution
To resolve this issue, disable time synchronization on the host by using Integration
Services, and then configure the virtualized domain controller to accept the default
Windows Time Service (W32time) domain hierarchy time synchronization.
References
For more information about virtualized domain controllers, see Microsoft TechNet article
Deployment Considerations for Virtualized Domain Controllers.
Feedback
Was this page helpful? Yes No
This article provides workarounds for an issue in which the computer clock resets
incorrectly if you restart the computer while it doesn't have an internet connection.
Symptoms
The system date and time setting on a computer that's running Windows 10 or a later
version incorrectly resets to a date and time that's at least one day in the past. This issue
might occur in the following scenario:
Kernel-General event ID 1 in the system log indicates that the time setting has
been reset to a past value.
Events that are recorded in the event log have invalid time stamps that are in the
past.
Kerberos authentication fails.
Cause
This issue occurs because of a problem in the Secure Time Seeding feature that's part of
Windows Time service. This feature uses metadata from the computer's outgoing SSL
connections to determine the approximate current date and time values. It stores this
data in the registry. Windows can use this data to set the date and time instead of using
data from the Active Directory Domain Services (AD DS) domain hierarchy or from
another Network Time Protocol (NTP) server.
When the computer restarts in an environment where it doesn't send any outgoing SSL
traffic, the Secure Time Seeding feature doesn't clear or update the old registry data.
Instead, the Windows Time service sets the date and time based on the stale Secure
Time Seeding information from the registry.
Workaround
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
To work around this issue, try either Method 1 or Method 2, depending on your network
environment. If neither of these methods offer a practical solution, try Method 3.
Console
We recommend that you try the Method 1 or Method 2 workaround before you
disable the Secure Time Seeding feature. If you disable the feature, it remains
disabled even after you upgrade to a newer version of Windows.
Console
reg add
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config /v
UtilizeSslTimeData /t REG_DWORD /d 0 /f
7 Note
Console
These commands force the system to resynchronize the date and time. Because
Secure Time Seeding is disabled, Windows Time uses NTP to resynchronize.
7 Note
Console
reg add
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config /v
UtilizeSslTimeData /t REG_DWORD /d 1 /f
More information
For more information about Secure Time Seeding, see Time accuracy improvements for
Windows Server 2016: Secure Time Seeding.
Feedback
Was this page helpful? Yes No
This article describes how to configure the Windows Time service against a large time
offset.
Introduction
Windows operating systems include the Time Service tool (W32Time service) that is
used by the Kerberos authentication protocol. Kerberos authentication will work if the
time interval between the relevant computers is within the maximum enabled time skew.
The default is 5 minutes. You can also turn off the Time Service tool. Then, you can
install a third-party time service.
The purpose of the Time Service tool is to make sure that all the computers in an
organization that are running Microsoft Windows 2000 or later versions of Windows
operating systems use a common time. To make sure that there's an appropriate
common time usage, the Time Service uses a hierarchical relationship that controls
authority. By default, Windows-based computers use the following hierarchy:
All the client desktop computers nominate the authenticating domain controller as
their authoritative time source.
In a domain, all the servers follow the same process that client desktop computers
follow.
All domain controllers in a domain nominate the primary domain controller (PDC)
operations master as their time source.
All PDC operations masters follow the hierarchy of domains in the selection of their
time source. However, the PDC operations masters may use a parent domain
controller that is based on stratum numbering.
7 Note
A stratum number defines how close a time server is to the primary reference
source.
The smaller the number, the closer the server is to the primary time source. In this
hierarchy, the PDC operations master at the root of the forest becomes the authoritative
time server for the organization. We highly recommend that you configure the
authoritative time server to collect the time from a hardware source. When you try to
configure the authoritative time server to sync with an Internet time source, there's no
authentication. We also recommend that you reduce your time correction settings for
the servers and for the stand-alone clients. When you follow these recommendations,
more accurate time is provided to the domain.
More information
A review of time rollbacks has shown that computers can adopt time that can be days,
months, years, or even tens of years in the future or in the past. The following issues can
occur when computers roll forward or roll backward in time:
The Windows 32 time service supports two registry entries, the MaxPosPhaseCorrection
and the MaxNegPhaseCorrection . These entries restrict the samples that the time service
accepts on a local computer when those samples are sent from a remote computer.
When a computer that is running in a steady state receives a time sample from its time
source, the sample is checked against the phase correction boundaries that the
MaxPosPhaseCorrection and MaxNegPhaseCorrection registry entries impose. If the time
sample falls within the limits that the two registry entries enforce, this sample is
accepted for additional processing. If the time sample doesn't fall within these limits, the
time sample is ignored, and the time service logs the following message in the W32Time
private log file:
TOO BIG
If administrators reduce the value for positive and negative phase corrections,
administrators can reduce the threat that computers will receive time from invalid time
samples for a Windows-based computer. On the other hand, if administrators reduce
the value, administrators may prevent computers from being ahead or behind the
current time by more than the limits these values impose.
7 Note
If the registry entry values for positive and negative corrections are reduced, time
will be increased or decreased.
This value enables the computer to receive the time that is contained in any time
sample, whatever inaccuracy.
In Windows Server 2008, a new default value for the MaxPosPhaseCorrection and
MaxNegPhaseCorrection registry entries has been adopted. This new default value is 48
hours. This 48-hour value can be represented as either of the following values:
2a300 (hexadecimal)
172800 (decimal)
7 Note
When you set the value to a value other than MAX (0xFFFFFFFF), you can prevent
computers from adopting time that is very inaccurate in the scenarios where the
computer is restarted or the connectivity to external time sources is disrupted. For
example, consider the case in which you have the MaxPosPhaseCorrection and
MaxNegPhaseCorrection registry entries set for 48 hours on all domain controllers
in the forest. If any single domain controller experiences an unusual time jump of
more than 48 hours, the value that you set for the MaxPosPhaseCorrection and
MaxNegPhaseCorrection registry entries will prevent other computers from making
the same time jump. Therefore, computers that are out of sync can be kept apart
from the other computers until the administrator can investigate and take
corrective action.
Time accuracy is especially important on the forest root primary domain controller
(PDC). Because the PDC is the root time source for the domain, inaccurate time changes
on the PDC can potentially cause a domain-wide time jump. If you impose phase
correction restrictions on the PDC, you can prevent other domain controllers in the
forest from accepting the new time.
7 Note
These errors have a low correlation to the time skew because the cause may
prevent Windows-based computers from adopting an accurate time value.
So 48 hours was the next obvious time offset after 25 or 36 hours. Administrators can
also reduce the value with correct tools that report infrastructure and testing.
Specific recommendations according to operating system version and computer role are
described in the following sections.
Windows XP Professional and all versions of
Windows Server 2003
Domain servers
MaxPosPhaseCorrection
MaxNegPhaseCorrection
The default value of these two registry entries is 0xFFFFFFFF. This default value means
"Accept any time change." We recommend a value that is 48 hours. It's represented in
the registry as 2a300 (hexadecimal) or 172800 (decimal). We recommend that you set
the value of the MaxPollInterval registry entry to 10 or less or that you set the value of
the SpecialPollInterval registry entry to 3600 (1 hour) or less.
7 Note
For more information about these registry entries, see the Windows Server 2003
and Windows XP Time Service registry entries section.
Stand-alone clients
The MaxPosPhaseCorrection and MaxNegPhaseCorrection registry entries have a default
value of 54,000 (15 hours). As a security best practice, we recommend that you reduce
this default value. We also recommend that you set the value to 3600 (1 hour) or an
even smaller value, depending on time source, on network condition, on poll interval,
and on security requirements.
Type Details
Registry MaxPosPhaseCorrection
Entry
Value DWORD
Type
Subkey HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config
Notes This entry specifies the largest positive time correction in seconds that the service can
make. If the service determines that a change larger than it's required, it logs an event
instead. Special case: 0xFFFFFFFF means to always make the time correction. The default
value for domain members is 0xFFFFFFFF. The default value for stand-alone clients and
servers is 54,000 (15 hours).
Registry MaxNegPhaseCorrection
Entry
Value DWORD
Type
Subkey HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config
Notes This entry specifies the largest negative time correction in seconds that the service can
make. If the service determines that a change larger than this is required, it logs an event
instead. Special case: -1 means always make the time correction. The default value for
domain members is 0xFFFFFFFF. The default value for stand-alone clients and servers is
54,000 (15 hours).
Registry MaxPollInterval
Entry
Value DWORD
Type
Subkey HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config
Notes This entry specifies the largest interval, in seconds, that is enabled for the system polling
interval. Notice that, although a system must poll according to the scheduled interval, a
Type Details
provider can refuse to produce samples when samples are requested. The default value
for domain members is 10. The default value for stand-alone clients and servers is 15.
Registry SpecialPollInterval
Entry
Value DWORD
Type
Subkey HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient
Notes This entry specifies the special poll interval in seconds for manual peers. When the
SpecialInterval 0x1 flag is enabled, W32Time uses this poll interval instead of a poll
interval that the operating system determines. The default value on domain members is
3,600. The default value on stand-alone clients and servers is 604,800.
7 Note
We recommend that you use the Global Policy object Editor to deploy these
settings. For more information about the Windows Time service in a Windows
Server 2003-based forest, see Windows Time Service (W32Time).
The default Windows Time service parameter values that are defined in the Group Policy
object (GPO) may not match the default values that are defined in the registry of
Windows Server 2003-based domain controllers. When you deploy
MaxPosPhaseCorrection and MaxNegPhaseCorrection values to Windows Server 2003
domain controllers by using a GPO, make sure that the GPO isn't changing the values of
other Windows Time service parameters in the registry. Other Windows Time service
parameter values may also have to be changed in the GPO to match the default registry
values in the domain controllers.
7 Note
For more information about this registry entry, see Windows Server 2000 SP 4
registry entry section.
7 Note
The NT5DS value indicates that the synchronization type is obtained from a registry
entry.
Stand-alone clients
The MaxAllowedClockErrInSecs registry entry has a default value of 43,200 (12 hours). As
a security best practice, we recommend that you reduce this default value. We
recommend that you set the value to 3600 (1 hour) or to an even smaller value,
depending on time source, on network conditions, on poll interval, and on security
requirements.
ノ Expand table
Type Details
Registry MaxAllowedClockErrInSecs
Entry
Type Details
Value DWORD
Type
Subkey HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters
Notes Specifies the maximum clock change that is enabled in seconds. When the event is
logged, the time isn't adjusted based on the value. This behavior occurs to help protect
against any suspicious time stamp activity. The default value for domain members is
43,200.
Feedback
Was this page helpful? Yes No
This article describes how attributes that contain a date/time value can be converted to
standard meaningful date/time formats.
Summary
The Active Directory stores date/time values as the number of 100-nanosecond intervals
that have elapsed since the 0 hour on January 1, 1601 until the date/time that is being
stored. The time is always stored in Greenwich Mean Time (GMT) in the Active Directory.
Some examples of Active Directory attributes that store date/time values are LastLogon,
LastLogonTimestamp, and LastPwdSet. In order to obtain the date/time value stored in
these attributes into a standard format, some conversion is required. This article
describes how this conversion can be done.
Procedure
1. Obtain the value of the Active Directory attribute that you want to convert. There
are many ways to extract values of Active Directory attributes. Using ADSI Edit is
one method.
2. Open the Command Prompt.
3. Type the following command:
w32tm.exe /ntte [time in Windows NT time format]
Example
The command w32tm.exe /ntte 128271382742968750 will yield "148462 05:57:54.2968750
- 6/24/2007 8:57:54 AM (local time)" on a computer that is in a time zone three hours
ahead of Greenwich Mean Time (GMT +3:00). Notice that the first half of the output
displays the time in GMT (05:57:54) and then converts it by adding the Time Zone Offset
(8:57:54).
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you run the w32tm /resync
command to synchronize Windows Server 2003 or Windows SBS to an external time
source.
Symptoms
When you run the w32tm /resync command to synchronize Microsoft Windows Server
2003 or Microsoft Windows Small Business Server 2003 (Windows SBS) to an external
time source, you receive the following error message:
The computer did not resync because no time data was available.
If you run the w32tm /config /syncfromflags:manual command or the w32tm /config
/manualpeerlist:peerlist command to determine whether Windows is configured
Cause
This problem occurs if a Group Policy object for a Windows Time Service object is
configured incorrectly.
Resolution
To resolve this problem, examine the Group Policies that set the Windows Time Service
Group Policy objects to their default values or to a value of Not Configured. Examine
Group Policies on the computer and in the organization. Set these Windows Time
Service Group Policy objects to use a value of Not Configured. To do this, follow these
steps:
1. Open the container that contains the Group Policy object that you want to modify.
To do this, follow these steps.
a. On a domain controller, click Start, click Run, type dsa.msc, and then click OK.
7 Note
If the server that has this problem is a domain controller, examine the
Group Policy objects in the Domain Controllers container.
c. In the ContainerName Properties dialog box, click the Group Policy tab.
d. Click the Group Policy object that you want to modify, and then click Edit. For
example, if you are examining the Group Policy objects in the Domain
Controllers container, click Default Domain Controllers Policy, and then click
Edit.
Click Start, click Run, type gpedit.msc, and then click OK.
2. In the Group Policy Object Editor MMC snap-in, expand Computer Configuration,
expand Administrative Templates, expand System, and then click Windows Time
Service.
3. In the right pane, right-click Global Configuration Settings, and then click
Properties.
4. In the Global Configuration Settings Properties dialog box, click Not Configured,
and then click OK.
5. Expand Windows Time Service, click Time Providers, and then set all the objects in
this node to Not Configured. To do this, follow these steps:
a. In the right pane, double-click Enable Windows NTP Client, click Not
Configured, and then click OK.
b. In the right pane, double-click Configure Windows NTP Client, click Not
Configured, and then click OK.
c. In the right pane, double-click Enable Windows NTP Server, click Not
Configured, and then click OK.
6. Exit Group Policy Object Editor, and then click OK to exit the ContainerName
Properties dialog box.
7. Update Group Policy on the server that has this problem. To do this, follow these
steps:
a. Click Start, click Run, type cmd, and then click OK.
b. At the command prompt, type gpupdate /force , and then press ENTER.
More Information
For more information, click the following article numbers to view the articles in the
Microsoft Knowledge Base:
816042 How to configure an authoritative time server in Windows Server 2003
Feedback
Was this page helpful? Yes No
This article provides a resolution for event 142: The time service has stopped advertising
as a time source.
Symptoms
Microsoft-Windows-Time-Service Event 142 is logged with one of four error strings
listed in the table below (less the event_<hex error> string:
ノ Expand table
event_0x0038 The time service has stopped advertising as a time source because the local
machine is not an Active Directory Domain Controller.
event_0x0039 The time service has stopped advertising as a time source because there are no
providers running.
event_0x003A The time service has stopped advertising as a time source because there are no
providers running.
event_0x003B The time service has stopped advertising as a good time source.
Cause
ノ Expand table
The time service has stopped advertising as a time The local machine no longer host the DC
source because the local machine is not an Active role or there is a configuration problem
Directory Domain Controller. with the local machine.
The time service has stopped advertising as a time The NTP client service has stopped or is
source because there are no providers running. non-responsive
The time service has stopped advertising as a time Time on the local computer has fallen out of
source because there are no providers running. sync with its peer
The time service has stopped advertising as a good The local DC is unable to locate a time
time source. server
Resolution
The dominant error string logged by Microsoft-Windows-Time-Service Event 142 is the
third example:
"The time service has stopped advertising as a time source because there are no
providers running."
1. Execute the action plan in Technet's "Event ID 142 - Time Service Advertisement "
2. Verify that the forest root PDC is online, healthy and that the current root domain
PDC is both (1.) correctly configured to sync time with an external time source and
(2.) able to reliably source time from that source.
4. Verify that the DC logging the 142 event can discovery a time server using
DCLocator
6. Check for the use of dueling time protocols by looking for the following events:
ノ Expand table
More information
Real-world customer experience
RDP logons from \\workstation1 (joined to the fabrikam.com domain) to \\DC1 in the
untrusted contoso.com domain fails with the following error:
Dialog message text: Remote Desktop cannot verify the identity of the remote
computer because there is a time or date difference between your computer and
the remote computer. Make sure your computer's clock is set to the correct time,
and then try the connecting again. If the problem occurs again, contact your
network administrator or the owner of the remote computer
The contoso.com domain contains two virtualized DCs, \\DC1 and \\DC2 running on the
same W2K8 R2 Hyper-V host. The Hyper-V host computer for \\DC1 and \\DC2 is a
member server in the fabrikam.com domain - that is, the same domain as the RDCP
client, \\workstation1 .
The system time on \\workstation1 is reported as being seconds apart from the system
time on \\DC1 . The system time on \\DC2.contoso.com domain was reported as being
45 minutes from current time and the time that existed on \\DC1 .
For more information about how to troubleshoot the error, see "Remote Desktop
cannot verify the identity of the remote computer" when connecting to a remote
machine.
A review of the SYSTEM event log to look for Kerberos and Time-related errors showed
the following events.
[2001:4898:1b:4:6dd6:3c5c:699d:38cd]:123).
Event Xml:
<Event xmlns=" https://schemas.microsoft.com/win/2004/08/events/event ">
<System>
<Provider Name="Microsoft-Windows-Time-Service" Guid="{<GUID>}" />
<EventID>37
<Version>0
<Level>4
<Task>0
<Opcode>0
<Keywords>0x8000000000000000</Keywords>
<TimeCreated SystemTime="<DateTime>" />
<EventRecordID>3972
<Correlation />
<Execution ProcessID="1012" ThreadID="1596" />
<Channel>System</Channel>
<Computer>DC2.contoso.com</Computer>
<Security UserID="<sid>" />
</System>
<EventData Name="TMP_EVENT_TIME_SOURCE_REACHABLE">
<Data Name="TimeSource"> dc1.contoso.com (ntp.d|[::]:123->
[2001:4898:1b:4:6dd6:3c5c:699d:38cd]:123)
</EventData>
</Event>
Problem Summary
The RDP client is believed to depend on SPNego that picks the best authentication
mechanism available, and in this case used Kerberos, event though there was no trust
between the fabrikam and contoso.com forests. Kerberos auth requires that the clocks of
the two machines to be less than 5 minutes apart but does not care about the clock
accuracy.
The RDP logon failure is caused by the authenticating DC in the contoso.com domain
(DC1) refusing to authenticate the RDP client logon request because the client's time
doesn't match the server's time. Either the client, or the server, or both could have an
unsynchronized clock.
1. The RDP Client and KDC / RDP Server existed in two different forests with each
forest using different time sourcing configurations
2. The KDC and RDP Server used by the RDC client are both virtualized domain
controllers that require additional configuration changes to accurately source time
then DCs running on physical hardware.
3. The virtual host computer was a domain-joined member server in a different
domain than the Hyper-V hosts
Two negative factors for \\DC1 and |DC2 is that member computers poll time less
frequently by default than domain controllers. Secondly, the Hyper-V host
computer was joined to a different domain than the DC guests and was subject to
different time source configurations
Finally, the VMICTimeSync was used by \\DC2 to source time that is not
recommended for virtualized computers hosting the DC role computers.
4. The forest root PDC in the contoso.com domain was not configured to source time
from an external time source
In this case, the use of multiple time providers in the contoso.com domain ( ntp ,
VMICTimeSync) was deemed to be the root cause of the inaccurate time that lead to the
RDP logon failure.
There are differing opinions about how to configure time in host and guest computers
within the AD and Hyper-V teams. Ryan Sizemores recommendation as of 2010.11.22
was to leave VMIC enabled but pay close attention to the configuration and accuracy of
time on the host computer. For example, the "Configuring the Windows Time service for
Windows Server 2008 and Windows Server 2008 R2" section of "Deploying W2K8 and
W2K8 R2 DCs in existing domains " recommends that virtual host computers be
configured with "DC-like" polling intervals and max*phase correction settings + an
accurate time server, similar to what you'd do on a forest-root PDC.
The use of different time providers and time sources on the virtual host and virtual guest
environments can lead to a situation where time on the guest computer will ping pong
between the VMIC values passed from the host computer. This condition may exist
when virtualized DC guests in one forest are hosted by virtual hosts computers in
another forests or even a workgroup computer where each uses a different time source
/ time configuration and the time samples are different between the two.
The Hyper-V team recommends that you don't disable VMICTimeSync as it provides
protection against time synchronization issues if you used saved state. The key issue
here is not the use of VMICTimeSync - but the fact that if you are running a domain
controller something needs to be getting accurate time from a remote server. You can
do it by either configurating a remote time source inside the virtual machine, or by
leaving the VMICTimeSync enabled and configuring the host to use a reliable time
source.
Recommendations from the Microsoft Windows time team to correct this environment
consisted of:
5. Configure Hyper-V hosts with the same polling intervals as domain controllers
"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\VMICTim
eProvider" /f
/syncfromflags:MANUAL /update
net stop w32time & net start w32time
This article describes how to configure the Windows Time service and troubleshoot
when the Windows Time service doesn't work correctly.
Applies to: Windows Server 2012 Standard, Windows Server 2012 Essentials
Original KB number: 816042
To configure an internal time server to synchronize with an external time source, use the
following method:
To configure the PDC in the root of an Active Directory forest to synchronize with an
external time source, follow these steps:
a. Select Start > Run, type regedit, and then select OK.
c. In the pane on the right, right-click Type, and then select Modify.
d. In Edit Value, type NTP in the Value data box, and then select OK.
b. In the pane on the right, right-click AnnounceFlags, and then select Modify.
c. In Edit DWORD Value, type 5 in the Value data box, and then select OK.
7 Note
b. In the pane on the right, right-click Enabled, and then select Modify.
c. In Edit DWORD Value, type 1 in the Value data box, and then select OK.
ii. In the pane on the right, right-click NtpServer, and then select Modify.
iii. In Edit Value, type Peers in the Value data box, and then select OK.
7 Note
d. In Edit DWORD Value, type TimeInSeconds in the Value data box, and then
select OK.
7 Note
h. In Edit DWORD Value, type TimeInSeconds in the Value data box, and then
select OK.
7 Note
6. At the command prompt, type the following command to restart the Windows
Time service, and then press Enter:
Windows Command Prompt
Troubleshooting
For the Windows Time service to function correctly, the networking infrastructure must
function correctly. The most common problems that affect the Windows Time service
include the following:
7 Note
In special cases, charges that are ordinarily incurred for support calls may be
canceled if a Microsoft Support Professional determines that a specific update will
resolve your problem. The usual support costs will apply to additional support
questions and issues that do not qualify for the specific update in question.
More information
Windows Server includes W32Time, the Time Service tool that is required by the
Kerberos authentication protocol. The Windows Time service makes sure that all
computers in an organization that are running the Microsoft Windows 2000 Server
operating system or later versions use a common time.
To guarantee appropriate common time usage, the Windows Time service uses a
hierarchical relationship that controls authority, and the Windows Time service does not
allow for loops. By default, Windows-based computers use the following hierarchy:
In this hierarchy, the PDC operations master at the root of the forest becomes
authoritative for the organization. We highly recommend that you configure the
authoritative time server to obtain the time from a hardware source. When you
configure the authoritative time server to sync with an Internet time source, there is no
authentication. We also recommend that you reduce your time correction settings for
your servers and stand-alone clients. These recommendations provide more accuracy
and security to your domain.
References
For more information about Windows Time service, see:
For more information about the Windows Time service, see Windows Time Service
(W32Time).
Feedback
Was this page helpful? Yes No
This article describes how the Windows Time service treats a leap second.
For more information about Windows time synchronization, see How the Windows Time
Service Works.
However, if an external NTP server sends a Leap Indicator that has a value of 01 to the
Windows Time service NTP server, the Windows NTP server sends the same value to
following NTP client.
Feedback
Was this page helpful? Yes No
This article describes the support boundaries for the Windows Time service (W32Time)
in environments that require highly accurate and stable system time.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows 10 version 1607 or later, Azure Stack HCI, versions 21H2 and 20H2
Tighter accuracy requirements were outside of the design specification of the Windows
Time Service on these operating systems and isn't supported.
) Important
Time accuracy
The target system must run Windows 10, Windows Server 2016.
The target system must synchronize time from an NTP hierarchy of time servers,
culminating in a highly accurate, Windows compatible NTP time source.
All Windows operating systems in the NTP hierarchy mentioned above must be
configured as documented in the Configuring Systems for High Accuracy
documentation.
The cumulative one-way network latency between the target and source must not
exceed 100 ms. The cumulative network delay is measured by adding the
individual one-way delays between pairs of NTP client-server nodes in the
hierarchy starting with the target and ending at the source. For more information,
please review the high accuracy time sync document.
The other requirements to achieve 50-ms accuracy for a specific target system are:
The target computer must have better than 5 ms of network latency between its
time source.
The target system must be no further than stratum 5 from a highly accurate time
source.
7 Note
Run w32tm /query /status from the command line to see the stratum.
The target system must be within 6 or less network hops from the highly accurate
time source.
The one-day average CPU utilization on all stratums must not exceed 90%.
For virtualized systems, the one-day average CPU utilization of the host must not
exceed 90%.
The other requirements to achieve 1-ms accuracy for a specific target system are:
The target computer must have better than 0.1 ms of network latency between its
time source
The target system must be no further than stratum 5 from a highly accurate time
source
7 Note
Run w32tm /query /status from the command line to see the stratum.
The target system must be within 4 or less network hops from the highly accurate
time source.
The one-day average CPU utilization across each stratum must not exceed 80%.
For virtualized systems, the one-day average CPU utilization of the host must not
exceed 80%.
Feedback
Was this page helpful? Yes No
This article provides information about Microsoft support for the leap second.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows Server 2008 R2 Service Pack 1, Windows 10, version 2004, Windows 10, version
1909, Windows 10, version 1803, Windows 10, version 1709, Windows 7 Service Pack 1
Original KB number: 2722715
Summary
This article contains information about Microsoft support for the leap second. The leap
second is a one-second adjustment, which is occasionally applied to Coordinated
Universal Time (UTC) in order to keep its time of day close to the mean solar time, or
UT1.
7 Note
Windows Server 2019 and Windows 10 October 2018 Update do support leap
seconds in the platform. However, this article does not apply strictly to these or
later operating systems. For more information, see:
More information
(1) Windows
About the OS
Leap second processing is not handled separately by the Windows operating system
(OS). For example, year, month, date, and time information in the following format is not
supported by the Windows OS:
yyyy/mm/dd 08:59:60
Therefore, 2012/7/1 08:59:60 is processed as 2012/7/1 09:00:00, per the ISO 8601
format.
During the brief period that follows the introduction of a leap second on an upstream
NTP server (including W32time Server), a time difference of about one second occurs
between that upstream NTP server and the W32time clients that synchronize from it.
The W32time clients correct their local clocks when they subsequently synchronize time
from their upstream server.
For more information, see the following Microsoft Knowledge Base (KB) article:
Additionally, in the Windows Time Service, it's not always possible to prevent the
occurrence of marginal time differences, such as one second. The operating system is
designed to handle time variations. Leap second variations are handled cleanly, allowing
for uninterrupted execution. For more information, see the following KB article:
939322 Support boundary to configure the Windows Time service for high-accuracy
environments
About the cluster service As for the cluster configuration, it's same as with the OS: leap
second processing is not performed.
(2) SQL Server 2000, 2005, 2008, 2008 R2, 2012, and 2014
SQL Server does not use time data for managing internal operations such as
transactions. Therefore, even if a one-second deviation occurs in the system time
because of the leap second, it does not affect SQL Server operations. As with the
Windows OS, SQL Server does not independently recognize the leap second.
Be aware the date data type (for example, datetime) does not support the format in
which the seconds value reaches 60 such as 2012/7/1 08:59:60. Therefore, if a
connection is established to SQL Server from an application that's running on an OS that
supports the leap second, and the OS tries to set a leap second (data in which the
second's value is 60) in the column and variable of the date data type, an error is
returned. For more information, see the following "Reference information" section.
Reference information
[Example] When the leap second is handled as the date data type in the SQL Server
SQL
Result
Message 242, Level 16, Status 3, Row 1
As a result of conversion from the varchar data type to the datetime data type, the value
is set outside the range.
The statement has ended.
(5) Others
Applications that are running in Windows typically use the system clock. Therefore, they
can be used without consideration for the leap second.
However, if a Microsoft product is accessed from an application that manages the time
on its own and that supports the leap second, or from an application that's running on
an OS that supports the leap second, problems are likely to occur. This is because
Microsoft products do not recognize the leap second.
Additionally, applications should not rely on the system time to increase monotonically.
Instead, they should use the GetTickCount64() function to read the current tick count,
which is the time since startup in milliseconds.
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that Windows Time service does not
correct the time if the service gets into Spike state.
Applies to: Windows 10, version 1511, Windows 10 Pro released in July 2015, Windows
Server 2012 R2, Windows 8.1, Windows Server 2012, Windows 8, Windows Server 2008
R2, Windows 7, Windows Server 2008, Windows Vista
Original KB number: 2638243
Symptoms
An NTP client computer that is running Windows Server editions or Windows Client
editions may not correct the time if the following conditions are true:
The NTP client syncs its time with the manually specified NTP server.
The NTP client uses SpecialPollInterval as a polling interval.
The time offset between the NTP client and the NTP server is greater than the
LargePhaseOffset as configured in the NTP client.
In this situation, the NTP client cannot correct its time even after waiting for
SpikeWatchPeriod to pass.
Cause
This problem occurs because the NTP client gets into SPIKE state every time the client
polls the time sample to the NTP server. The Time service manages its internal status,
and if the client gets into SPIKE state, the client does not sync its time.
Resolution
To work around this issue so that the NTP client is enabled to sync with the NTP server
after a SPIKE state, configure Windows Time to use the MinPollInterval/MaxPollInterval
as the polling interval.
1. Click Start, click Run, type cmd, and then press ENTER.
7 Note
2. At the command prompt, type the following command. After you type the
command, press ENTER.
Console
7 Note
When you use the 0x1 flag with the /manualpeerlist switch, you specify use
of SpecialPollInterval . To work around this problem, do not use the 0x1 flag.
Workaround
If you want to use "SpecialPollinterval", you should change the following registry:
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config
Value: MinPollInterval
Type: DWORD
To avoid this issue, the registry key should apply conditional expression as follows:
Conditional expression:
SpecialPollInterval<(2^MinPollInterval)*(HoldPeriod+1)
Domain member computer has default values:
MinPollInterval=10
HoldPeriod=5
7 Note
If you set Windows Time Service's settings by Group Policy or Local Group Policy,
this workaround does not work and you have to delete Policy settings.
Status
Microsoft has confirmed that it is a problem in the Microsoft products that are listed in
the "Applies to" section.
More information
The polling interval that Windows Time uses is set by the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters
If the value of the NtpServer entry in this subkey contains 0x1, Windows Time uses
SpecialPollInterval as the polling interval. Otherwise, Windows Time uses
MinPollInterval/MaxPollInterval. For additional Information about the Windows Time
Service and registry values, visit the following Microsoft Web site:
https://technet.microsoft.com/library/cc773263(WS.10).aspx
Feedback
Was this page helpful? Yes No
Cause
This problem may occur when your computer sends synchronization requests by using
symmetric active mode. By default, Windows Server 2003 domain controllers are
configured as time servers and use symmetric active mode to send synchronization
requests. Some NTP servers that don't run Windows respond only to requests that use
client mode.
Resolution
To resolve this problem, configure Windows Time to use client mode when it
synchronizes with the time server. Follow these steps:
1. Select Start, search for cmd, right-click Command Prompt, and then select Run as
administrator.
Console
More information
The mode that Windows Time uses to send requests is set by the following registry
subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServe
r
If the value of the Enabled entry in this subkey is 1, Windows Time uses symmetric
active mode. Otherwise, Windows Time uses client mode.
The 0x8 setting that is referenced in the command in the "Resolution" section sets
Windows Time to use client mode.
The valid settings for the mode used with the /manualpeerlist switch include:
Feedback
Was this page helpful? Yes No
This article describes how to turn on debug logging for the Windows Time service (also
known as W32time). If you are an administrator, you can use the debug logging feature
of the Windows Time service to help troubleshoot issues.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Window 10 – all editions, Windows 7 Service Pack 1
Original KB number: 816043
7 Note
Microsoft recommends that you use debug logging after you have performed all
other troubleshooting steps. Because of the nature of the detailed information in
the debug log, you may have to contact a Microsoft Support Professional.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
3. On the Edit menu, click New Value, and then add the following registry values:
Value Name: FileLogSize
Data Type: DWORD
Value data: 10000000
This registry value specifies the size of the log file in bytes. A value of 10000000
bytes will limit the log file to approximately 10 MB.
This registry value specifies the location of the log file. The path is not fixed. You
can use a different path.
This registry value specifies the level of detail of the information in the debug log.
If you must have more detailed logging information, contact a Microsoft Support
Professional.
7 Note
The Data Type value must be of type REG_SZ (String). You must type the value
exactly as shown (that is, type 0-116 ). The highest possible value is 0-300 for
most detailed logging. The meaning of this value is: Log all entries within the
range of 0 and 116.
Feedback
Was this page helpful? Yes No
This article describes an issue in which Windows Time service settings are disabled in the
registry after you upgrade to Windows Server 2016 or Windows 10 Version 1607.
Applies to: Windows Server 2016, Windows Server 2012 R2, Windows 10 - all editions
Original KB number: 3201265
Symptoms
When you do an in-place upgrade on the following operating systems upgrade paths,
the Windows Time service doesn't preserve its configuration. Instead, it shows the
default values for a workgroup server or workstation.
ノ Expand table
Affected roles
After the in-place upgrade is completed, the following roles may be affected.
Domain controllers
The domain controllers (DC) that hosts the PDC emulator role is the default authoritative
time server for the domain. Typically, it's configured to sync with a highly accurate time
source. All other DCs in the domain sync their time with the PDC.
After you do an in-place upgrade, the PDC loses its connection to the external time
server that it's configured to sync with. It also no longer announces that it's a time
server.
All other DCs in the domain no longer announce that they're time servers, and they no
longer use the domain hierarchy to sync their time. Therefore, their time setting may no
longer be in sync with the setting for their peers, and domain members can no longer
sync their time.
You may also notice that the DC doesn't respond to NTP client requests. It includes
failures that occur when you test the NTP server availability by using the w32tm.exe
/stripchart tool. For example, the text output may resemble the following output:
Domain Members
Domain member servers and computers that are upgraded are no longer configured to
use the domain hierarchy to synchronize their time. Instead, they'll sync their time with
the time.windows.com website.
Windows computers that are manually configured as an Authoritative Time Server lose
their configuration. Therefore, devices that are configured to use these computers to
synchronize their time may not sync.
You may also notice that the Authoritative NTP server doesn't respond to NTP client
requests. It includes failures that occur when you test the NTP server availability by using
the w32tm.exe /stripchart tool. For example, the text output may resemble the
following output:
7 Note
This issue shouldn't occur when you do an in-place upgrade of the following
operating systems:
Windows 10 version 1507 through Windows 10 version 1511
Windows 10 version 1511 through Windows 10 version 1607
Windows Server 2016 Technical Preview 5 (TP5) through Windows Server 2016
(RTM)
Cause
It's a known issue in the Windows upgrade paths that are listed in the "Symptoms"
section. This issue occurs because the registry values for the Windows Time service
aren't preserved during an upgrade. Therefore, all Windows Time service values are
reverted to the default state of a Workgroup Member Server or a stand-alone computer.
Workaround
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, go to the following Microsoft Knowledge Base article:
322756 How to back up and restore the registry in Windows
7 Note
Method 1
Before you upgrade to Windows 10 Version 1607 or Windows Server 2016, manually
back up the contents under the w32time registry key. To do so, follow these steps:
5. In the Export Registry File dialog box, select the location where you want to save
the backup copy, and then type a name for the backup file in the File name field.
6. Select Save.
7. Save the W32time configuration for validation by running the following commands
at an elevated command prompt:
Console
You can now upgrade the computer to Windows Server 2016 or Windows 10 Version
1607. After the upgrade is completed, follow these steps to restore the contents under
the w32time registry key:
6. In the Import Registry File dialog box, select the location where you saved the
backup copy, select the backup file, and then select Open.
Console
reg delete
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TriggerInf
o\1 /f
9. Restart W32time service to enable it to use the new configuration. To do so, run
the following commands at an elevated command prompt:
Console
Method 2
If you're experiencing issues that affect the Windows Time Service after you upgrade to
Windows Server 2016 or Windows 10 Version 1607, follow these steps to reregister
w32tm.exe .
7 Note
This procedure restores the default settings that are appropriate for the computer
role. It does not restore any customizations that were made by the administrator.
Console
w32tm.exe /unregister
w32tm.exe /register
Method 3
If you're experiencing issues that affect the Windows Time Service after you upgrade to
Windows Server 2016 or Windows 10 Version 1607, follow these steps to restore your
settings from the Windows.old folder.
) Important
a. Open the Windows Run box by pressing the Windows logo key+R.
f. In the Load Hive dialog box, type Offline, and then click OK.
g. Expand Offline.
j. In the Export Registry File dialog box, select the location on a local hard disk
where you want to save the registry, and then type a name for the backup file in
the File name field.
k. Click Save.
m. On the File menu, click Unload Hive, and then click Yes in the Confirm Unload
Hive dialog box.
7 Note
This restarts the computer in Recovery mode and provides a Command
Prompt window.
e. In the Load Hive dialog box, type Offline, and then click OK
f. Expand Offline.
i. In the Import Registry File dialog box, select the location where you saved the
backup copy, select the backup file, and then click Open.
k. On the File menu, click Unload Hive, and then click Yes in the Confirm Unload
Hive dialog box.
l. Exit Registry Editor, and then restart the computer in Normal mode.
1. Run DCDiag.exe on DCs to make sure that they're advertising as a time server.
2. Make sure that DCs or Authoritative NTP Servers respond to NTP client requests
without errors. For example, the command output resembles the following one:
3. For advanced users, query the W32time configuration, and make sure that the time
providers are configured as expected. If you used Method 1 as the workaround,
you can compare the post-upgrade configuration to the saved pre-configuration
data. For example, the command output resembles the following one:
References
For more information about related Netlogon issues, click the following article number
to view the article in the Microsoft Knowledge Base:
3201247 Netlogon service doesn't retain settings after upgrade to Windows Server
2016
Feedback
Was this page helpful? Yes No
This article helps fix an issue where the NTP client doesn't synchronize time at the
SpecialPollInterval period as expected.
Symptoms
Assume that you modify W32time settings to always run and that one of the following
conditions is true:
In this scenario, the NTP client doesn't synchronize time at the SpecialPollInterval period
as expected.
Cause
Because of the way that the Windows Time Service handles large SpecialPollInterval
values, time may be synchronized from the NTP server at longer intervals than expected.
Resolution
Workaround 1
Specify a smaller SpecialPollInterval value than the default value. The default values are
as follows:
HKEY_LOCAL_MACHINE
\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient
3. Restart the Windows Time Service, or run the following command to signal
W32time about the modified configuration:
Console
Workaround 2
Use the built-in poll interval adjustments based on MinPollInterval, MaxPollInterval
instead of using SpecialPollInterval. This built-in tool automatically adjusts the polling
interval from MinPollInterval all the way up to MaxPollInterval if the client machine
keeps fairly accurate time. You need only modify a flag in the NtpServer configuration in
order to switch from SpecialPollInterval to the automatic poll interval, as follows:
HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\Services\W32Time\Parameters
Console
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve Admin Development-related issues. The topics are divided
into subcategories. Browse the content or use the search feature to find relevant
content.
Feedback
Was this page helpful? Yes No
This article describes how to convert a string formatted GUID (for example, {XXXXXXXX-
XXXX-XXXX-XXXX-XXXXXXXXXXXX}) to its hexdecimal string form for use in a GUID bind
string in the Active Directory.
To convert a string formatted GUID to its hexadecimal string form, follow these steps:
'================================================================
' Replace the value of strGUID with an actual GUID
'================================================================
strGUID = "{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}"
Set obj = GetObject("LDAP://<GUID=" &
ConvertStringGUIDToHexStringGUID(strGUID) & ">")
MsgBox "The octet guid for " & obj.Get("displayname") & " is " &
obj.GUID
'================================================================
' ConvertGUIDtoOCTET function
'================================================================
Function ConvertStringGUIDToHexStringGUID(strGUID)
Dim octetStr, tmpGUID
For i = 0 To Len(strGUID)
t = Mid(strGUID, i + 1, 1)
Select Case t
Case "{"
Case "}"
Case "-"
Case Else
tmpGUID = tmpGUID + t
End Select
Next
ConvertGUIDtoOCTET = octetStr
End Function
Feedback
Was this page helpful? Yes No
This article introduces the best practice for configuring EventLog forwarding in a large
environment in Windows Server 2012 R2.
Summary
There are important scalability fixes that have been rolled out to Windows Server 2016,
Windows Server 2019 in the February 25, 2020 cumulative updates.
See "Improves Event Forwarding scalability to ensure thread safety and increase
resources." bullet in the following two articles:
Events latency
As soon as events are generated on the client, the Event Forwarding mechanism takes
some time to forward them to the collector.
7 Note
Make sure that the events are not overwritten on the client before they are
forwarded. We usually have to manage this issue only when the clients generate a
large amount of events, such as a busy server or the DC forwarding the Security
log.
Additionally, we recommend that you install at least 16 GB of RAM and four (4)
processors on the collector to support an average load of 2,000 to 4,000 clients that
have one or two subscriptions configured.
Fast disks are recommended, and the ForwardedEvents log can be put onto another disk
for better performance.
The memory usage of the Windows Event Collector service depends on the number of
connections that are received by the client. The number of connections depends on the
following factors:
For example, for the default values of 4,000 clients and five to seven subscriptions, the
memory that is used by the Windows Event Collector service may quickly exceed 4 GB
and continue to grow. This can make the computer unresponsive.
The collector responds by providing a list of the subscriptions that are enabled for the
client. The response includes the bookmarks for each channel and the Xpath query. As
soon as the client receives the information, it starts to send the events or the heartbeat
packets to the /Subscriptions URL. If the subscriptions don't change frequently, this
parameter can be configured to check every few hours or even less often.
DeliveryMaxLatency
Controls the frequency of the client connections. For a large deployment, you can create
a subscription for urgent events set to a 5-minute frequency, and another for less urgent
events set to a 2-hour frequency.
HeartbeatInterval
Controls the Inactive status in the Runtime status window of the console. Can be set to
the same value as DeliveryMaxLatency or a larger value to give clients additional time
before they are marked as Inactive.
Custom parameters
To configure custom parameters, you must use the command line to run Wecutil. For
more information, see Wecutil.exe.
Console
Console
Adjust HeartbeatInterval to the same value. This setting affects the "Inactive"
status for each client in the console:
Console
Normal
Provides reliable delivery of events, and does not try to conserve bandwidth.
The appropriate choice unless you require tighter control over bandwidth usage
or you require that forwarded events be delivered as quickly as possible.
Uses pull delivery mode, batches five items at a time, and sets a batch time-out
of 15 minutes.
Minimize Bandwidth
Makes sure that the use of network bandwidth for event delivery is strictly
controlled.
The appropriate choice if you want to limit the frequency of network
connections to deliver events.
Uses push delivery mode, and sets a batch time-out of 6 hours and a heartbeat
interval of 6 hours.
Minimize Latency
Makes sure that events are delivered by having minimal delay.
The appropriate choice if you collect alerts or critical events.
Uses push delivery mode, and sets a batch time-out of 30 seconds.
The client connects to the collector at the specified frequency to either send the events
or send a heartbeat. The default "Normal" settings can cause high memory usage by
having 2,000 to 4,000 clients per collector.
The GPOs that assign the collector to each client can be filtered by using either the
security setting on the GPO itself or a WMI filter. For example, if the computer name
always ends in a numeral (such as computer1, computer2, and so on), we can create
GPOs to point the clients to 10 different collectors.
We recommend that you configure the subscription by editing the Xpath query and
putting multiple queries into the same subscription.
Feedback
Was this page helpful? Yes No
Applies to: Windows 10 - all editions, Windows 7 Service Pack 1, Windows Server 2012
R2
Original KB number: 2591403
Symptoms
Due to the volume of support incidents handled by Microsoft Support Services for
issues related to the following hotfixes, these are recommended for installation for the
platforms indicated below. These hotfixes are associated with the operation and
functionality of the WMI service and its related components. When experiencing issues
related to WMI on a system the symptoms can vary widely depending upon the root
cause. The following are a few examples of high-level symptoms noted in support
incidents that may be resolved with the application of the indicated hotfixes:
7 Note
MSKB 2617858 includes the a resolution for the high CPU fix in MSKB
2505348 AND a fix for WMI repositories being improperly marked drity
after graceful shutdowns, triggering full verification on the following OS
startup. MSKB 2505348 is there fore superceded by MKSB 2617858 .
7 Note
982293 The Svchost.exe process that has the WMI service crashes in Windows
Server 2008 R2 or in Windows 7 Note: MSKB 982293 is applicable to the
computers running Windows 7 or Windows Server 2008 R2 without Service Pack
1 (SP1)
Feedback
Was this page helpful? Yes No
This article helps fix slow system startup or slow login issues that occur when a group
policy with a WMIFilter or installed application queries the Win32_Product class.
Symptom
You may experience slow system startup or slow login issues. Additionally, you may see
the following event in the Application Event log:
You'll see this event for each of the installed application on the computer.
The system Event log will show that the Windows Installer Service is starting and
stopping automatically.
Cause
This problem can happen if one of the following conditions is true:
You have a group policy with a WMIFilter that queries Win32_Product class.
You have an application installed on the machine that queries Win32_Product class.
Resolution
If you're using a group policy with the WMIFilter that queries Win32_Product , modify the
filter to use Win32reg_AddRemovePrograms .
If you have an application that uses the previous class, contact the vendor to get an
updated version that doesn't use this class.
To narrow down the application that causes the problem, you can follow the Clean boot
troubleshooting method.
7 Note
More information
Win32_product class isn't query optimized. Queries such as select * from Win32_Product
where (name like 'Sniffer%') require WMI to use the MSI provider to enumerate all of
the installed products and then parse the full list sequentially to handle the where
clause. This process also starts a consistency check of packages installed, verifying, and
repairing the install. An account with only user privileges may cause delay in application
launch and an event 11708 stating an installation failure, as the user account may not
have access to quite a few locations.
Feedback
Was this page helpful? Yes No
This article helps fix an issue that occurs when you use source-initiated event forwarding
to send events to a Microsoft Windows Server event collector.
Symptoms
You configure a Windows Server 2019 or Windows Server 2016 computer as an event
collector. You also configure a source-initiated subscription (and related Group Policy
Objects) for event forwarding. However, the events are not forwarded and the event
source computers log event messages that resemble the following:
Output
Cause
This behavior is caused by the permissions that are configured for the following URLs:
http://+:5985/wsman/
http://+:5986/wsman/
On the event collector computer, both the Windows Event Collector service (WecSvc)
and the Windows Remote Management service (WinRM) use these URLs. However, the
default access control lists (ACLs) for these URLs allow access for only the svchost
process that runs WinRM. In the default configuration of Windows Server 2016, a single
svchost process runs both WinRM and WecSvc. Because the process has access, both
services function correctly. However, if you change the configuration so that the services
run on separate host processes, WecSvc no longer has access and event forwarding no
longer functions.
The services function differently in Windows Server 2019. If a Windows Server 2019
computer has more than 3.5 GB of RAM, separate svchost processes run WinRM and
WecSvc. Because of this change, event forwarding may not function correctly in the
default configuration. For more information about the service changes, see Changes to
Service Host grouping in Windows 10.
Resolution
To view the URL permissions, open an elevated Command Prompt window and run the
command netsh http show urlacl .
To fix the URL permissions, use the elevated Command Prompt window and run the
following commands:
Feedback
Was this page helpful? Yes No
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve Application Management-related issues. The topics are
divided into subcategories. Browse the content or use the search feature to find relevant
content.
Feedback
Was this page helpful? Yes No
This article provides workarounds for an issue where the Dial-in tab is not available in
the Active Directory Users and Computers MMC snap-in.
Symptoms
After you install Remote Server Administration Tools for Windows 7 on a computer that
is running Windows 7, the Dial-in tab is missing in the properties of a user account in
the Active Directory Users and Computers Microsoft Management Console (MMC) snap-
in.
Cause
This issue occurs because the RSAT manifest and the installation package do not include
the Rasuser.dll and Rtrfiltr.dll modules that are required to load the Dial-In tab.
Workaround
To work around this issue, use one of the following workarounds, as appropriate.
Workaround 1
On the computer that is running Windows 7, use Remote Desktop Services to connect to
a server that is running Windows Server 2008 R2, Windows Server 2008, or Windows
Server 2003. Then, start the Active Directory Users and Computers MMC snap-in on the
server.
Workaround 2 (Windows Server 2008)
1. On a server that is running Windows Server 2008, install the Terminal Services role,
and then install the Terminal Server role service to enable the use of RemoteApp
Manager.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
More information
For more information about Windows Server 2008 Terminal Services, visit the following
Microsoft Web site: https://technet.microsoft.com/library/cc268349.aspx
For more information about Windows Server 2008 R2 Remote Desktop Services, visit the
following Microsoft Web site:
https://technet.microsoft.com/library/dd647502(WS.10).aspx
Feedback
Was this page helpful? Yes No
This article describes an issue where Direct-X diagnostics tool (DXDIAG) reports an
unexpected value for the display adapters memory.
Symptoms
You have a system with 1GB or greater of Video memory, and 4GB or greater of system
memory (RAM). You run the Direct-X Diagnostics tool, and it reports that you have an
unexpectedly low amount of Approximate Total Memory on the display tab. You may
also see issues with some games or applications not allowing you to select the highest
detail settings.
Cause
The API that DXDiag uses to approximate the system memory was not designed to
handle systems in this configuration
Resolution
Microsoft is working to resolve this in future releases.
More information
On a system with 1GB of video memory, the following values are returned with the
associated system memory:
ノ Expand table
4GB 3496MB
System Memory Reported Approximate Total Memory
6GB 454MB
8GB 1259MB
Feedback
Was this page helpful? Yes No
This article provides a resolution for the error "The Best Practices Analyzer scan has
failed" when running Best Practice Analyzer.
Symptoms
When you run a Best Practices Analyzer (BPA) in Windows Server 2008 R2 Server
Manager, it returns the following error:
Cause
The BPA error will occur if you enable the Turn on Script Execution policy to control
PowerShell script execution and set it to Allow only signed scripts or Allow local scripts
and remote signed scripts. The error will also occur if the Turn on Script Execution is
set to Disabled.
The error will not occur if the policy is set to Allow all scripts.
Resolution
Remove, disable, or set to "Not Configured" the following Group Policy setting that is
being applied to the server with the BPA error.
The BPA will start working once the policy change applies. No reboot is required for the
change to take effect.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where you receive error code 80080005
when you start many Microsoft COM+ applications manually from a Component
Services Microsoft Management Console (MMC) snap-in.
Symptoms
When you start many Microsoft COM+ applications manually from the Component
Services Microsoft Management Console (MMC) snap-in where each COM+ application
is running under a different user account, you may receive the following error message:
Catalog Error: An error occurred while processing the last operation. Error code
80080005 -- server execution failed. The event log may contain additional
troubleshooting information.
You will receive an error message that is similar to the following in the application log of
Event Viewer:
Output
Type: Error
Source: DCOM
Category: None
Event ID: 10010
Date: 31/03/2004
Time: 15:13:30
User: NT AUTHORITY\SYSTEM
Computer: MSHSRMSWEBP0007
Description: The server {F1673109-CF44-468D-9E23-FE4116F84CFA} did not
register with DCOM within the required timeout.
Cause
If many COM+ applications run under different user accounts that are specified in the
This User property, the computer cannot allocate memory to create a new desktop heap
for the new user. Therefore, the process cannot start.
Workaround
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
To work around this problem, modify the value of the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session
Manager\SubSystems\Windows
1. Click Start, click Run, type regedit, and then click OK.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session
Manager\SubSystems
By default, the Windows entry in the subkey has a value that is similar to the
following (all on one line):
%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows
SharedSection=1024,3072 Windows=On SubSystemType=Windows
ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3
ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off
MaxRequestThreads=16
3. Right-click the Windows entry, and then click Modify. The Edit String dialog box
appears.
4. In the Value data box, locate SharedSection, add 512 to SharedSection, and then
click OK.
%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows
SharedSection=1024,3072,512 Windows=On SubSystemType=Windows
ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3
ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off
MaxRequestThreads=16
2. Open the Component Services MMC snap-in. To do this, follow these steps:
a. Click Start, point to Settings, and then click Control Panel.
b. In Control Panel, double-click Administrative Tools, and then double-click
Component Services. The Component Services MMC snap-in appears.
c. In the left pane, expand Component Services, expand Computers, and then
expand My Computer.
3. Create a COM+ application, and then set the application identity of the COM+
application. To do this, follow these steps:
a. Right-click COM+ Applications, point to New, and then click Application. The
Welcome to the COM Application Install Wizard dialog box appears.
b. In the Welcome to the COM Application Install Wizard dialog box, click Next.
The Install or Create a New Application dialog box appears.
c. Click Create an empty application. The Create Empty Application dialog box
appears.
d. In the Enter a name for the new application box, type MyCOM1, and then click
Next. The Set Application Identity dialog box appears.
e. Click This user, and then type a user name that you created in step 1 in the User
box.
f. In the Set Application Identity dialog box, type your password in the Password
box and in the Confirm Password box, and then click Next. The Thank you for
using the COM Application Install Wizard dialog box appears.
g. Click Finish.
5. Repeat step 3 to create 100 COM+ applications that run under different local user
accounts.
6. Repeat step 4 to add components to the 100 COM+ applications that you created
in step 5.
7. In the left pane of the Component Services MMC snap-in, right-click each COM+
application that you created, and then click Start. After you start some COM+
applications, you receive the error message that is described in the Symptoms
section.
References
Creating a New COM+ Application
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019,
Windows Server 2022
Original KB number: 3182294
Symptoms
After you upgrade from an earlier release of Windows Server to Windows Server 2016 or
later versions, applications cannot remotely access a COM+ object, and you receive the
following error message:
0x80004027-CO_E_CLASS_DISABLED
Cause
This problem occurs because support for the Application Server role was removed from
Windows Server 2016 or later versions. This change blocks applications that rely on
COM+ remote access.
Resolution
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
To resolve this problem and enable COM+ remote access, follow these steps:
1. Enable COM+ Network Access in Windows Firewall. To do this, open Control Panel,
click the Windows Firewall item, and then click Allow an app or feature through
Windows Firewall.
2. In the Allowed apps and features list, select the COM+ Network Access check
box, and then select the appropriate scope that's required for your application. For
enterprises, this is typically Domain. However, your application may require
additional settings, depending on the scenario.
3. Set the registry value that allows COM+ remote access. To do this, follow these
steps:
a. In the Start search box, type regedit, and then click regedit.exe in the results
list.
b. Locate the following subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\COM3
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where a COM+ application stops working in
Windows when a user logs off.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows 10 - all editions, Windows 7 Service Pack 1
Original KB number: 2287297
Symptoms
On a Windows server, you have a COM+ server application in which the identity is
configured to run as a specific user. After working for some time, the application may
stop working and keep failing. You have to restart the COM+ application to resolve the
issue.
You may see an error that resembles the following in the Application log on the CLIENT
machine. If the client executable runs on the same computer as the COM+ server
application, you will see this error on the COM+ server:
In this case, the event message tells you that the error (E_FAIL or 80004005 or
Unspecified error) is returned from the server. The CLSID of the component will be listed
in the event log entry.
You'll also see events that resemble the following in the Application log of the computer
on which the COM+ application runs:
Log Name: Application
Source: Microsoft-Windows-User Profiles Service
Date: <DateTime>
Event ID: 1530
Task Category: None
Level: Warning
Keywords: Classic
User: SYSTEM
Computer: SERVERNAME
Description:
Windows detected your registry file is still in use by other applications or services.
The file will be unloaded now. The applications or services that hold your registry file
may not function properly afterwards.
DETAIL -
1 user registry handles leaked from \Registry\User\S-1-5-21-1049297961-
3057247634-349289542-1004_Classes:
Process 2428 (\Device\HarddiskVolume1\Windows\System32\dllhost.exe) has
opened key \REGISTRY\USER\S-1-5-21-1123456789-3057247634-349289542-
1004_CLASSES
You may see the call to create an instance of the component returns 0x800703fa.
Cause
The user identity that is associated with the COM+ application is logged on when the
COM+ application is first initialized. If this user were to log off of the machine, then the
user's profile would get unloaded and the COM+ application can no longer read registry
keys in the profile of the user identity. Starting with Windows Vista the User Profile
Service will force the unloading of a user profile when that user logs off. This is a
situation where the functionality of forcing the unload of the user profile may break an
application if registry handles are not closed in the process. This new User Profile Service
functionality is the default behavior.
Resolution
As a workaround it may be necessary to modify the default behavior of the User Profile
Service. The policy setting Do not forcefully unload the user registry at user logoff
counters the default behavior of Vista and newer operating systems. When enabled, the
User Profile Service will not forcefully unload the registry, instead it waits until no other
processes are using the user registry before it unloads it. The policy can be found in the
group policy editor (gpedit.msc). The Do not forcefully unload the user registry at user
logoff policy is located under Computer Configuration > Administrative Templates >
System > User Profiles.
Change the setting from Not Configured to Enabled which disables the new User Profile
Service feature. DisableForceUnload is the value added to the registry.
More information
Windows will always unload the users registry, even if there are any open handles to the
per-user registry keys at user logoff. Using this policy setting, an administrator can
negate this behavior, preventing Windows from forcefully unloading the users registry
at user logoff.
7 Note
This policy should only be used for cases where you may be running into
application compatibility issues due to this specific Windows behavior. It is not
recommended to enable this policy by default as it may prevent users from getting
an updated version of their roaming user profile.
If you enable this policy setting, Windows will not forcefully unload the users registry at
logoff, but will unload the registry when all open handles to the per-user registry keys
are closed.
If you disable or do not configure this policy setting, Windows will always unload the
users registry at logoff, even if there are any open handles to the per-user registry keys
at user logoff.
Even if you enabled the Do not forcefully unload the user registry at user logoff policy
setting, the Event ID 1530 warning may be logged. The warning is logged after the first
attempt to unload the registry hive. If this fails, the policy is checked to determine
whether the registry hive should be forced to unload regardless of open registry
handles.
Feedback
Was this page helpful? Yes No
Provide product feedback
Performance degrades when you access
large files with
FILE_FLAG_RANDOM_ACCESS
Article • 12/26/2023
This article provides a solution to an issue that operating system performance may
degrade when one or more processes access multiple large files using the CreateFile()
API and the FILE_FLAG_RANDOM_ACCESS flag.
Symptoms
Operating system performance may degrade when one or more processes access
multiple large files using the CreateFile() API and the FILE_FLAG_RANDOM_ACCESS flag.
The performance degradation is because of the system cache consuming available
memory (visible in the performance counter Memory\Cache Bytes).
Cause
The FILE_FLAG_RANDOM_ACCESS flag is a hint to the Cache Manager that the file will be
opened for random I/O. Random I/O means there is no predictable pattern to the I/O
that will take place. This flag disables intelligent read-aheads and prevents automatic
unmapping of views after pages are read to minimize mapping/unmapping when the
process revisits that part of the file. This keeps previously read views in the Cache
Manager working set. However, if the cumulative size of the accessed files exceeds
physical memory, keeping so many views in the Cache Manager working set may be
detrimental to overall operating system performance because it can consume a large
amount of physical RAM.
Resolution
Remove the FILE_FLAG_RANDOM_ACCESS flag when the application opens the file(s) with
CreateFile . This will allows the views to be unmapped and moved to the standby list
after page reads are completed. This will require involvement from the software
developer.
References
CreateFileA function (fileapi.h)
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019,
Windows Server 2022
Original KB number: 250367
More information
You can configure DTC to communicate through firewalls, including network address
translation firewalls.
DTC uses Remote Procedure Call (RPC) dynamic port allocation by default. RPC dynamic
port allocation randomly selects port numbers in the 49152-65535 range. By modifying
the registry, you can control which ports RPC dynamically allocates for incoming
communication. You can then configure your firewall to confine incoming external
communication to only those ports and port 135 (the RPC Endpoint Mapper port). It is
recommended to use either fixed port for DTC services or the default dynamic 49152-
65535 range in firewalls to avoid port exhaustion and only change to custom RPC ports
if firewalls cannot filter on computer or IPs.
You can have one local DTC instance and multiple clustered DTC instances. You may
need to provide more incoming dynamic ports for other subsystems that rely on RPC so
it is recommended to keep default RPC range even if using fixed port for DTC services.
The registry keys and values described in this article don't appear in the registry by
default; you must add them by using Registry Editor.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Window .
1. To start Registry Editor, select Start, select Run, type regedt32, and then select OK.
2. In Registry Editor, select HKEY_LOCAL_MACHINE in the Local Machine window.
3. Expand the tree by double-selecting the folders named in the
HKEY_LOCAL_MACHINE\Software\Microsoft\MSDTC path.
4. Select the MSDTC folder, and then select New > DWORD (32-bit) Value on the
Edit menu.
5. Change the Name to ServerTcpPort.
6. Right-click and choose Modify on the new value.
7. In the Value Editor dialog box, select Decimal and then put your fixed port
number, e g 40001, in the Value data field, and then select OK.
To configure fixed port for clustered DTC instances, you need to find the cluster resource
GUID and add the ServerTcpPort value under this location. Use different port number
for each DTC instance. For example, if your DTC resource GUID is 012345678-9abc-def0-
1234-56789abcdef0, then it would be in this path:
HKEY_LOCAL_MACHINE\Cluster\Resources\012345678-9abc-def0-1234-
56789abcdef0\MSDTCPRIVATE\MSDTC . Repeat the steps for additional DTC clustered
resources.
Alternative, you can use the reg add commands in scripts with administrator privileges
to do this operation. Adjust the following example to your specific cluster GUID if
clustered DTC instance is used:
Console
1. To start Registry Editor, select Start, select Run, type regedt32, and then select OK.
4. Select the RPC folder, and then select Add Key on the Edit menu.
5. In the Add Key dialog box, in the Key Name box, type Internet, and then select OK.
6. Select the Internet folder, and then select Add Value on the Edit menu.
7. In the Add Value dialog box, in the Value Name box, type Ports.
8. In the Data Type box, select REG_MULTI_SZ, and then select OK.
9. In the Multi-String Editor dialog box, in the Data box, specify the port or ports you
want RPC to use for dynamic port allocation, and then select OK.
Each string value you type specifies either a single port or an inclusive range of
ports. For example, to open port 40000, specify 40000 without the quotation
marks. To open ports 40000 to 42000 inclusive, specify 40000-42000 without the
quotation marks. You can specify multiple ports or ports ranges by specifying one
port or port range per line. All ports must be in the range of 1024 to 65535. If any
port is outside this range or if any string is invalid, RPC will treat the entire
configuration as invalid.
Microsoft recommends that you open up ports from 20000 and up, as lower ports
may often be in use by other applications, and that you open a minimum of 1000
ports to avoid port exhaustion. On high load systems you may need more ports.
The default range of 1024-5000 was moved in Windows 2008 and above to 49152-
65535 range to avoid port exhaustion.
10. Follow steps 6 through 9 to add another key for Internet, by using these values:
Value: PortsInternetAvailable
Data Type: REG_SZ
Data: Y
This value signifies that the ports listed under the Ports value are to be made
Internet-available.
11. Follow steps 6 through 9 to add another key for Internet, by using these values:
Value: UseInternetPorts
Data Type: REG_SZ
Data: Y
This value signifies that RPC should dynamically assign ports from the list of
Internet ports.
12. Configure your firewall to allow incoming access to the specified dynamic ports
and to port 135 (the RPC Endpoint Mapper port).
13. Restart the computer. When RPC restarts, it will assign incoming ports dynamically,
based on the registry values that you've specified. For example, to open ports
40000 through 42000 inclusive, create these named values:
DTC also requires you can resolve computer names by way of NetBIOS or DNS. Check
that NetBIOS is enabled in the NIC properties and test if NetBIOS can resolve the names
by using ping and the server name. The client computer must be able to resolve the
name of the server. And the server must be able to resolve the name of the client. If
NetBIOS can't resolve the names, add entries to the LMHOSTS files on the computers.
Feedback
Was this page helpful? Yes No
This article describes the procedures that you follow to enable network Distributed
Transaction Coordinator (DTC) access.
Summary
7 Note
The following procedure is for Windows Server 2003. It does not apply to Microsoft
Windows 2000 Server.
By default, network DTC access is disabled on the Windows Server 2003 products that
are mentioned in the "Applies To" section. When you do not enable network DTC access
on the server, applications can only use transactions that stay on the local computer. For
example, transactions cannot flow from a local computer to a database that runs on a
separate computer if network DTC access is disabled.
When network DTC access is disabled, clients that try to gain access to DTC on the server
may receive the following error message:
More information
1. Click Start, click Run, type comexp.msc, and then click OK to open Component
Services.
Allow Inbound
Allow Outbound
7 Note
For more information about these options, click the following article number
to view the article in the Microsoft Knowledge Base:
899191 New functionality in the Distributed Transaction Coordinator service
in Windows Server 2003 Service Pack 1 and in Windows XP Service Pack 2
6. Click OK. A message box explains that the MS DTC Service will be stopped and
restarted, and that all dependent services will also be stopped and restarted. Click
Yes.
7 Note
If this is a Majority Node Set (MNS) cluster, do not use the MNS resource as
the storage device for MS DTC. MS DTC requires a storage resource such as a
physical disk.
References
For more information about what is new in Microsoft COM+ 1.5, visit the following
Microsoft Developer Network (MSDN) Web site:
What's New in COM+ 1.5
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 294209
Summary
The following blog has detailed information around the changes in MSDTC behavior
since the release of Windows Server 2008.
The purpose of the following Frequently Asked Questions (FAQs) is to address common
questions with MSDTC when used with SQL Server Failover Clustered instances to
include current recommendations and best practices.
The MSDTC is a transaction manager that permits client applications to include several
different data sources in one transaction and which then coordinates committing the
distributed transaction across all the servers that are enlisted in the transaction. This
helps ensure that the transaction is committed, if every part of the transaction succeeds,
or is rolled back, if any part of the transaction process fails.
Many people ask why we need to install MSDTC before installing SQL Server. You no
longer need to do this operation. It was a requirement that SQL Server 2005 had
required. That version of SQL Server has ended its lifecycle and so ended the
requirement to install SQL Server.
When deploying SQL Server in a highly available environment like Windows Failover
Clustering, there are certain best practices that can make the MSDTC services behavior
more predictable.
The issue is the testing is not complete and the two-phase commit activity
required can result in data loss or a database that does not recover as expected in
certain configurations. In fact, the SQL Server testers inject failures at strategic
locations to create the scenarios that are difficult (but not impossible) to create on
a production server. For more information, see Not-Supported: AGs with TC/Cross-
Database Transaction.
With Windows 2008 Failover cluster and later, you don't need to cluster MSDTC to use
the functionality of the MSDTC service because MSDTC was re-designed in Windows
2008. Unlike Windows 2003, if you install Windows Failover Cluster, you had to cluster
MSDTC. This is no longer the case when using Windows 2008, since by default MSDTC
service is running locally, even with Failover Clustering installed.
If your SQL Server Failover Clustered Instance does require MSDTC and does require the
MSDTC resources to fail over with the SQL Server Instance, we recommend creating a
MSDTC resource within the FailoverCluster role that contains the SQL Server instance
and that it use:
PowerShell
$SqlRole = <Actual name of the role containing the SQL Server instance>
$SqlNetName = <Actual SQL Servernetwork resourcename>
$VSqlSrv = <Actual SQL Server virtual server name>
$CluDsk = <Actual disk resource name>
If the MSDTC resource didn't accept the name provided, you can alter the name
using the following PowerShell replacing the New Distributed Transaction
Coordinator with RealSqlVsName:
PowerShell
PowerShell
PowerShell
4. Verify the new MSDTC resource is now listed by using the following command:
PowerShell
PowerShell
rules and MSDTC authentication PowerShell commands on all the other existing
cluster nodes.
6. Test MSDTC.
In this example, we'll use the AdventureWorks2012 database, you have to
substitute an actual database name that you want to test against. From a SQL
Server query window, run the following SQL statement:
SQL
USE AdventureWorks2012;
GO
INSERT SQL_Statement
DELETE SQL_Statement
COMMIT TRANSACTION
GO
You should now see that one row affected and that the inserted record doesn't
exist.
References
Recommended MSDTC settings for using Distributed Transactions in SQL Server
Feedback
Was this page helpful? Yes No
Introduction
By using the DTCPing tool, you can test the name resolution between two computers.
You can also test the remote procedure call (RPC) communication between two
computers. Additionally, you can obtain the following information by using the DTCPing
tool:
Download information
The following file is available for download from the Microsoft Download Center:
For more information about how to download Microsoft support files, click the following
article number to view the article in the Microsoft Knowledge Base:
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection
software that was available on the date that the file was posted. The file is stored on
security-enhanced servers that help prevent any unauthorized changes to the file.
Troubleshooting information
The Dtcping.exe package includes the following text files that describe how to use the
DTCPing tool:
See the Readme.txt file for information about how to test RPC communication and
MS DTC communication between two computers.
Feedback
Was this page helpful? Yes No
Summary
Shutdown Event Tracker is a Microsoft Windows Server 2003 and Microsoft Windows XP
feature that you can use to consistently track the reason for system shutdowns. You can
then use this information to analyze shutdowns and to develop a more comprehensive
understanding of your system environment. Shutdown Event Tracker logs events that
are similar to the following in the system event log:
More information
Windows Server 2003 and Windows XP 64-Bit Edition Version 2003
By default, Shutdown Event Tracker is enabled for all Windows Server 2003
operating systems and for Windows XP 64-Bit Edition Version 2003.
To disable Shutdown Event Tracker on all Windows Server 2003 operating systems
and in Windows XP 64-Bit Edition Version 2003, disable the Display Shutdown
Event Tracker policy by using Group Policy. To do it by using Local Group Policy,
follow these steps:
Windows XP Professional
7 Note
Microsoft recommends that you don't enable the Shutdown Event Tracker in
Windows XP Professional, Windows XP Tablet PC, or Windows XP Media
Center Editions. Microsoft doesn't support the use of this component in these
Windows XP environments.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows .
Windows provides a list of eight generic reasons why your computer was shut down.
You can modify this list to include your own custom reasons. To add your own reasons,
follow these steps:
1. Start Registry Editor.
3. On the Edit menu, select New, and then select Multi-String Value. Which creates
the new key and gives it the temporary name "New Value."
4. Type the name of the registry key in the following format, and then press ENTER:
UI_control_flags; major_reason_number; minor_reason_number
The UI_control_flags section of the value name can contain one or more of the
following values:
P (Indicates that the reason is planned. If this value is omitted, the default is
unplanned.)
C or B (Indicates that a comment is required.)
S (Indicates that the reason should be displayed in the user-initiated
shutdown dialog box.)
D (Indicates that the reason should be displayed in the sudden shutdown
dialog box.)For example, if you want a reason to be displayed in the sudden
shutdown dialog box, the shutdown is unplanned, and the shutdown
corresponds to a major reason 2 and to a minor reason 2, type the following
value name: D;2;2
5. Double-click the new key, and then define the value data in the following format:
Title
Description
Each value is made up of two strings on separate lines; the first string is the title
(it's displayed in the list) and the second string is the description (it's the text that
is displayed following the selected reason).
For example, if you want to create a custom reason for a natural disaster, you can
define the value data as follows: Natural Disaster (unplanned)
Notes
You can specify both S and D for UI_control_flags, but you must specify at least
one of them for the parameters to be valid.
If the UI_control_flags section contains any characters other than the characters
that are listed in the "Custom Options for Identifying a Shutdown Cause" section of
this article, or if the UI_control_flags section exceeds five characters, the message
isn't valid and isn't displayed in the user interface. You can specify that the
characters appear in any order.
The major_reason_number is a number from 0 through 255. If this section is left
blank, if it contains a number that isn't in the valid range, or if it contains a number
that isn't an integer, the message isn't valid and isn't displayed in the user
interface.
The minor_reason_number is a number from 0 through 65,536. If this section is left
blank, if it contains a number that isn't in the valid range, or if it contains a number
that is not an integer, the message isn't valid and isn't displayed in the user
interface.
The custom reasons are sorted in the user interface by two keys in the following
order: MajorReasonNumber, MinorReasonNumber.
The maximum length for the title is 64 characters, and the maximum length for the
description is 96 characters.
If you set the following registry key to any non-zero value, and you've correctly
defined at least one custom reason, the standard Windows reasons aren't
displayed in the Shut Down Windows dialog box:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\Shutd
ownIgnorePredefinedReasons
Feedback
Was this page helpful? Yes No
This article describes a method to rename or move these files for troubleshooting
purposes.
Symptoms
When you launch Windows Event Viewer, one of the following error messages may
occur if one of the *.evt files is corrupt:
When you select OK or cancel on the Dr. Watson error message, you may also receive
the following error message:
Event Viewer
Remote Procedure Call failed
Cause
The Event Viewer Log files (Sysevent.evt, Appevent.evt, Secevent.evt) are always in use by
the system, preventing the files from being deleted or renamed. The EventLog service
can't be stopped because it's required by other services, thus the files are always open.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows
NTFS Partition
1. Select the Start button, point to Settings, select Control Panel, and then double-
click Services.
2. Select the EventLog service and select Startup. Change the Startup Type to
Disabled, and then select OK. If you're unable to sign in the computer but can
access the registry remotely, you can change the Startup value in the following
registry key to 0x4:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog
3. Restart Windows.
7 Note
When the system starts up, several services may fail; a message informing the
user to use Event Viewer to review errors may appear.
4. Rename or move the corrupt *.evt file from the following location:
%SystemRoot%\System32\Config
5. In Control Panel Services tool, re-enable the EventLog service by setting it back to
the default of Automatic startup, or change the registry Startup value back to 0x2.
2. Rename or move the corrupt *.evt file from the following location:
%SystemRoot%\System32\Config
This article describes how to move Windows Server 2016 and Windows Server 2019
Event Viewer log files to another location on the hard disk.
Summary
Windows Server records events in the following logs:
Application log
The application log contains events that are logged by programs. Events that are
written to the application log are determined by the developers of the software
program.
Security log
The security log contains events such as valid and invalid logon attempts. It also
contains events that are related to resource use, for example, when you create,
open, or delete files. You must be logged on as an administrator or as a member of
the Administrators group to turn on, to use, and to specify which events are
recorded in the security log.
System log
The system log contains events that are logged by Windows system components.
These events are predetermined by Windows.
The Directory Service log contains Active Directory-related events. This log is
available only on domain controllers.
The DNS Server log contains events that are related to the resolution of DNS
names to or from Internet protocol (IP) addresses. This log is available only on DNS
servers.
File Replication Service log
The File Replication Service log contains events that are logged during the
replication process between domain controllers. This log is available only on
domain controllers.
By default, Event Viewer log files use the .evt extension and are located in the
%SystemRoot%\System32\winevt\Logs folder.
Log file name and location information is stored in the registry. You can edit this
information to change the default location of the log files. You may want to move log
files to another location if you require more disk space in which to log data.
3. Select the Security tab, and then select Advanced for special permissions or
advanced settings.
7 Note
4. Select Change to change the Owner to SYSTEM, and then select Disable
Inheritance as follows:
You'll be prompted to convert or remove inherited permissions. Select Convert
inherited permissions into explicit permissions on this object, and you'll see the
same permissions explicitly set on the folder.
7 Note
To create subfolders for the logs, check the Replace all child object
permission entries with inheritable permissions entries from this object
option. The permissions set at the parent level are applied to all subfolders
and files.
5. Adjust permissions so that the folder is assigned the correct permissions and check
the Applies to column. These permissions should be the same as the advanced
permissions of the default folder (%SystemRoot%\System32\winevt\Logs) that
stores the Event Viewer logs. Make sure that the Authenticated Users only have
Read permission for This folder and subfolders.
7 Note
To add the EventLog user, go to the Security tab of the properties dialog box
and follow these steps:
a. Select Edit > Add.
b. Select Locations, select the local computer name, and then select OK.
c. Type NT SERVICE\EventLog in Enter the object names to select and select
Check Names. The name should be resolved to EventLog. Select OK to
finish.
Make sure Full Control is selected under Permissions for EventLog for the
EventLog user.
2. Right-click the log name (for example, System) under Windows Logs in the left
pane and select Properties.
3. Change the Log path value to the location of the created folder and leave the log
file name at the end of the path (for example, C:\EventLogs\System.evtx).
4. Select Clear Log, and then select Save and Clear to retain the event log files in a
different location.
7 Note
Check the folder you moved the event logs to. If the event logs are not in the
folder, restart the system.
You can confirm that the log path has been updated by using Registry Editor. For
example, go to the following registry path and check the Value data of the File value.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\System
PowerShell
$originalFolder = "$env:SystemRoot\system32\winevt\Logs"
$targetFolder = "C:\logs"
$logName = "Security"
New-ItemProperty "HKLM:\SYSTEM\CurrentControlSet\Services\EventLog\$logName"
-Name "AutoBackupLogFiles" -Value "1" -PropertyType "DWord"
New-ItemProperty "HKLM:\SYSTEM\CurrentControlSet\Services\EventLog\$logName"
-Name "Flags" -Value "1" -PropertyType "DWord"
Set-ItemProperty -Path
"HKLM:\SYSTEM\CurrentControlSet\Services\EventLog\$logName" -Name "File" -
Value "$targetFolder\$logName.evtx"
References
For more information about how to view and manage logs in the Event Viewer, see How
to delete corrupt Event Viewer Log files . To learn more about general Event Viewer
usage, select the Action menu in Event Viewer, and then select Help.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that repairs or uninstalls for certain products
may fail after you install software updates.
Symptoms
After you install software updates, repairs or uninstalls for certain products may fail. If
you have MSI logging enabled, the following lines are found in the log:
When you look in the registry, you may find that the software update cache registration
is missing from the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\
<SID>\Patches\<SQUID>
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs.
a. Find the software update registration of the product by opening the following
registry subkey:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\User
Data\<SID>\Products\<ProductSQUID>\Patches
Under this subkey, there will be a subkey for every software update that was
applied to the product.
b. For each subkey that is in the following format, perform the following step:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\User
Data\<SID>\Products\<ProductSQUID>\Patches\<PatchSQUID>
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\User
Data\<SID>\Patches\<PatchSQUID>
If the subkey exists, verify that the LocalPackage string value is set correctly, and
that the package referenced by the LocalPackage string value also exists.
i. If the LocalPackage string value or referenced package is missing, the
product is affected. Continue to step 2.
ii. If the referenced package exists and no additional action is required.
2. Re-create software update cache registry details. To do this, follow these steps:
a. Search the %windir%\installer\*.msp for the software update that you tried to
install. Verify that the software update has the correct Patch Globally Unique
Identifier (GUID) in the Summary Information Stream and targets the correct
product GUIDs.
7 Note
Because this directory serves as the cache for per-user installations and
per-machine installations, you can simulate a software update in this
directory by using a per-user installation.
It's a security risk to re-create the software update cache registry. However,
this is the only way to repair the corruption. You can reduce the security
risk by making sure that the software update is the correct software
update. To do this, verify the checksum of the software update.
c. Create a LocalPackage string value in the registry subkey that you created step
2. Make sure that the LocalPackage string value is set to the path of the
software update.
a. Open the following subkey, and then remove <PatchSQUID> from the
"AllPatches" multi-sz value:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\User
Data\<SID>\Products\<ProductSQUID>\Patches
Data\<SID>\Products\<ProductSQUID>\Patches\<PatchSQUID>
7 Note
<ProductSQUID>\Patches
References
This article isn't specific for issues occurred by Windows Update or Microsoft Update.
Feedback
Was this page helpful? Yes No
This article helps fix the error 1603 that occurs when you install a Microsoft Windows
Installer package.
Symptoms
When you try to install a Windows Installer package, you may receive the following error
message:
Cause
You may receive this error message if any one of the following conditions is true:
Resolution
To resolve this problem, use any one of the following methods, depending on the cause
of the problem:
Check if the app is already installed on the PC. If so, uninstall and reinstall the app.
If you previously had a desktop shortcut for an app, the shortcut may have been
lost during the upgrade to Windows 10. In such cases, the app is likely still installed
on the PC, resulting in this error when you attempt to reinstall the app. You can
restore the shortcut by searching for the app, and if it's found, press and hold (or
right-click) the app and select Pin to Start. Or you can resolve the issue by
uninstalling and then reinstalling the app. To search for and uninstall apps in
Windows 10:
Use this method if you receive the error message because you try to install the
Windows Installer package to a folder that is encrypted.
Use this method if you receive the error message because the drive that contains
the folder that you try to install the Windows Installer package to is accessed as a
substitute drive.
Use this method if you receive the error message because the SYSTEM account
does not have Full Control permissions on the folder you are installing the
Windows Installer package to.
To grant Full Control permissions to the SYSTEM account, follow these steps:
1. Open File Explorer (or Windows Explorer), right-click the drive that you want
to install the Windows Installer package to, and then click Properties.
2. Click the Security tab. Verify that the Group or user names box contains the
SYSTEM user account. If the SYSTEM user account doesn't appear in the box,
follow these steps to add the SYSTEM account:
a. Click Edit. If prompted, approve the User Account Control.
b. Click Add. The Select Users or Groups dialog box appears.
c. In the Enter the object names to select field, type SYSTEM, and then click
Check names.
d. Click OK.
3. To change permissions, click Edit. If prompted, approve the User Account
Control.
4. Select the SYSTEM user account, and verify in the Permissions section that
Full Control is set to Allow. If not, select the Allow check box.
5. Close the Permissions dialog and return to the Properties dialog. Click
Advanced.
7. In the Permissions tab, select the SYSTEM entry and click Edit.
8. Click the Applies to dropdown and select This folder, subfolder, and files.
Click OK.
9. Wait for the operating system to apply the permissions that you have
selected to all child folders.
Feedback
Was this page helpful? Yes No
This article describes the user-specific and computer-wide settings in Regional and
Language Options in Control Panel, the implications of configuring Regional and
Language Options during Windows Setup, and the effects on Window Server 2003
Terminal Server.
Introduction
This article describes how the Regional and Language Options settings in Windows
Server 2003 are applied. Some of the settings vary from user profile to user profile.
Other settings are computer wide. This article also discusses the effects of configuring
the Regional and Language Options settings during Windows Setup.
Language settings
The Languages tab contains the following settings:
7 Note
To access these language settings, click Details in Text services and input
languages.
Advanced settings
The Advanced tab contains the following settings:
You can change the user-specific settings for the default user profile by selecting the
Apply all settings to the current user account and to the default user profile check box
on the Advanced tab.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
The first time that a user uses a Remote Desktop Connection to log on to a server that
has Terminal Server enabled, a new profile is created. The new profile inherits the
Regional and Language Options settings from the default user profile. The profile may
be local to the terminal server or may reside on a network share. However, the Default
input language setting is obtained from the client computer that initiated the Remote
Desktop Connection.
To change the default behavior to obtain the Default input language setting from the
default user profile, you must set a registry entry value on the terminal server. To do this,
follow these steps:
1. On the terminal server, click Start > Run, type regedit, and then click OK.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout
3. On the Edit menu, click Add Value, and then add the following registry
information:
When the IgnoreRemoteKeyboardLayout entry is set to 1, new user profiles inherit the
Default input language setting from the default user profile that the user account uses.
7 Note
This registry entry may not work if you're not running Windows Server 2003 Service
Pack 1.
This article provides a solution to an issue that HTTP Listener fails to initialize when user
lacks SeChangeNotifyPrivilege.
Symptoms
When initializing a new HTTP Listener using the HttpInitialize function or the .NET
HttpListener class, the operation fails and you receive this error message:
Cause
This issue occurs when the account running the code lacks the SeChangeNotifyPrivilege
privilege.
Workaround
Grant the Bypass traverse checking user right to the relevant account.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where services that depend on the
ASP.NET State Service don't start after you upgrade to the Microsoft .NET Framework
4.0.
Symptoms
Consider the following scenario:
In this scenario, you notice that after you upgrade .NET Framework, any service that
depends on the ASP.NET State Service does not start and generates the following error:
Windows could not start the <service name> service on <computer name>.
Error 1075: The dependency service does not exist or has been marked for deletion.
You also notice that the ASP.NET State Service is no longer listed in the Services
Management console.
Cause
This is a known issue that occurs when you update .NET Framework.
Workaround
To work around this issue, follow these steps:
1. Open the Services management console (services.msc).
2. Change to Manual the start type of any service that depends on the ASP.NET State
Service and that is set to Automatic.
Console
6. Change to Automatic the start type of the service or services that had their start
type changed in step 2, that depend on the ASP.NET State Service, and that now
have their start type set to Manual. Restart the computer, and then confirm that
the issue is resolved.
Feedback
Was this page helpful? Yes No
This article describes how to configure a logon script or program to run one time when
a user signs in to a computer for the first time.
Summary
) Important
This article contains information about modifying the registry. Before you modify
the registry, make sure to back it up and make sure that you understand how to
restore the registry if a problem occurs. For information about how to back up,
restore, and edit the registry, see Windows registry information for advanced
users .
These steps apply only to new users who have never logged on to the computer. If a
user already has a local user profile or a roaming profile, the script or program doesn't
run.
2 Warning
If you use Registry Editor incorrectly, you may cause serious problems that may
require you to reinstall your operating system. Microsoft cannot guarantee that you
can solve problems that result from using Registry Editor incorrectly. Use Registry
Editor at your own risk.
When a Windows Server 2003-based product is installed, the Default User profile is
created. The first time that a user logs on, the Default User profile is copied to the user's
profile.
To configure a script or program to run when a new user logs on, follow these steps:
5. In the Load Hive dialog box, locate the Profilepath \Default User\Ntuser.dat file,
where Profilepath is the file system location of the Default User profile. Select
Open.
6. In the Load Hive dialog box type a name for the hive, and then select OK.
7 Note
The Ntuser.dat file is hidden. If you can't locate or load the Ntuser.dat file, you
must change your view settings in Windows Explorer. To do it, follow these
steps:
7 Note
Where Test is the name that you gave to the Ntuser.dat hive in step 6.
8. On the Edit menu, point to New, and then select String Value.
13. Select Yes when prompted to confirm you want to unload the hive.
14. Quit Registry Editor. This program or logon script runs for a user who doesn't have
a user profile. To view the user profiles on the local computer, follow these steps:
a. Select Start, point to Control Panel, and then select System.
b. Select the Advanced tab.
c. In the User Profiles area, select Settings.
The user profiles are listed in the User Profiles dialog box.
Feedback
Was this page helpful? Yes No
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve Backup and Storage-related issues. The topics are divided
into subcategories. Browse the content or use the search feature to find relevant
content.
Feedback
Was this page helpful? Yes No
This article describes the useful shelf life of a system-state backup of Active Directory
(AD).
Summary
Windows Backup, the backup tool that is included with Windows Server 2003 and with
Windows 2000, can back up and restore Active Directory on Windows Server 2003 or
Windows 2000 domain controllers. These backups can be performed while the domain
controller is online. You can restore these backups only when the domain controller is
booted into Directory Services Restore mode by using the F8 key when the server is
starting.
Windows Server 2003 and Windows 2000 don't allow the restoring of old backup
images into a replicated enterprise. Specifically, the useful life of a backup is the same as
the "tombstone lifetime" setting for the enterprise. The default value for the tombstone
lifetime entry is 60 days. This value can be set on the Directory Service (NTDS) config
object.
More information
If your only backup of Active Directory is older than the tombstone lifetime setting,
reinstall the server after confirming there is at least one surviving domain controller in
the domain from which new replicas can be synchronized. You can lose all but one
server in the domain and still recover without a loss of data, assuming that the
remaining survivor holds current information.
If every server in the domain is destroyed when you use the server in a single domain
controller forest or in a single domain that contains multiple domain controllers, restore
one server from an arbitrarily outdated backup. Then, replicate all other servers from the
restored one. However, you cannot restore the server when you use the server in a
multi-domain forest. In this scenario, information that was written to Active Directory
after the outdated backup was performed is not available.
The tombstone lifetime attribute is located on the enterprise-wide DS config object. The
path for this attribute is:CN=Directory Service,CN=Windows
NT,CN=Services,CN=Configuration,DC=COMPANY,DC=COM
Use the Active Directory editing tool of your choice so that the "tombstoneLifetime"
attribute is set to be older than the backup used to restore Active Directory. Supported
tools include Adsiedit.msc, Ldp.exe, and Active Directory Service Interfaces (ADSI)
scripts.
7 Note
This information assumes that the backup is not older than the default
"tombstoneLifetime" setting. Otherwise, the objects have already been deleted
from the database. In this case, an authoritative restore may be the better
alternative if there are multiple domain controllers.
The original release version of Windows Server 2003 SP1 does not modify the value of
the tombstone lifetime attribute when the following conditions are true:
You upgrade a Windows 2000 domain to a Windows Server 2003 domain by using
Windows Server 2003 SP1 slipstreamed media.
You install Windows Server 2003 SP1 on domain controllers that are running the
original release version of Windows Server 2003.
Increasing the tombstone lifetime attribute for a domain to 180 days increases the
following items:
The useful life of backups that are used for data recovery scenarios.
The useful life of system state backups that are used for promotions using the
Install from Media feature.
The time that domain controllers can be offline. (Computers that are built in a
staging site and shipped to destination sites frequently approach tombstone
lifetime expiration.)
The time that a domain controller may be offline and still return to the domain
successfully.
The time that a domain controller may experience a replication failure and still
return to the domain successfully.
The number of days that the originating domain controller retains knowledge of
deleted objects.
This article provides solution to an error (Access is denied) that occurs when you run a
batch job on a Microsoft Windows Server 2003-based computer.
Symptoms
When you run a batch job that runs under the context of a regular user account, the
script may not run. If you run the batch job by using the Scheduled Tasks feature, the
following error message may be logged in the Scheduled Tasks log file (Schedlgu.txt):
If you use a debugger program to try to determine why the batch job does not work,
the following error message may appear in the debug output:
Cause
This issue occurs if all the following conditions are true:
You run the batch job on a Windows Server 2003-based member server.
The batch job runs as a non-interactive process.
The batch job is configured to run under the context of an account that is not a
member of the Administrators group.
In Windows Server 2003, the Users group does not have Read and Execute permissions
to the command processor (Cmd.exe). By default, the Cmd.exe program has the
following permissions settings:
The Interactive implicit group and the Service implicit group have Read and
Execute permissions.
7 Note
On a member server, the TelnetClients group also has Read and Execute
permissions. On a domain controller, the Batch implicit group also has Read
and Execute permissions.
The Administrators group and the System implicit group have Full Control
permissions.
2. Locate and then right-click the Cmd.exe file. The Cmd.exe file is located in the
%windir%\System32 folder.
3. Click Properties.
5. Click Add.
6. In the Enter the object names to select box, type the user name that the batch job
runs under, and then click OK two times.
7 Note
When you add the user, the user is automatically granted Read and Execute
permissions.
More information
The behavior that is described in this article is different from the default behavior of
Microsoft Windows 2000 Server. By default, Windows 2000 Server grants Read
permissions and Execute permissions to the Users group.
For more information about implicit groups, visit the following Microsoft Web sites:
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that backup program is unsuccessful when
you back up a large system volume.
Symptoms
When you try to create a backup by using NTBackup.exe or by using a third-party
backup program that uses the NT Backup API, the backup may not be completed
successfully. This behavior may occur even if you run the program locally on the server.
Additionally, you may experience one or more of the following symptoms:
One or more of the following error messages appear in the application log:
Error message 1
Error message 2
ERROR 1130: Not enough server storage is available to process this command.
Event ID 2020 and Event ID 2021 messages may be generated by the Server
service.
7 Note
If you are running the Hewlett-Packard (HP) OmniBack backup program, you may
receive an error message that is similar to the following ones:
[81:78] C:\foldername\file.name
If you view the Performance tab in Windows Task Manager, you notice that
nonpaged kernel memory is low.
7 Note
You may receive these error messages for reasons that are not related to the
problem that this article describes. If you receive these error messages only when
you back up large system volumes, the two most probable causes are those that
this article describes.
To help determine if you are experiencing this problem, start Windows Task Manager,
and then click the Performance tab. At the lower right, locate the Kernel Memory (K)
area, and then note the value for Paged. You may experience this problem in Microsoft
Windows 2000 or in Microsoft Windows NT 4.0 when this value reaches approximately
160 megabytes (MB). Alternatively, you may experience this problem in Microsoft
Windows Server 2003 when this value exceeds 160 MB. If you have set the registry key
for paged pool memory to a higher value, you will not experience this problem until a
much higher value of paged pool memory is used (the problem may occur when the
paged pool memory usage reaches about 80 percent of the set value). If you have the
gflags setting turned on for pool tags and if you use the Poolmon utility, you see a
higher usage of the MmSt tag. It is the pool tag that is used to map the operating
system memory that is used to track shared files.
Cause
The two causes of this problem are related. The more frequent cause is listed first:
More files are open than the memory cache manager can handle. As a result, the
cache manager has exhausted the available paged pool memory.
The backup program has tried to back up a file whose size is larger than the
backup API can access on that version of the operating system. It has the same
result (that is, the paged pool is exhausted).
7 Note
The resolution for each problem differs depending on whether you experience the
problem in Windows Server 2003, in Microsoft Windows 2000, or in Windows NT 4.0.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
You may have to change two registry settings. Always change the first setting.
Depending on the configuration of your system, you may also have to change the
second setting.
Registry setting 1
1. Click Start, click Run, type regedit in the Open box, and then click OK.
3. On the Edit menu, point to New, and then click DWORD Value.
6. Click Decimal.
7. In the Value data box, type 60, and then click OK.
) Important
Use 60 as your initial value. If your backup does not succeed, use 40 as
your value. If that does not work, you must change the behavior of your
backup program to reduce the demand of paged pool. If the value
works, you may want to increase the value by approximately 25 percent
until the backup does not work. If the backup is unsuccessful, use the
second registry setting that is described in this article.
Make sure that the value for this registry setting is not more than 60.
If you are using the /3GB switch, use 40 as your initial setting. Note that
this value is a percentage value.
Because you must test these settings during the most stressful backups, you may have
to wait a month for a whole backup cycle to complete if you are not sure which backup
consumes the most resources. Because of this situation, Microsoft recommends that you
test low values first. For more information, click the following article number to view the
article in the Microsoft Knowledge Base:
312362 Server is unable to allocate memory from the system paged pool
Registry setting 2
1. Click Start, click Run, type regedit in the Open box, and then click OK
3. On the Edit menu, point to New, and then click DWORD Value.
6. Click Hexadecimal.
7. In the Value data box, type a value of FFFFFFFF, and then click OK.
) Important
The default and maximum paged pool values for Windows Server 2003
are much larger than in Windows 2000. Typically, the Windows Server
2003 values are at least 50 percent higher than the values found in
Windows 2000. These larger values makes it more unlikely that you will
experience the issue where paged pool values contribute to the problem
that is described in this article. However, it is still possible that this issue
may occur.
This value restricts the system PTEs that are available. PTEs are another
unrelated system resource that your system uses. This setting may cause
your operating system to stop unexpectedly and to display a stop 0x3F
error on a blue screen when it starts. You can recover from this by using
the Last Known Good restart option on the system restart menu or
recovery console. Use Performance Monitor to view the Free System
Page Table Entries counter. You can add the PagePoolSize setting if the
observed free values are over 40,000.
If you are running /3GB and /PAE together, do not set this setting
without extensive testing and before you establish exactly how many
system PTES you must have in your environment. You will probably see
values in the range of 10,000-20,000 free. Use the articles to configure
paged pool memory but never drop below 10,000 free system PTEs. Do
not set this to any other value if you are using the /3GB switch. The only
supported values are 0, 0A000000, and FFFFFFFF.
Windows NT 4.0
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
7 Note
Manager\Memory_Management
3. On the Edit menu, click Add Value, and then add the following registry value:
Value name: UnusedFileCache
Data type: REG_DWORD
Radix: Decimal
Value data: 15
7 Note
This number represents the percent of pool that can be consumed by unused
segments. A value of 0 indicates that the system will use the default behavior
that is similar to Windows NT 4.0 Service Pack 3. A value of 5 through 40
indicates that the system will trim the unused file cache based on pool usage.
5 is most aggressive (that is, it increases the size of the cache the least) and 40
is least aggressive (that is, it lets the cache grow the largest before it trims the
cache.)
) Important
Use 15 as your initial value. If your backup does not succeed, use 5 as
your value. If this does not work, you must either change the behavior of
your backup program to reduce the demand of paged pool, or you must
upgrade to Windows 2000, where more than double the paged pool is
available (for more information, see the "Windows 2000" section). If this
value works, you may want to increase it by approximately 20 percent
until the backup is unsuccessful. If the backup is unsuccessful, use the
second registry setting that is described in this article.
If you are using the /3GB switch, use 5 as your initial setting.
Because you must test these settings during the most stressful backups, you may have
to wait a month for a whole backup cycle to complete if you are not sure which backup
consumes the most resources. Because of it, Microsoft recommends that you test low
values first.
One possible resolution is to restrict the backup so that it backs up one file at a time. It
may or may not work depending on the sizes of the files to be backed up. (It is expected
to work on files that are smaller than 180 gigabytes [GB].) You can also try this resolution
if you are backing up several large files, but each file is smaller than 180 GB. Follow the
steps to resolve the first problem also. For files larger than 180 GB, no workaround
exists. Therefore, you must upgrade the system to Windows 2000. If you try to back up
the system remotely as a workaround, you will experience the same problem.
3. On the Edit menu, click Add Value, and then add the following registry value:
Value name: DisablePagedPoolHint
Data type: REG_DWORD
Radix: Decimal
Value data: 1
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
More information
NTBackupread and NTBackupwrite both use buffered I/O. It means that Windows NT
caches the I/O that is performed against the stream. It is also the only API that will back
up the metadata of a file. This cache is pulled from limited resources: namely, pool and
nonpaged pool. Because of this, large numbers of files or files that are large may cause
the pool resources to run low.
Several factors may exhaust the supply of paged pool memory. You can turn on pool
tagging and take poolsnaps at different time intervals to help you to understand which
driver is exhausting paged pool memory. If the poolsnaps indicate that the MmSt tag
(Mm section object prototype PTEs) is the largest consumer and is over 80 MB, a large
number of files are probably open on the server.
The possible maximum paged pool memory on a computer is 343 MB of paged pool in
Windows 2000 with the paged pool key set to FFFFFFFF, or 164 MB if the key is not
present. The possible maximum paged pool memory is 192 MB in Windows NT. By
default, the Memory Manager tries to trim allocated paged pool memory when the
system reaches 80 percent of the total paged pool. For example, 80 percent of 343 MB is
274 MB. If the Memory Manager cannot trim fast enough to keep up with the demand,
the event that is listed in the "Symptoms" section of this article may occur. If you tune
the Memory Manager to start the trimming process earlier (for example, when it reaches
40 percent), the computer can keep up with the paged pool demand during sudden
peak usage so that it does not run out of paged pool memory.
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise,
regarding the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article helps fix an error (The filename, directory name, or volume label syntax is
incorrect) that occurs when you add an additional disk to a scheduled backup.
Symptoms
When you try to add an additional disk to a scheduled backup by using the Windows
Server Backup Schedule Wizard, you may receive the following error message:
Cause
This problem may occur if a previously added destination disk is not currently attached
to the server. When the wizard completes, the currently listed destination disks are
verified. If any of these disks are missing, you receive the error message that is described
in the "Symptoms" section.
Resolution
To resolve this issue, use one of the following options.
7 Note
7 Note
If you are using offsite storage, or if another situation prevents all destination disks
from being attached at the same time, go to option 3.
Option 2
If the missing disk is no longer available, remove it as a destination disk from the backup
wizard.
7 Note
If the missing disk is the only destination disk that is defined in the backup schedule,
you will receive the following error message when you try to remove it. If this occurs,
click Stop backup, and then create a new backup schedule.
"Error: You cannot remove this backup storage destination unless you add another
storage destination or stop the scheduled backup. A schedule backup requires at
least one backup storage destination.
3. Leave the Backup Configuration setting unchanged, and then click Next.
4. Leave the Backup Time setting unchanged, and then click Next.
5. Leave the Destination Type setting unchanged, and then click Next.
7 Note
Option 3
Add a new disk to the backup schedule by running the wbadmin command from an
elevated command prompt.
1. Run the following command from an elevated command prompt to determine the
Disk Identifier of the new disk:
wbadmin get disks
2. Based on the output, locate the disk that will be added to the scheduled backup.
Make a note of the Disk Identifier. The output will resemble the following:
3. Run the following command to add the new disk to the Scheduled backup. Use t
he Disk Identifier from the previous step as the AddTarget parameter.
WBADMIN ENABLE BACKUP -addtarget:{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}
"Do you want to enable scheduled backups with the above settings?"
More information
For more information, visit the following Microsoft Web sites:
Feedback
Was this page helpful? Yes No
This article provides a solution to the error 0x274d that occurs when DirectAccess clients
connect to DirectAccess Server by using Internet Protocol over Secure Hypertext
Transfer Protocol (IP-HTTPS).
Symptoms
DirectAccess clients may not be able to connect to DirectAccess Server by using IP-
HTTPS connections or resolve the DirectAccess public hostname.
When you run the netsh interface http show interface command, the output is as
follows:
or
No connection could be made because the target machine actively refused it.
Removing the DirectAccess GPO allows the client to resolve the DirectAccess public
hostname.
Running the command netsh namespace show policy on a client will display a policy for
the .contoso.com namespace.
In this policy the DirectAccess (DNS Servers) entry will be set to the internal IPv6
interface of the DirectAccess server, typically ending with 3333::1.
Cause
Error: 0x2AFC
Role: Client
URL: https://da.contoso.com/IPHTTPS
Last Error Code: 0x2AFC
Interface Status: Failed to connect to IPHTTPs server; Waiting to reconnect.
0x2AFC translates to:
WSANO_DATA
# The requested name is valid, but no data of the requested type was found.
WSANO_DATA
# Successfully returned a NULL value.
Error: 0x274D
Role: Client
URL: https://da.contoso.com/IPHTTPS
Last Error Code: 0x274D
Interface Status: Failed to connect to IPHTTPs server; Waiting to reconnect.
0x274D translates to:
WSAECONNREFUSED
# No connection could be made because the target machine actively refused it.
In the Infrastructure Server Setup window, select DNS on the left-hand side to view the
NRPT settings of the DirectAccess deployment. The last row will show an asterisk (*) on
the left-hand side, right-click this row and select new. In the DNS Server Addresses
window, enter the public hostname of the DirectAccess server as the DNS suffix (for
example, DA.contoso.com), don't attempt to detect or validate the suffix. Instead leave
the rest of the information blank and click apply.
This will create an entry with a Name Suffix and no DNS Server Address, telling the
clients to use their own internet DNS to resolve that name. Finish the Infrastructure
setup process and update the GPO by clicking Finish in the Remote Access Setup
window. Apply the new GPO to the clients and attempt to resolve the hostname of the
DirectAccess server.
More information
DirectAccess clients use multiple methods to connect to the DirectAccess server, which
enables access to internal resources. Clients have the option to use either Teredo, 6to4,
or IP-HTTPS to connect to DirectAccess. This also depends on how the DirectAccess
server is configured.
When the DirectAccess client has a public IPv4 address, it will try to connect by using
the 6to4 interface. However, some ISPs give the illusion of a public IP Address. What
they provide to end users is a pseudo public IP address. What this means is that the IP
address received by the DirectAccess client (a data card or SIM connection) might be an
IP from the public address space, but in reality is behind one or more NATs.
When the client is behind a NAT device, it will try to use Teredo. Many businesses such
as hotels, airports, and coffee shops do not allow Teredo traffic to traverse their firewall.
In such scenarios, the client will fail over to IP-HTTPS. IP-HTTPS is built over an SSL (TLS)
TCP 443-based connection. SSL outbound traffic will most likely be allowed on all
networks.
Having this in mind, IP-HTTPS was built to provide a backup connection that is reliable
and always reachable. A DirectAccess client will make use of this when other methods
(such as Teredo or 6to4) fail.
Feedback
Was this page helpful? Yes No
This article describes an issue that triggers an error message when you try to create a
Volume Shadow Services (VSS) diskshadow snapshot.
Symptoms
When you open an administrator command prompt and create a VSS diskshadow
snapshot in Windows Server 2012 R2, the output may contain an error:
Commands:
Console
Output:
Cause
This error occurs when the backup operation reaches a point, where it tries to process
the boot configuration data (BCD) store data. BCD store is in the system partition. But
because this partition isn't in the list of mounted devices, the error is triggered.
Resolution
This particular COM call failure message is harmless. Despite the message, the
shadowcopy backup is completed successfully. So, no resolution is required.
More information
Microsoft is aware of this issue and will continue to investigate for future updates.
Feedback
Was this page helpful? Yes No
This article describes how to enable the Volume Shadow Copy service's debug tracing
features in Windows Server 2003 and Windows Server 2008.
) Important
This article contains information about how to modify the registry. Make sure to
back up the registry before you modify it. Make sure that you know how to restore
the registry if a problem occurs. For more information about how to back up,
restore, and modify the registry, see Windows registry information for advanced
users .
7 Note
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall your operating system. Microsoft cannot guarantee that these problems
can be solved. Modify the registry at your own risk.
To enable the Volume Shadow Copy service's debug tracing features in Windows Server
2003 and Windows Server 2008, follow these steps:
1. Click Start, click Run, type regedit, and then click OK.
2. In Registry Editor, locate the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS
3. In the left pane, right-click VSS, point to New, and then click Key.
5. In the left pane, right-click Debug, point to New, and then click Key.
7. In the left pane, right-click Tracing, point to New, and then click DWORD Value.
9. Double-click TraceLevel, and then type ffffffff in the Value data box. That is, type f
eight times in the Value data box. Click OK.
7 Note
The TraceLevel registry entry determines the type of debug tracing that will
occur. A value of 0 (the default) indicates that no tracing will occur. A value of
ffffffff turns on tracing for all events.
10. In the left pane, right-click Tracing, point to New, and then click DWORD Value.
12. Double-click TraceEnterExit, type 1 in the Value data box, and then click OK.
7 Note
The TraceEnterExit registry entry determines whether the entry and exit
information of the function is output to the trace file and to the debug output
stream. A value of 0 (the default) indicates that no entry and exit information
of the function is output. A value of 1 indicates that the entry and exit
information of the function is output.
13. In the left pane, right-click Tracing, point to New, and then click DWORD Value.
15. Double-click TraceToFile, type 1 in the Value data box, and then click OK.
7 Note
The TraceFile registry entry cannot be stored on the disk where the shadow
copy is created.
16. In the left pane, right-click Tracing, point to New, and then click DWORD Value.
18. Double-click TraceToDebugger, type 1 in the Value data box, and then click OK.
7 Note
19. In the left pane, right-click Tracing, point to New, and then click DWORD Value.
21. Double-click TraceTimeStamp, type 1 in the Value data box, and then click OK.
7 Note
22. In the left pane, right-click Tracing, point to New, and then click DWORD Value.
24. Double-click TraceFileLineInfo, type 1 in the Value data box, and then click OK.
7 Note
The FileLineInfo registry entry determines whether the module file name
information and the line number information are output to the trace file and
to the debug output stream. A value of 0 (the default) indicates that no
module file name information and no line number information are output. A
value of 1 indicates that the module file name information and the line
number information are output.
25. In the left pane, right-click Tracing, point to New, and then click DWORD Value.
27. Double-click TraceForceFlush, type 1 in the Value data box, and then click OK.
7 Note
For more information about the Volume Shadow Copy service, visit the following
Microsoft Web site:
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you try to do a system state
backup to a volume on which the system state file stays.
Applies to: Windows Server 2008 R2 Service Pack 1, Windows Server 2012 R2
Original KB number: 944530
Symptoms
When you try to do a system state backup to a volume on which the system state file
stays, you receive an error, as mentioned below:
ERROR - The backup storage location is invalid. You cannot use a volume that is
included in the backup as a storage location.
) Important
This article contains information about how to modify the registry. Make sure that
you back up the registry before you modify it. Make sure that you know how to
restore the registry if a problem occurs. For more information about how to back
up, restore, and modify the registry, see How to back up and restore the registry
in Windows .
Cause
This behavior occurs because system state backups to critical volumes are blocked in
Windows Server 2008 and Windows Server 2008 R2.
Resolution
You can change the default behavior of Windows Server 2008 and Windows Server 2008
R2 by adding a registry entry. You must also verify that the following prerequisites are
met before you do a system state backup to a critical volume.
Notes
1. Any writes on target volume with shadow copies will increase the diff area size. If
the diff area is bounded, it may cause deletion of shadow copies.
2. Incremental backups leave shadow copies behind, it will cause side effect as point
1.
3. Backup stores different versions as shadow copies, it will cause side effect as point
1.
2 Warning
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall the operating system. Microsoft can't guarantee that these problems can
be solved. Modify the registry at your own risk.
To enable the system state backup files to be targeted to critical volumes, you must set
the value of the AllowSSBToAnyVolume registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wbengine\SystemStateBackup\
Name:AllowSSBToAnyVolume
Data type:DWORD
Value data:1
7 Note
When this value is set to 1, system state backups to any volume are enabled. To
revert to the default behavior, set the value to 0.
More information
The restriction to target the system state backup to any volume is a new feature in
Windows Server 2008 and Windows Server 2008 R2.
If all the previous prerequisites aren't met, you may see shadow-copy loss when you do
a backup. In worst condition, backup itself may fail because of the snapshot from which
backup was taken is becoming lost while writing the backup.
7 Note
References
Backup and Recovery Overview for Windows Server 2008
Backup and Recovery Overview for Windows Server 2008 R2
Feedback
Was this page helpful? Yes No
This article provides helps to solve error 3266 or 3013 that occurs when you perform a
database backup to disk or tape or a database restore from disk or tape.
Symptoms
When you perform a database backup to disk or tape, or a restore from disk or tape, the
following error message may occur:
Cause
A filemark in the backup device could not be read. There are many reasons why you may
encounter a filemark error. Some of the reasons include the following:
A media failure may occur on the device where the backup is located.
For example, a loss of connectivity may occur during a network backup. Or, a
failure of the IO path to flush the write to disk may occur after the write to disk was
reported to SQL server as successful.
Workaround
To allow SQL Server to perform new backups to the backup device, you must manually
delete or erase the device by using the following command:
SQL
If the error message occurs during a restore operation, it may be possible to retrieve
other backup sets from the device by specifying the file number. For example, if three
(3) backups were on one (1) backup device, backup sets 1 and 2 may be usable. To
determine if multiple backup sets are on a device, run the following code from Query
Analyzer:
SQL
Each backup set has one entry in the output. To indicate a specific backup set, use this
code:
SQL
RESTORE DATABASE mydatabase FROM DISK='C:\MyDatabase.bak' WITH FILE =
FileNumber
7 Note
More information
The following list contains important notes regarding backups and SQL Server.
After SQL Server detects a filemark error on a device, SQL Server does not write
additional information to the device.
SQL Server stores all backups in the Microsoft Tape Format, whether the backup is
made to disk or to tape. The Microsoft Tape Format uses filemarks to hold
information such as the block size and the number of blocks in a backup, in
addition to other information about the backup. The Microsoft Tape Format also
uses filemarks to delimit backups in a backup device. The fact that a filemark is
missing or is damaged, suggests that at least one backup on the device is not
valid.
Although you may be able to restore some backup sets from the damaged device,
you must verify the integrity of the restored database.
If you experience an error 3266 when you restore a transaction log or a database
backup, investigate the following logs for more information:
SQL Server error log
Backup and restore history tables
Application event log
System event log
If there are no details of the failure in these logs, you may have experienced an
unreported failure. You should contact Microsoft Product Support Services if you need
help.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you perform a backup in
Windows.
Symptoms
When you perform a backup in Windows Server 2012 and earlier (back to Windows
Server 2008), one of the following errors is logged in the Application log:
Context: Execution
Context: Requestor
Writer Instance ID: {14BE9B90-62D7-4A2D-B57F-53D21EAB0789}
Cause
When a Volume Shadow Copy Service (VSS)-based backup is performed, each of the
subscribed VSS writers is queried for a list of components. The problem that's described
in the Symptoms section occurs when that list generates a metadata file that's larger
than the size limitation.
Common causes:
Too many files in the TemporaryInternetFiles directory-specifically, in
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\TemporaryInternetFiles. This
causes the System Writer to hit the size limit of the VSS metadata file.
VSS Writer has added too many components to its metadata file.
Resolution
If there are too many files in TemporaryInternetFiles, back up and then delete the files
from the C:\Windows\Microsoft.NET\Framework64\v2.0.50727\TemporaryInternetFiles
location. Then, the system writer should be able to complete without errors.
If you can't identify the writer that's causing the failure, collect a sample of the writer
metadata document, and then review the components for each writer.
Console
diskshadow /l
C:\Metadata.txt
list writers detailed
Exit
2. After the file that's generated is collected, review and count each writer's
components.
3. After the application writer is identified, reduce the number of components until
the limitation is no longer exceeded.
Each component is represented by the lines between the "+ Component" name and the
"- Component Dependencies:" reference. And each is counted as one component.
Hyper-V example
SQL example:
This step-by-step article describes how to use the Backup feature to back up and restore
data on your Windows Server 2003-based computer.
Summary
This article is intended for users who back up and restore data, and it includes
information about how to back up and restore the system configuration and local
registry.
To perform the procedures in this article, you must be logged on as a member of the
Administrators group or the Backup Operators group.
5. Expand the drive or folder that contains the items that you want to back up. Click
to select the check boxes next to the files, folders, or drives that you want to back
up.
6. In the Backup destination box, specify the destination for the new job. To do so,
do one of the following:
7 Note
If a tape device is not connected to your computer, File is the only backup
media type that is available in the Backup destination box.
If you're backing up to a file, specify a path and file name for the backup
(.bkf) file. Or, click Browse, specify a file name and location where you want to
save the file, and then click Save.
If you're backing up to tape, click the tape that you want to use.
8. On the Tools menu, click Options. Specify any additional backup options that you
want on the appropriate tabs of the Options page. Click OK.
10. If you want to set advanced backup options, such as data verification or hardware
compressions, click Advanced. Specify the options that you want, and then click
OK.
11. Review the settings on the Backup Job Information page. Specify whether you
want this backup to replace the information that is already present on the
destination media, or add this backup to the existing information.
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click Backup. The Backup or Restore Wizard starts.
6. Click to select the check boxes next to any other files, folders, or drives that you
want to back up.
7. In the Backup destination box, specify the destination for the new job. To do so,
do one of the following:
7 Note
If a tape device is not connected to your computer, File is the only backup
media type that is available in the Backup destination box.
If you are backing up to a file, specify a path and file name for the backup
(.bkf) file. Or, click Browse, specify a file name and location where you want to
save the file, and then click Save.
If you are backing up to tape, click the tape that you want to use.
9. On the Tools menu, click Options. Specify any additional backup options that you
want on the appropriate tabs of the Options page. Click OK.
11. If you want to set advanced backup options, such as data verification or hardware
compressions, click Advanced. Specify the options that you want, and then click
OK.
12. Review the settings on the Backup Job Information page. Specify whether you
want this backup to replace the information that is already present on the
destination media, or add this backup to the existing information.
7 Note
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click Backup. The Backup or Restore Wizard starts.
5. Expand the drive or folder that contains the items that you want to back up. Click
to select the check boxes next to the files, folders, or drives that you want to back
up.
6. In the Backup destination box, specify the destination for the new job. To do so,
do one of the following:
7 Note
If a tape device is not connected to your computer, File is the only backup
media type that is available in the Backup destination box.
If you're backing up to a file, specify a path and file name for the backup
(.bkf) file. Or, click Browse, specify a file name and location where you want to
save the file, and then click Save.
If you're backing up to tape, click the tape that you want to use.
8. On the Tools menu, click Options. Specify any additional backup options that you
want on the appropriate tabs of the Options page. Click OK.
If a message prompts you to save your current backup selections, click OK. On the
Save As page that appears, specify a name and location where you want to save
the backup, and then click Save.
11. In the Job name box, type a name for the scheduled backup job, and then click
Properties.
12. Click the Schedule tab. In the Schedule Task box, click how frequently you want the
backup job to run, and then in the Start time box, specify a time when you want
the backup to run, and then click OK.
13. On the Set Account Information page that appears, type a user name and
password of the user whom you want to run the scheduled backup for, and then
click OK.
The backup job that you scheduled appears on the calendar on the Schedule Jobs
tab. The scheduled backup job automatically starts at the time and data that you
specified.
3. On the Welcome tab, click Backup Wizard (Advanced). The Backup Wizard starts.
Click Next.
4. Specify what you want to back up, and then click Next.
5. If you selected Back up selected files, drives, or network data in step 4, expand
the drive or folder that contains the items that you want to back up, click to select
the check boxes next to the drive, folder, or file that you want to back up, and then
click Next.
6. Specify the backup type, destination, and name in the appropriate boxes, and then
click Next.
7 Note
If a tape drive isn't connected to your computer, File is the only backup media
type that is available in the Select the backup type box.
7. Review the settings that appear on the Completing the Backup Wizard page. If
you want to specify advanced backup options, click Advanced, specify the options
that you want, and then click OK.
8. Click Finish.
4. Click the media that you want to restore, and then click to select the check boxes
next to the drives, folders, or files that you want to restore.
5. In the Restore file to box, specify the location where you want to restore the files
by doing one of the following:
If you want to restore the files or folders to the same location in which they
were when you backed up the data, click Original location, and then go to
step 7.
If you want to restore the files or folders to a new location, click Alternate
location.
If you want to restore the files and folders to a single location, click Single
folder.
6. If you selected Alternate location or Single folder, type the location in which you
want the data to be restored, or click Browse and select the location, and then click
OK.
7. On the Tools menu, click Options. Click the Restore tab, specify the restore option
that you want, and then click OK.
9. On the Confirm Restore page that appears, click Advanced if you want to set
advanced restore options, and then click OK.
4. In the Items to restore box, expand the media that you want to restore, and then
click to select the System State check box.
5. Click to select the check boxes next to any other drives, folders, or files that you
want to restore.
6. In the Restore file to box, specify the location where you want to restore the files
by doing one of the following:
If you want to restore the files or folders to the same location in which they
were when you backed up the data, click Original location, and then go to
step 8.
If you want to restore the files or folders to a new location, click Alternate
location. This option preserves the folder structure of the backed-up data.
If you want to restore the files and folders to a single location, click Single
folder.
7 Note
If you do not designate an alternate location for the restored data, the restore
operation erases the current system state data and replaces it with the
information that you are restoring.
7. If you selected Alternate location or Single folder, type the location in which you
want the data to be restored, or click Browse and select the location.
9. On the Confirm Restore page that appears, click Advanced if you want to set
advanced restore options, and then click OK.
Troubleshooting
Feedback
Was this page helpful? Yes No
This article helps fix an issue where no VSS writers are listed when you run the vssadmin
list writers command and events are logged.
Symptoms
When you run the vssadmin list writers command in Windows Server, no VSS writers
are listed. Additionally, the following events are logged in the Application log:
If you open the Windows Server Backup snap-in, you receive the following error
message:
A fatal error occurred during a Windows Server Backup snap-in (Wbadmin.msc)
operation.
Error details:
Unknown error (0x80042302).
Close Wbadmin.msc and then restart it
Cause
This problem occurs because the registry path of the Eventcls.dll file is incorrect.
Resolution
To resolve this problem, follow these steps:
1. Click Start, type regedit in the Search programs and files box, and then press
ENTER.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem\\{26c409cc-ae86-11d1-b616-
00805fc79216}\EventClasses\\{FAF53CC4-BD73-4E36-83F1-2B23F46E513E}-{00000000-
0000-0000-0000-000000000000}-{00000000-0000-0000-0000-000000000000}
6. Click Start, type services.msc in the Search programs and files box, and then press
ENTER.
7. Right-click the following services, one at a time. Click Restart for each service.
9. Open an elevated command prompt, type vssadmin list writers, and then press
ENTER.
This article discusses the return codes that are used by the Robocopy utility in Windows
Server 2008 or Windows Server 2008 R2.
Applies to: Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1,
Windows Server 2012 R2
Original KB number: 954404
Introduction
The following table lists and describes the return codes that are used by the Robocopy
utility.
ノ Expand table
Value Description
0 No files were copied. No failure was met. No files were mismatched. The files already exist
in the destination directory; so the copy operation was skipped.
2 There are some additional files in the destination directory that aren't present in the
source directory. No files were copied.
3 Some files were copied. Additional files were present. No failure was met.
5 Some files were copied. Some files were mismatched. No failure was met.
6 Additional files and mismatched files exist. No files were copied and no failures were met.
Which means that the files already exist in the destination directory.
7 Files were copied, a file mismatch was present, and additional files were present.
7 Note
Any value greater than or equal to 8 indicates that there was at least one failure
during the copy operation.
More information
For more information about how to use the Robocopy utility, open a command prompt,
type the following command, and then press ENTER:
Robocopy /?
Feedback
Was this page helpful? Yes No
This article describes an issue in which an Error [0x80070005] Access is denied error
occurs during a server backup process in Windows Server 2012 Essentials.
Symptoms
Assume that you try to back up a server that is running Windows Server 2012 Essentials
by using the Windows Server Backup feature. However, the backup operation doesn't
finish, and the following event is logged in the Application log:
If you open the log file that is described in the event, you see logs that resemble the
following:
Cause
This issue occurs when a drive that uses the NTFS file system is configured for file-level
backup. Because the $RmMetaData directory is NTFS internal data and cannot be
accessed by other process, this issue occurs.
Workaround
To work around this issue, use one of the following methods.
Method 1
Configure the server backup policy on the affected drive as block-level backup. After
you do this, the whole volume is selected for backup.
Method 2
Set a registry key to exclude the files that are mentioned in the event from file-level
backups. These files are used by NTFS, and they can safely be ignored.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base: 322756 How to back up and restore the registry in Windows
ckup
Feedback
Was this page helpful? Yes No
This article discusses the system event log srv event ID 2012.
Summary
Consider the following scenario:
In this scenario, you see multiple events with Source Srv ID 2012 in the system event log:
In Words
0000: 00040000 002C0001 00000000 800007DC
0008: 00000000 C0000184 00000000 00000000
0010: 00000000 00000000 00000634
After upgrading our file server to Windows Server 2012 we encounter this Event more
often, why?
you have an environment with many downlevel SMB1 clients like Windows XP or
Windows Server 2003.
Unsuccessfully logon attempts (SESSION SETUP Response with error status)
followed by TCP FIN result in Event 2012.
These clients tend to end their last SMB session with a LOGOFF and TREE
DISCONNEcT SMB command, then they terminate the transport session gracefully
with a TCP FIN.
This sequence of SMB commands is not fully CIFS-compliant, see above, resulting
in Event 2012.
you have an environment with some SAMBA / UNIX / MAC based downlevel SMB1
clients.
These clients often terminate SMB sessions not CIFS conform (omitting a LOGOFF
command), resulting in Event 2012.
downlevel clients with redirected folders on the Windows Server 2012-based file
server are disconnected from the network without a proper shutdown.
The file server sends in such situation TCP KeepAlive packets to inactive clients and
resets the TCP transport connection if there is no more response from the client.
SMB1 clients encounter some network problems (File server is not answering their
outstanding SMB command within one minute (SessTimeout = 60 sec), so the
client won't send a LOGOFF, but terminates the TCP session with RESET and then
establishes a new TCP / SMB session with a new virtual circuit (VcNumber: 0).
The file server was not aware of the clients network issue and scavenges the former
client session as soon as it detects the same SMB1 client IP with SESSION SETUP
(VcNumber: 0) coming in. (this can happen in NAT Scenario for different clients
resulting in same IP address in the file server subnet as well)
More information
For more information about this topic, click the following article number to view the
article on the Microsoft Web:
Feedback
Was this page helpful? Yes No
This article describes an issue in which System State Backup fails when an invalid
ImagePath is specified for services.
Symptom
Windows Server 2008 System State Backup may fail with the following error:
Summary of backup:
Backup of system state failed [<date> <time>]
Log of files successfully backed up
'C:\Windows\Logs\WindowsServerBackup\SystemStateBackup <date> <time>.log'
Log of files for which backup failed
'C:\Windows\Logs\WindowsServerBackup\SystemStateBackup_Error <date>
<time>.log'
Enumeration of the files failed.
The file name, directory name, or volume label syntax is incorrect.
Cause
The System state backup fails because the ImagePath that is specified by a service
cannot be backed up. Closer inspection of the System log shows that a service is failing
to start, and you receive an error such as the following.
Reviewing the ImagePath of the failing service reflects an invalid path or file name.
Resolution
To resolve this issue, follow these steps:
1. Review the System Log to determine the service that will not start.
2. Contact the services software vendor for any known issues and updated
installation package that may resolve the incorrect ImagePath.
Option 2: Correct the ImagePath to have a valid path and file name by using
regedit.
7 Note
Because each service will have a unique ImagePath, you may have to contact the
software vendor if the correct path and file name are not obvious.
7 Note
The following blog posting includes an example script that can be used to identify
faulty ImagePath statements. This script is provided as-is and without warrantee:
https://blogs.technet.com/b/askcore/archive/2010/06/18/ps-script-for-blog-
enumeration-of-the-files-failed.aspx
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where event IDs 12290 and 16387 are logged
when system state backup fails.
Symptoms
When you try to perform a system state Automated System Recovery (ASR) backup on a
Windows Server 2008-based computer, the backup fails, and error messages that
resemble the following are logged in the Application log.
Cause
This problem occurs if the active EISA partition on the computer is a hidden partition.
The ASR writer in Windows Server 2008 doesn't support hidden active partitions. A
hidden EISA partition may be marked as active when a new operating system installation
is complete on a new computer without first completing the manufacturer's initial Out
Of Box Experience (OOBE) program or without first using a disk utility to clear the disk.
This problem doesn't occur on a new computer if the computer manufacturer's OOBE
program has been run before installing Windows. In this scenario, after the OOBE
program is finished, the hidden partition is marked inactive. You can then install
Windows and the backup is completed successfully.
Resolution
To resolve this problem, follow these steps.
1. Click Start, point to Administrative Tools, click Computer Management, and then
click Disk Management.
2. Click the volume that contains the existing Windows Server 2008 installation.
Typically, this is drive C.
3. Right-click the volume, and then click Mark Partition as Active.
7 Note
In this scenario, the existing installation of Windows cannot start until the
remaining steps are completed.
6. Insert the Windows Server 2008 installation DVD into the DVD drive, and then
restart the computer.
Installation language
Time and currency format
Keyboard layout
9. In the System Recovery Options dialog box, click the operating system that you
want to repair, and then click Next.
11. At the command prompt, type the following command, and then press ENTER:
Console
Console
Attrib +h +s c:\bootmgr
Console
Bootrec /fixboot
14. Type the following command, and then press ENTER:
Console
Bootrec /rebuildbcd
15. Press Y when you are prompted to add the installation to the boot list.
17. Try the full system state ASR backup again. Confirm that the backup is successful.
More information
If the operating system is installed on a partition that is not located on the same disk as
the hidden active EISA partition, you have to mark a partition as active that is located on
the same drive as the EISA partition. If no other partition exists on the same drive as the
EISA partition, you have to create a partition and mark it as active.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you launch the Windows
Server Backup on Windows Server 2008.
Symptoms
When launching the Windows Server Backup on Windows Server 2008, the MMC opens
with following message:
Cause
The Scheduled backup policy folder in task scheduler is missing or broken. On startup
the wbadmin.msc snap-in queries, the scheduled tasks resulting in an error when they
are missing or otherwise broken.
Resolution
Remove the scheduled tasks that the MMC snap-in is trying to read. Once removed new
schedules can be created.
To remove any scheduled tasks, open an elevated command prompt and run the
following command:
Console
7 Note
If you stop the scheduled backups, the disks where you stored the backups cannot
be used again to store backups until they are reformatted (so that all existing
backups are deleted).
Feedback
Was this page helpful? Yes No
This article helps fix the error 0x80042306 that occurs when you configure Previous
Versions in Windows Server for the clustered disks that are mounted as folders on a
different volume.
Symptoms
When trying to configure Previous Versions in Windows Server for the clustered disks
that are mounted as folders on a different volume, it may fail. Additionally, you may
receive the following error message:
Other symptoms you might observe when trying to configure previous versions for a
mount point on another volume:
Cause
The error occurs because of mismatch in cluster online and offline timeouts. There's a
premature exit after calling resource online/offline.
Workaround
To work around this problem, consider modifying the registry values by following the
steps mentioned below.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
5. Select Decimal and then type 2000000000 in the Value data box, and then click
OK.
7. Select Decimal and then type 2000000000 in the Value data box, and then click
OK.
7 Note
Feedback
Was this page helpful? Yes No
This article provides a solution to a problem that prevents Windows Server Backup from
starting after you perform a bare metal recovery (BMR).
Symptoms
Consider the following scenario:
You have a computer that's running Windows Server 2012 or Windows Server 2012
R2.
You're using a UEFI system with two hard disks, and you have EFI System Partition
on your system disk.
You use Windows Server Backup to perform a complete backup.
You then use the backup data to perform a BMR.
However, after the recovery operation is completed, the Windows Server Backup service
cannot be started.
Cause
This problem occurs because the Windows Server Backup engine (Wbengine.exe) does
not handle cases correctly when the EFI system partition location is changed during the
restore.
Resolution
To resolve this issue, Windows Backup must rebuild the catalog to reflect the latest disk
configurations. To trigger this action, follow these steps:
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
References
Learn more about the wbadmin delete catalog command.
Feedback
Was this page helpful? Yes No
This article describes why can't delete a file or a folder on an NTFS file system volume. It
also provides help to solve this issue.
7 Note
Internally, NTFS treats folders as a special type of file. Therefore, the word file in this
article indicates either a file or folder.
Administrators have the implicit ability to take ownership of any file, even if they haven't
been explicitly granted any permission to the file. File owners have the implicit ability to
modify file permissions, even if they aren't explicitly granted any permissions to the file.
So, you may have to take ownership of a file, give yourself permissions to delete the file,
and then delete the file.
The Access Control Entries (ACEs) in an ACL have a certain preferred sequence
depending on their type. For example, ACEs that deny access typically come before ACEs
that grant access. However, nothing prevents a program from writing an ACL that has
ACEs in any arbitrary sequence. In some earlier versions of Windows, issues occurred
when Windows tried to read these non-canonical ACLs. Sometimes you can't modify
these ACLs correctly by using the Microsoft Windows Explorer graphical security editor.
This issue has been corrected in later versions of Windows. If you experience this issue,
use the most recent version of Cacls.exe. Even if you can't display or edit an ACL in
place, you can write a new ACL to gain access to the file.
Depending on how the file is opened, you may not be able to delete a file that's in use.
For example, the file is open for exclusive access instead of shared access. You can use
various tools to determine the processes that have open handles to files whenever you
want.
The symptoms of this issue may vary. You can use the Delete command to delete a file.
But the file isn't deleted until the process that has the file open releases the file.
Additionally, you may not be able to access the Security dialog box for a file that's
pending deletion. To resolve this issue, determine the process that has the open handle,
and then close that process.
The following reasons can corrupt the file system and put files in a problematic state:
Typical operations may fail in various ways. When the file system detects corruption, it
logs an event to the event log and you typically receive a message that prompts you to
run Chkdsk. Depending on the nature of the corruption, Chkdsk may or may not recover
file data. However, Chkdsk returns the file system to an internally consistent state.
\\ServerName\SubfolderName1\SubfolderName2\SubfolderName3\SubfolderName4\...
In this path, the total character count is over 255 characters. To short the length of this
path, to 73 characters, map a drive to SubfolderName4.
You may experience this issue if you create a share at some point in your folder
structure that's already fairly deep, and then create a deep structure below that point by
using the share. Some tools that operate locally on the folder tree may not be able to
traverse the whole tree starting from the root. You may have to use these tools in a
special way so that they can traverse the share. The CreateFile API documentation
describes a method to traverse the whole tree in this situation.
Typically, you can manage files by using the software that creates them. If you have a
program that can create files that are deeper than MAX_PATH , you can typically use that
same program to delete or manage the files. You can typically delete files that are
created on a share by using the same share.
Additionally, you can use some built-in commands to bypass the typical Win32 reserved
name checks if you use a particular syntax to specify the path of the file.
If you open a handle to a file by using the typical Win32 CreateFile mechanism, certain
file names are reserved for old-style DOS devices. For backward compatibility, these file
names aren't permitted, and they can't be created by using typical Win32 file calls. This
issue isn't a limitation of NTFS.
You can use a Win32 program to bypass the typical name checks that are done when a
file is created or deleted by using the same technique that you use to traverse folders
deeper than MAX_PATH . Additionally, some POSIX tools aren't subject to these name
checks.
Console
The cause of this issue is similar to Cause 4. If you use typical Win32 syntax to open a
file that has trailing spaces or trailing periods in its name, the trailing spaces or periods
are stripped before the actual file is opened. For example, you have two files in the same
folder named AFile.txt and AFile.txt , note the space after the file name. If you try to
open the second file by using standard Win32 calls, you open the first file instead.
Similarly, if you have a file whose name is just a space character and you try to open it
by using standard Win32 calls, you open the file's parent folder instead. In this situation,
if you try to change security settings on these files, you either may not be able to do so,
or you may unexpectedly change the settings on different files. If this behavior occurs,
you may think that you have permission to a file that actually has a restrictive ACL.
Combinations of causes
Sometimes, you may experience combinations of these causes. It can make the
procedure to delete a file more complex. For example, if you log on as the computer's
administrator, you may experience a combination of Cause 1 (you don't have
permissions to delete a file) and Cause 5 (the file name contains a trailing character that
causes file access to be redirected to a different or nonexistent file), and you can't delete
the file. If you try to resolve Cause 1 by taking ownership of the file and adding
permissions, you still may not be able to delete the file, because the ACL editor in the
user interface can't access the appropriate file due to Cause 6.
In this situation, you can use the Subinacl utility with the /onlyfile switch (this utility is
included in the Resource Kit) to change ownership and permissions on a file that's
otherwise inaccessible. Here's an example:
Console
This command is a single command line it has been wrapped for readability.
This sample command line modifies the C:\<path_to_problem_file> file that contains a
trailing space so that the domain\administrator account is the owner of the file and this
account has full control over the file. You can now delete this file by using the Del
command with the same "\\?\" syntax.
Feedback
Was this page helpful? Yes No
This article discusses a change in the behavior of the format command in Windows Vista
and later Windows versions.
Introduction
The behavior of the format command changed in Windows Vista and later Windows
versions. By default in Windows Vista and later versions, the format command writes
zeros to the whole disk when a full format is performed. In Windows XP and earlier
versions of Windows, the format command doesn't write zeros to the whole disk when a
full format is performed.
The new format behavior may cause problems for the on-demand allocation modes that
a volume storage provider, such as a Storage Area Network (SAN), supports. Problems
may occur because the new format behavior prematurely triggers allocation of the
backing space.
In the on-demand scenario, zeros don't have to be written to the whole disk because
the volume storage provider initializes the on-demand-allocated data. To avoid causing
unnecessary on-demand-allocation, you must use the quick format option.
Diskpart: Use the format command together with the quick parameter.
Windows Explorer: Click to select the Perform a quick format check box.
Disk Management (Diskmgmt.msc): Click to select the Perform a quick format
check box.
Feedback
Was this page helpful? Yes No
This article discusses how to check an NTFS file system's disk space allocation to
discover offending files and folders or look for volume corruption in Microsoft Windows
Server 2003-based computers.
Summary
NTFS supports many volume and file-level features that may lead to what appear to be
lost or incorrectly reported free disk space. For example, an NTFS volume may suddenly
appear to become full for no reason, and an administrator cannot find the cause or
locate the offending folders and files. This may occur if malicious or unauthorized access
to an NTFS volume where large files or a high quantity of small files are secretly copied
has occurred. These files then have their NTFS permissions removed or restricted. This
behavior may also occur after a computer malfunction or power outage occurs that
cause volume corruption.
The disk space allocation of an NTFS volume may appear to be misreported for any of
the following reasons:
The NTFS volume's cluster size is too large for the average-sized files that are
stored there.
File attributes or NTFS permissions prevent Windows Explorer or a Windows
command prompt from displaying or accessing files or folders.
The folder path exceeds 255 characters.
Folders or files contain invalid or reserved file names.
NTFS metafiles (such as the Master File Table) have grown, and you cannot de-
allocate them.
Files or folders contain alternate data streams.
NTFS corruption causes free space to be reported as in use.
Other NTFS features may cause file-allocation confusion.
The following information can help you to optimize, repair, or gain a better
understanding of how your NTFS volumes use disk space.
Cluster size is too large
Only files and folders that include internal NTFS metafiles like the Master File Table
(MFT), folder indexes, and others can consume disk space. These files and folders
consume all the file space allocations by using multiples of a cluster. A cluster is a
collection of contiguous sectors. The cluster size is determined by the partition size
when the volume is formatted.
For more information about clusters, see Default cluster size for NTFS, FAT, and exFAT .
To determine the current cluster size and volume statistics, run a read-only chkdsk
command from a command prompt. To do so, follow these steps:
1. Click Start, click Run, type cmd, and then click OK.
3. Click OK.
7 Note
Multiply each value that the output reports in kilobytes (KB) by 1024 to determine
accurate byte counts. For example: 2906360 x 1024 = 2,976,112,640 bytes. You can
use this information to determine how your disk space is being used and the
default cluster size.
To determine whether this is the optimal cluster size, you must determine the wasted
space on your disk. To do so, follow these steps:
1. Click Start, click My Computer, and then double-click the drive letter (for example,
D) of the volume in question to open the volume and display the folders and files
that the root contains.
2. Click any file or folder, and then click Select All on the Edit menu.
3. With all the files and folders selected, right-click any file or folder, click Properties,
and then click the General tab.
The General tab displays the total number of files and folders on the whole volume
and provides two file size statistics: SIZE and SIZE ON DISK.
If you are not using NTFS compression for any files or folders contained on the volume,
the difference between SIZE and SIZE ON DISK may represent some wasted space
because the cluster size is larger than necessary. You may want to use a smaller cluster
size so that the SIZE ON DISK value is as close to the SIZE value as possible. A large
difference between the SIZE ON DISK and the SIZE value indicates that the default
cluster size is too large for the average file size that you are storing on the volume.
You can only change the cluster size you are using by reformatting the volume. To do
this, back up the volume, and then format the volume by using the format command
and the /a switch to specify the appropriate allocation. For example: format D: /a:2048
(This example uses a 2-KB cluster size).
7 Note
Alternately, you can enable NTFS compression to regain space that you lost
because of an incorrect cluster size. However, this may result in decreased
performance.
To include these types of files in the overall statistics, change Folder Options. To do so,
follow these steps:
1. Click Start, click My Computer, and then double-click the drive letter (for example:
D) of the volume. This opens the volume and displays the folders and files that the
root contains.
2. On the Tools menu, click Folder Options, and then click the View tab.
3. Select the Show Hidden Files and Folders check box, and then click to clear the
Hide protected operating system files check box.
4. Click Yes when you receive the warning message, and then click the Apply button.
This change permits Windows Explorer and the dir /a /s command to total all
the files and folders that the volume contains that the user has permissions to
access.
To determine the folders and files that you cannot access, follow these steps:
1. At the command prompt, create a text file from the output of the dir /a /s
command.
For example: At the command prompt, type the following command: dir d: /a /s
>c:\d-dir.txt .
3. Click Options on the Tools menu, click the Backup Log tab, click Detailed, and
then click OK.
4. In the Backup Utility, click the Backup tab, and then select the check box for the
whole volume that is affected (for example: D:), and then click Start Backup.
5. After the backup is complete, open the backup report and compare folder for
folder the NTBackup log output with the d-dir.txt output that you saved in step 1.
Because backup can access all the files, its report may contain folders and files that
Windows Explorer and the dir command do not display. You may find it easier to use the
NTBackup interface to locate the volume without backing up the volume when you want
to search for large files or folders that you cannot access by using Windows Explorer.
After you locate the files that you do not have access to, you can add or change
permissions by using the Security tab while you view the properties of the file or folder
in Windows Explorer. By default, you cannot access the System Volume Information
folder. You must add the correct permissions to include the folder in the dir /a /s
command.
You may notice folders or files that do not have a Security tab. Or, you may not be able
to re-assign permissions to the affected folders and files. You may receive the following
error message when you try to access them:
Access is denied
If you have any such folders, contact Microsoft Product Support Services for
additional help.
You may not be able to rename or delete these files or folders. When you try to do so,
you may receive one of the following error messages:
Cannot rename file: Cannot read from the source file or disk.
Or
Cannot delete file: Cannot read from the source file or disk.
If you have folders or files that you cannot delete or rename, contact Microsoft Product
Support Services.
NTFS Master File Table (MFT) expansion
When an NTFS volume is created and formatted, NTFS metafiles are created. One of
these metafiles is named the Master File Table (MFT). It is small when it is created
(approximately 16 KB), but it grows as files and folders are created on the volume. When
a file is created, it is entered in the MFT as a File Record Segment (FRS). The FRS is
always 1024 bytes (1 KB). As files are added to the volume, the MFT grows. However,
when files are deleted, the associated FRSs are marked as free for reuse, but the total
FRSs and associated MFT allocation remains. That is why you do not regain the space
used by the MFT after you delete a large number of files, .
To see exactly how large the MFT is, you can use the built-in defragmenter to analyze
the volume. The resulting report provides detailed information about the size and
number of fragments in the MFT.
For example:
However, for more complete information about how much space (overhead) the whole
NTFS is using, run the chkdsk.exe command, and then view the output for the following
line:
In use by system.
Currently, only third-party defragmenters consolidate unused MFT FRS records and
reclaim unused MFT allocated space.
Windows Explorer and the dir command do not report the data in alternate data
streams as part of the file size or volume statistics. Instead, they show only the
total bytes for the primary data stream.
The output from chkdsk accurately reports the space that a user's data files use,
including alternate data streams.
Disk quotas accurately track and report all data stream allocations that are part of
a user's data files.
NTBackup records the number of bytes backed up in the backup log report.
However it does not show which files contain alternate data streams. It also does
not show accurate file sizes for files that include data in alternate streams.
A hard link is a directory entry for a file regardless of where the file data is located on
that volume. Every file has at least one hard link. On NTFS volumes, each file can have
multiple hard links, and therefore a single file can appear in many folders (or even in the
same folder with different names). Because all the links refer to the same file, programs
can open any of the links and modify the file. A file is deleted from the file system only
after all the links to it are deleted. After you create a hard link, programs can use it like
any other file name.
7 Note
Windows Explorer and a command prompt show all linked files as being the same
size, even though they all share the same data and do not actually use that amount
of disk space.
Volume mount points and directory junctions permit an empty folder on an NTFS
volume to point to the root or subfolder on another volume. Windows Explorer and a
dir /s command follow the reparse point, count any files and folders on the destination
volume, and then include them in the host volume's statistics. This may mislead you to
believe that more space is being used on the host volume than what is actually being
used.
In summary, you can use chkdsk output, NTBackup GUI or backup logs, and the viewing
of disk quotas to determine how disk space is being used on a volume. However,
Windows Explorer and the dir command have some limitations and drawbacks when
used for this purpose.
Feedback
Was this page helpful? Yes No
This article provides a solution to fix event ID 154 that occurs on a computer that's
connected to a storage array such as Fibre Channel (FC) storage.
) Important
This article contains information about how to modify the registry. Make sure that
you back up the registry before you modify it. Make sure that you know how to
restore the registry if a problem occurs. For more information about how to back
up, restore, and modify the registry, see How to back up and restore the registry
in Windows .
Symptoms
On a Windows Server 2012-based computer that is connected to a storage array such as
Fibre Channel (FC) storage, the event ID 154 is logged in the system event log.
Cause
This behavior can occur for one of the following reasons:
The FC connection dropped a packet somewhere between the Host Bus Adapter
(HBA) and the storage array.
The array controller or a device in the array responded to an I/O request and
indicated that the hardware exceeded hardware-defined time-outs in the array.
Resolution
To resolve this issue, contact the vendor of your adapter, switch, or array to determine
the cause of the dropped FC packets or hardware time-outs.
More information
2 Warning
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall the operating system. Microsoft cannot guarantee that these problems can
be solved. Modify the registry at your own risk.
Disk Event 154 is a new system event in Windows Server 2012 that is intended to log
cases in which an FC packet may have been dropped. The intention is to make these
issues more discoverable. A dropped FC frame can have a large effect on user
experience, because the time that the operating system will wait for an I/O operation to
finish is based on the disk.sys TimeOutValue value, and the operating system may seem
to be frozen or to hang while it waits for the I/O operation to finish. After the time-out
value is reached, the disk/class layer will retry the I/O operation eight times. (Each
attempt waits the full amount of the TimeOutValue value).
Currently, we recommend that you set the disk.sys TimeOutValue value as low as
possible. (We recommend that you set it to a value no greater than 20 to 30 seconds).
However, as with any change, the value that you use should be evaluated in a test
environment before you implement that value in production.
The value is global. Therefore, avoid very short time-out values. Otherwise, you may
experience time-out errors in scenarios such as when you are waiting for a sleeping disk
or DVD drive to spin up.
1. Start Registry Editor. To do this, click Start, type regedit in the Start Search box, and
then press Enter.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Disk
3. Locate TimeOutValue.
This article helps fix an issue where various errors messages may be logged when you
bring a physical disk resource online.
Symptoms
When you bring a physical disk resource online on a server that is running Windows
Server 2008, you may experience one of the following symptoms:
Symptom 1
When you view the physical disk resource in the Failover Cluster Management snap-in,
the resource may show a status of Online Pending. Additionally, the following error
message is logged in the System log:
ERR [RES] Physical Disk <Cluster Disk 3>: VerifyFS: Failed to open file \\?
\GLOBALROOT\Device\Harddisk2\Partition1\TextDocument.txt Error: 5.
Symptom 2
When you view the physical disk resource in the Microsoft Cluster Administrator utility,
you may experience one or more of the following symptoms:
The resource may not come online, or it may come online after a brief delay.
The Chkdsk utility together with the /F switch automatically starts to run on the
shared hard disk.
Event ID 1066 that has a description similar to the following appears in the System
log of the Event Viewer:
Cause
These issues occur for one of the following reasons.
Cause of Symptom 1
This issue occurs because a read-only file is located in the root directory of the resource.
When a shared physical disk resource is brought online, the cluster service enumerates
the files of the root directory and tries to open each file together with full access. This
behavior occurs to make sure that the file system is consistent and that the volume is
not corrupted. If any of the files are read-only in the root directory of the resource, the
volume is considered corrupted and Chkdsk is started. To work around this problem, use
the workaround that is mentioned in the Workaround of Symptom 1 section.
Cause of Symptom 2
This issue occurs because the "dirty" flag for the volume is set. When a shared physical
disk resource is brought online, the cluster service enumerates the files of the root
directory and tries to open each file together with full access. This behavior occurs to
make sure that the file system is consistent and that the volume is not corrupted. If any
of the files have the "dirty" flag set in the root directory of the resource, the volume is
considered corrupted and Chkdsk is started. To work around this problem, use the
workaround that is mentioned in the Workaround of Symptom 2 section.
Workaround of Symptom 1
To work around this problem, do one of the following:
Clear the read-only attribute from the files by either viewing the file properties or
by using the attrib -r command at a command prompt.
Move the files that have the read-only attribute from the root directory of the
resource to an appropriate subfolder.
7 Note
If you fail to bring the disk online and perform any further check on the files, please
set the Physical Disk private property DiskRunChkDsk to a property of 4
(ChkDskDontRun). This will disable volume mount checks.
Workaround of Symptom 2
To work around this problem, first determine whether the "dirty" flag for the specified
volume is set.
To determine whether the "dirty" flag is set for the volume in Windows Server 2008, use
the Chkntfs tool.
For more information about the Chkntfs tool, visit the following Microsoft TechNet Web
site:
Chkntfs
To determine whether the "dirty" flag is set for the volume in Windows Server 2008 R2,
use the Validate a Configuration Wizard.
For more information about the Validate a Configuration Wizard, visit the following
Microsoft TechNet Web site:
Validating a Failover Cluster Configuration
If the "dirty" flag is set for the volume, run the Chkdsk utility together with the /F switch.
For more information about the Chkdsk utility, visit the following Microsoft TechNet
Web site:
Chkdsk
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
at the beginning of this article.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where extending a Cluster Shared Volume by
using Diskpart or PowerShell isn't blocked from a non-coordinator node.
Applies to: Windows Server 2016, Windows Server 2019, Windows Server 2012 R2
Original KB number: 3189825
Symptoms
Consider the following scenario:
You have a failover cluster that has a Cluster Shared Volume (CSV) configured.
You have to extend the CSV volume.
From a non-coordinator node, you use the Diskpart command or a Windows
PowerShell cmdlet to extend the volume.
In this scenario, the extend process is completed successfully. However, the Capacity
section of the Disk Management console continues to show the old disk size value from
before the extend process. In the Cluster GUI, the disk view shows the correct extended
size but the volume size reflects the old values.
Additionally, you can't reduce the extended volume. If you try to do this, the process
fails and you may receive the following error message:
Wrong parameter
Cause
This problem occurs because an extend write operation causes the Cluster Shared
Volumes File System (CSVFS) to extend all or some of the following values:
In the Cluster GUI, you may notice that the Extend Volume option is greyed out on a
non-coordinator node.
Resolution
To resolve this problem, don't run any metadata operation from a non-coordinator
node.
More information
For more information about clustering and high-availability, see the following Failover
Clustering and Network Load-Balancing Team Blog article:
Workaround
To work around this problem, increase the disk space that's allocated to the CSV. To do
this, extend the disk on the CSV owner node (coordinator node) by using the Cluster
GUI, the Diskpart tool, or Windows PowerShell.
7 Note
After you extend the disk, all displayed disk sizes and capacity values are updated
to the correct size.
Feedback
Was this page helpful? Yes No
This article describes how to set the Partmgr Attributes registry value by using
PowerShell.
Summary
The partmgr.sys Attributes registry key affects the online behavior of a given disk, and
the value corresponds to the SAN policy values in VDS as documented on
VDS_SAN_POLICY enumeration.
C++
This value is initially set when a disk is identified based on the SAN Policy value in place
at the time. The SAN policy determines whether a newly discovered disk is brought
online or remains offline, and whether it is made read/write or remains read-only. When
a disk is offline, the disk layout can be read, but no volume devices are surfaced through
Plug and Play (PnP). This means that no file system can be mounted on the disk. When a
disk is online, one or more volume devices are installed for the disk.
1. Click Start, click Run, type cmd, and then press ENTER.
2. In the command-line window, type diskpart, and then press ENTER.
3. Type SAN , and then press ENTER. This command will return the current set SAN
policy.
4. Type exit , and then press ENTER.
Setting a value of 0 ( VDS_SP_UNKNOWN ) will be mapped to VDS_SP_ONLINE , so a value of 0
or 1 may be used to bring a disk online.
Parameters\Partmgr .
For more information about how to write scripts for Windows PowerShell, see General
information about how to write scripts for Windows PowerShell .
Registry information
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
The vendor string variable is used to restrict the value change to a subset of disks
matching a specific vendor's identifier. Check the registry for the Disk&Ven_ string to
verify what value should be used.
PowerShell
$val = 0
$vendor = Read-Host "Enter Vendor String"
$devIDs = Get-ChildItem
"HKLM:\SYSTEM\CurrentControlSet\Enum\SCSI\Disk*Ven_$vendor*\*\Device
Parameters\"
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2019, Windows Server 2016, Windows 10 - all editions
Original KB number: 4577004
Symptoms
The Application log lists many ESENT events that specify Event ID 640 in Windows 10,
Windows Server 2019, and Windows Server 2016.
Cause
Event ID 640 indicates that the Extensible Storage Engine (ESE) has detected that a
database file and its flush map file are not synchronized. This situation occurs rarely. It is
caused by one of the following conditions:
The database was moved, but not all the required files were moved together with
it.
The sector that hosts the flush map's header is corrupted. This condition is
exceptionally rare.
An existing ESE database was deleted and then re-created, but its flush map file
was not deleted or re-created. This discrepancy typically occurs when an
application migrates its data from one ESE database to another ESE database, and
the application does not clean up correctly. Such migrations may be more frequent
during or shortly after Windows upgrades. After the new database is created, the
system detects the old flush map file. That file is not synchronized with the new
database. In this scenario, there is no risk to the data in the new database. The
condition is benign.
Status
A future release of Windows is expected to include a change that prevents the system
from logging Event ID 640 in the benign case.
Determine the cause of Event ID 640
To determine the cause of Event ID 640, examine the "...FromDb" fields in the event data,
and consider the following situations:
All or some of these fields are not initialized and, therefore, have values of zero. In
this case, Event ID 640 was caused by the creation of a new database. This is a
benign case. You do not have to take any action to mitigate it.
All the "...FromDb" fields have non-zero values. In this case, you should investigate
the problem.
The "...FromDb" fields appear in bold in the following example of an event log entry:
services (836,D,35) Error -1919 validating header page on flush map file '<Drive>:\
<Path>\<FileName>.jfm'. The flush map file will be invalidated. Additional
information: [SignDbHdrFromDb:Create time:00/00/1900 00:00:00.000 Rand:0
Computer:] [SignFmHdrFromDb:Create time:00/00/1900 00:00:00.000 Rand:0
Computer:] [SignDbHdrFromFm:Create time:<DateTime> Rand:559408839
Computer:] [SignFmHdrFromFm:Create time:<DateTime> Rand:4291821429
Computer:]
7 Note
Feedback
Was this page helpful? Yes No
Data corruption and disk errors cover different areas such as issues about accessing a
drive, drive corruption, and slow performance.
The following Event IDs indicate that there's data corruption or a disk error:
Event ID 153
The IO operation at logical block address 123456 for Disk 2 was retried.
Event ID 129
Event ID 157
Event ID 55
The file system structure on the disk is corrupt and unusable. Please run the
chkdsk utility on the volume.
Event ID 98
Troubleshooting checklist
7 Note
7 Note
7 Note
The placeholder <rootpath> represents the drive letter of the root drive.
Run the fsutil dirty query <volumepath>: command to check if the volume is
dirty.
7 Note
For a volume whose file system is NTFS, run the chkdsk /f /r command if the
volume is dirty. The chkdsk /F /R command needs downtime because the disk
won't be accessible.
For a volume whose file system is Resilient File System (ReFS), the disk
corruption will be repaired automatically.
If the "chkdsk" utility doesn't fix the disk errors, perform a restore from a backup.
Remove the disks from the cluster and check the operating system level.
Run the chkdsk /f command on all volumes that the event is logged for.
Contact the hardware vendor and run hardware diagnostics to avoid the possibility
of any hardware issues.
Get in touch with the storage vendor to check the multipathing configuration.
If Event ID 153 or Event ID 129 is logged, disk I/O timeout is the common cause because
the storage controller can't handle the load. In this case, the I/O operation times out,
and the miniport driver (from a vendor) sends back the messages to the Storport driver
(the last Microsoft storage driver in the stack). Then, the Storport driver translates the
information and logs the event in the Event Viewer.
Because the miniport driver has sufficient knowledge of the request execution
environment, some miniport drivers time the request themselves instead of letting the
Storport driver handle request timing. The miniport driver can abort an individual
request and return an error, whereas the Storport driver resets the drive after a timeout.
Resetting the drive is disruptive to the I/O subsystem and may not be necessary if only
one request has timed out. The miniport driver returns the error to the class driver that
logs Event ID 153 and retries the request.
Output
Log Name: System
Source: disk
Event ID: 153
Level: Warning
Description: The IO operation at logical block address 123456 for Disk 2 was
retried.
This event indicates that a request failed and was retried by the class driver. No error
message was logged in this situation because the Storport driver didn't time out the
request. The lack of messages resulted in confusion when troubleshooting disk errors
because there was no evidence of the error.
On the Details tab of the event log, the detailed information shows the error that
caused the retry and whether the request was a Read or Write request. For example:
Output
in bytes
0000: 0F 01 04 00 03 00 2C 00 ......,.
0008: 00 00 00 00 99 00 04 80 ......
0010: 00 00 00 00 00 00 00 00 ........
0018: 00 00 00 00 00 00 00 00 ........
0020: 00 00 00 00 00 00 00 00 ........
0028: 00 00 09 28 ...*
In this example, the byte offset 29 shows the SCSI status, the byte offset 30 shows the
SCSI request block (SRB) status that caused the retry, and the byte offset 31 shows the
SCSI command that is being retried. In this case, the SCSI status is 00 ( SCSISTAT_GOOD ),
the SRB status is 09 ( SRB_STATUS_TIMEOUT ), and the SCSI command is 28 ( SCSIOP_READ ).
Output
SCSIOP_READ - 0x28
SCSIOP_WRITE - 0x2A
SRB_STATUS_TIMEOUT - 0x09
SRB_STATUS_BUS_RESET - 0x0E
SRB_STATUS_COMMAND_TIMEOUT - 0x0B
7 Note
The bus reset error ( SRB_STATUS_BUS_RESET ) indicates that the device was reset
and the request is being retried because of the reset since all incomplete
requests are aborted when a drive receives a reset.
More information
Because the issue is normally outside the operating system, check the following
common causes:
Too many drives with a high load are on the same storage controller. Therefore the
drives need to be split among different controllers.
If Multipath I/O (MPIO) is configured, a single cable or a damaged NIC can cause
issues with iSCSI.
Output
The port driver does most of the request processing. There are different port drivers
depending on the architecture. For example, the ATA port driver (Ataport.sys) and the
SCSI port driver (Storport.sys). Here are some responsibilities of a port driver:
Enforcing queue depth to make sure that a device doesn't have more requests
than it can handle
The port driver interfaces with the miniport driver, and the miniport driver is designed
by the hardware vendor to work with a specific adapter. It's responsible for taking
requests from the port driver and sending them to the target logical unit number (LUN).
The port driver calls the HwStorStartIo() function to send requests to the miniport
driver, and the miniport driver will send the requests to the HBA driver so that they can
be sent over the physical medium (Fibre or Ethernet) to the LUN. When the request is
completed, the miniport driver will call the StorPortNotification() function with the
NotificationType parameter with a value set to RequestComplete , along with a pointer
When a request is sent to the miniport driver, the Storport driver will put the request in
a pending queue, and it's timed. When the request is completed, it's removed from this
queue.
The timing mechanism is simple. There's one timer per logical unit, and it's initialized to
-1 . When the first request is sent to the miniport driver, the timer is set to the timeout
value in the SRB. The disk timeout value is a tunable parameter that's located under the
following registry key:
HKLM\System\CurrentControlSet\Services\Disk\TimeOutValue
Some hardware vendors will tune this value to best match their hardware. Don't change
this value without guidance from your storage vendor.
The timer is decremented once per second. When a request is completed, the timer is
refreshed with the timeout value of the head request in the pending queue. Therefore,
the timer will never go to zero as long as requests complete. If the timer goes to zero, it
means that the device has stopped responding. For example, when the Storport driver
logs Event ID 129, the Storport driver has to take corrective action by trying to reset the
unit. When the unit is reset, all incomplete requests are completed with an error, and
they're retried. When the pending queue is cleared, the timer is set to -1 , which is the
initial value.
Each SRB has a timer value set. When requests are completed, the queue timer is
refreshed with the timeout value of the SRB at the head of the list.
The most common causes of Event ID 129 are unresponsive LUNs or a dropped request.
Dropped requests can be caused by faulty routers or other hardware problems on the
storage area network (SAN).
This issue most often occurs when something disrupts the system's communication with
a disk, such as a SAN fabric error or a SCSI bus problem. The errors can also be caused
by a disk that fails or when a user unplugs a disk while the system is running. In this
case, an administrator needs to verify the heath of the disk subsystem.
Troubleshooting Event ID 55 and 98
If NTFS events such as Event ID 55, 50, 140, and 98 are logged, you need to run the
"chkdsk" utility.
Because NTFS couldn't write data to the transaction log, this could affect the ability of
NTFS to stop or roll back the operations in which the transaction data couldn't be
written.
Output
Usually, Event ID 55 is logged when file system corruption occurs. The file system
corruption occurs when one or more of the following issues occur:
I/O requests that are delivered by the file system to the disk subsystem aren't
completed successfully.
Most issues are hardware-related, and hardware may be corrupted unexpectedly. You
can try the following methods to fix the issues:
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article describes the SID and supported methods for cloning or duplicating a
Windows installation.
Summary
When you deploy a duplicated or imaged Windows installation, it is required that the
System Preparation (Sysprep) tool is used before the capture of the image. Sysprep
prepares an installation of Microsoft Windows for duplication, auditing, and customer
delivery. For Windows 2000, Windows XP, and Windows Server 2003, Sysprep is included
with the latest service pack Deploy.cab. For later versions of Windows, Sysprep is
included with the operating system, and Sysprep is located in the folder:
%windir%\system32\sysprep .
More information
Sysprep is responsible for removing system-specific data from Windows, such as the
Computer SID. During installation of Windows, a computer SID is computed to contain a
statistically unique 96-bit number. The computer SID is the prefix of the user account
and group account SIDs that are created on the computer. The computer SID is
concatenated together with the Relative ID (RID) of the account to create the account's
unique identifier.
The following example displays the SIDs for four local user accounts. Only the last four
digits are incremented as new accounts are added.
Cloning or duplicating an installation without taking the recommended steps could lead
to duplicate SIDs. For removable media, a duplicate SID might give an account access to
files even though NTFS permissions for the account specifically deny access to those
files. Because the SID identifies both the computer or domain and the user, unique SIDs
are necessary to maintain support for current and future programs. For more
information about issues that might occur if you clone an installation of Windows 8 or
of Windows Server 2012, go to the Windows 8 and Windows Server 2012 specific
information section.
In addition to the computer SID, many other components and features must be cleaned
up, generalized, or specialized in order to be imaged. Some examples include the
following:
Event logs
Network settings
Windows Media player settings
Shell settings
Licensing
7 Note
We support the following operating systems that are prepared by using the Sysprep
utility and then imaged:
We do not provide support for computers that are set up by using SID-duplicating tools
other than the System Preparation tool. For example, this includes the following:
NewSID
GhostWalker
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft does not guarantee the
accuracy of this third-party contact information.
7 Note
If an image was created without using Sysprep, we do not support the running of
Sysprep after the image is deployed as a way to bring the computer back into
compliance. Sysprep must be run before the capture of the image.
Tile, badge, and toast notifications do not update even though Internet
connectivity is available.
Apps that rely on RAW notification do not work as expected. For example, you
notice significantly reduced functionality in Mail, Calendar, and Messaging.
It takes a long time to synchronize changes for roaming and family safety settings.
To resolve these issues, use one of the following methods:
Configure the computers by using the Sysprep /generalize command, and then
deploy the image.
Replace the existing user account with a new account. The device identifier is
stored as part of the user profile. Each new NTUser account that is added to a
computer will receive a new identifier.
References
For more information about the Windows System Preparation Tool, visit the following
Microsoft websites:
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article helps fix the errors that occur in SMB Read Andx requests for files managed
by Data Deduplication.
Symptoms
Server: Windows Server 2012 RTM, with volume setting [x] Enable data deduplication
SMB v1 Clients: Windows XP SP3, third-party CIFS clients (Macintosh, Unix Samba)
Only deduped files (with the size >32 KB) aren't accessible on the volume, expanded
files are accessible.
Error messages may vary depending on type of access and application accessing file on
Server 2012 share with Data Deduplication.
An unexpected error is keeping you from copying the file. If you continue to
receive this error, you can use the error code to search for help with this
problem.
or
Cannot copy <filename>: Cannot read from the source file or disk.
or
Cannot copy <filename>: The request is not supported.
or
Microsoft Word
Navisworks
Access Denied
ERROR_ACCESS_DENIED
Access is denied.
1819 <DateTime> XPclient 2012Srv SMB NT Create AndX Request, FID: 0xc003, Path:
\Test-Dedup-file.pdf
1820 <DateTime> 2012Srv XPclient SMB NT Create AndX Response, FID: 0xc003
AllocationSize: 0
EndOfFile: 51362
1829 <DateTime> XPclient 2012Srv SMB Read AndX Request, FID: 0xc003, 32768 bytes
at offset 0
1830 <DateTime> 2012Srv XPclient SMB Read AndX Response, FID: 0xc003, 0 bytes,
Error: STATUS_NOT_SUPPORTED
NTStatus: 0xC00000BB, Facility = FACILITY_SYSTEM, Severity =
STATUS_SEVERITY_ERROR, Code = (187) STATUS_NOT_SUPPORTED
7 Note
Workaround
Server 2012 without volume setting [ ] Enable data deduplication
Get-DedupStatus - Returns a DeduplicationStatus object for every volume that has data
deduplication metadata.
Get-DedupSchedule - Returns the DeduplicationJobSchedule objects defined on the
system.
Get-DedupJob - Returns status and information for currently running or queued
deduplication jobs.
Update-DedupStatus - Scans one or more specified volumes to compute fresh data
deduplication savings information and returns a DeduplicationStatus object.
get the latest status of the unoptimization job by running the Get-DedupJob PowerShell
command
Reported on:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanManServer\Paramet
ers
EnableAuthenticateUserSharing REG_DWORD 0x0
ServiceDllUnloadOnStop REG_DWORD 0x1
ServiceDll REG_EXPAND_SZ %SystemRoot%\system32\srvsvc.dll
NullSessionPipes REG_MULTI_SZ
autodisconnect REG_DWORD 0xf
enableforcedlogoff REG_DWORD 0x1
enablesecuritysignature REG_DWORD 0x0 //default = 0x1
requiresecuritysignature REG_DWORD 0x0
restrictnullsessaccess REG_DWORD 0x1
Lmannounce REG_DWORD 0x0
Size REG_DWORD 0x3
AdjustedNullSessionPipes REG_DWORD 0x3
ClusterPipes REG_MULTI_SZ FssagentRpc
CachedOpenLimit REG_DWORD 0x0 //default = 0x5
>> enableecp REG_DWORD 0x1 << //default = 0x0 or not set
Guid REG_BINARY DEF9D10A080B9241932038A7E77DFC2D
7 Note
This is known to happen after you install McAfee ver. 8.8 VirusScan Enterprise +
AntiSpyware Enterprise.
De-installing this product still leaves enableecp=1 behind, so you need to delete
the registry key enableecp manually.
Resolution
We believe that the issue is due to interoperability between three components Dedup,
SMB, and third party like "VMware vShield Endpoint driver (VSEPFLT.SYS)", if the
following registry key had been set manually or by some third party software
installation:
HKLM\System\CurrentControlSet\Services\LanmanServer\Parameters\enableecp = 1
To resolve the Deduplication issue:
1. Reboot
or
7 Note
it the steps above don't solve the issue: There may be additional application-
related issues:
when Deduped files are accessed using an application like Adobe over SMB, it
may fail.
Adobe confirmed a known issue with Adobe Reader in accessing PDF files on
a Server 2012 with Deduped files.
The issue was fixed by Adobe from 10.3.x. Currently the latest version of
Adobe Reader available is 11.0.
Here is the article about the PDF files server 2012 RTM deduplication causing
PDF file issues
Status as of March 8: Response from McAfee Support: We're actively investigating what
the value "enableecp" is used for in our product and what the impact is (if any) of
reverting this back to 0 or even removing the value altogether.
KB77623 - is currently in the pipeline and will be published within the next 5-6 working
days, the KB will be updated as our investigation progresses and more details become
available. It currently contains a general overview of the issue and the workaround
described by MSFT.
March 19: the KB has been published and should be publicly accessible through the
McAfee Knowledgebase . Investigation surrounding the value "enableecp" is on-going.
Windows 7 clients can't access shares on Windows Server 2012 when Data
Deduplication is enabled
More information
Info re. Deduplication on Microsoft Server 2012
Info on ECP:
Server & Tools Blogs > Server & Management Blogs > The Storage Team at Microsoft -
File Cabinet
Storage at Microsoft
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where files can't be opened and are logged as
corrupted on deduplicated volumes.
Symptoms
Users can no longer open files on a deduplication-enabled volume that was created by
having NTFS compression enabled at the root of the volume. Additionally, the Data
Deduplication scrubbing job may log an event in the event log to report corruption on
the volume of files that it cannot repair.
Cause
This problem occurs because deduplication metadata that is stored on the compressed
volume root becomes corrupted when a process writes in-place to a file on the
deduplicated volume. The deduplication metadata that is stored on the compressed
volume root is located under the System Volume Information (SVI) folder.
Duplication is not supported on volumes that have compression enabled on the root
when the volume is created. However, deduplication on compressed folders is
supported and functions as expected.
Resolution
To resolve this problem, do not enable data deduplication on an NTFS volume that has
volume-level compression enabled.
7 Note
In the example commands, <X> is a volume that has been created as compressed
and that has Data Deduplication enabled.
1. Download the PsExec tool from the following Windows Sysinternals website:
PsExec v2.2
7 Note
The PsExec tool lets users run processes by having "SYSTEM" user rights. This
is necessary to access the protected Data Deduplication metadata folder that
is located in the System Volume Information folder.
2. Block data access for your users on the affected volume. To do this, run the
following Windows PowerShell disable-dedupvolume command:
PowerShell
disable-dedupvolume X: -dataaccess
7 Note
This command dismounts and then remounts the volume without the
data deduplication filter attached. This blocks users from accessing any
deduplicated files.
The dismount action invalidates any open file handles on this volume.
3. Use PsExec to run Cmd.exe as a "SYSTEM" user. To do this, run the following
command:
Console
Psexec.exe -i -s cmd
7 Note
The Command Prompt window will now open by having "SYSTEM" user rights
assigned.
U Caution
The "SYSTEM" account is a user account that has a much higher level of
access than an administrator account. Users should be careful to perform only
the steps that are mentioned in the article while they are running the
"SYSTEM" account. Users should be especially careful not to change ACLs or
take ownership of the System Volume Information folder.
4. In the PsExec Command Prompt window, locate the System Volume Information
folder of your affected volume.
Console
If <X> is greater than zero (0), go to step 8. Otherwise, go to step 11 because your
deduplication metadata folder is not compressed.
Console
7 Note
The time that is required by this process is proportional to the amount of data
that is on the volume. For volumes that contain terabytes of data, this process
can take several hours to finish. After it finishes, the command exits and
generates the following status message:
N files within M directories were uncompressed.
10. In the PsExec Command Prompt window, run the following "display compression
state" command to verify that there are no compressed files in the Data
Deduplication metadata folder.
Console
12. Re-enable data access for your users on the affected volume. To do this, run the
following command:
Console
Enable-DedupVolume X: -DataAccess
7 Note
This command dismounts and then remounts the volume with the data
deduplication filter attached. Users will now be able to access the
deduplicated files.
The dismount action invalidates any open file handles on this volume.
7 Note
Feedback
Was this page helpful?
Yes No
This article provides workarounds for performance problems that are caused by the
churn from full garbage collection during deduplication.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 3066175
Symptoms
Full garbage collection jobs reclaim more free space than "regular" garbage collection.
However, full garbage collection generates much more churn on the volume. This is
because every chunk container is compacted (rewritten) if there are any unreferenced
chunks.
This churn on the volume may cause the following problems and side effects:
Cause
This behavior may occur in the following situations:
When a workload includes many file deletes or file in-place writes. This causes
many chunks to become unreferenced. Problems are also triggered by deletes that
cause many chunk containers with old and new chunks to experience compaction.
When a system has relatively little physical free space, NTFS first uses free space
that doesn't cause shadow copy storage-area consumption. If the volume has little
free space, NTFS allocates space for new files in areas that trigger "copy on write"
behavior. When the storage area runs out, VSS deletes the shadow copies.
Workaround
To work around these issues, use one of the following methods:
Configure VSS to use a separate (possibly dedicated) volume for its diff area
("shadow storage area"). You can do this by using Vssadmin.exe and other tools.
This workaround helps with the shadow-copy deletion issue.
7 Note
There are other performance benefits to having the diff area on dedicated
volumes.
Configure deduplication not to run Full GC but to run garbage collection only in
regular mode. By default, garbage collection jobs are scheduled to run weekly.
Also by default, every fourth garbage collection job is set to run in Full GC (on a
monthly cadence).
7 Note
You can run Full GC on demand by manually running the following Windows
PowerShell command:
If the system is clustered, you will have to configure the following registry key instead:
HKLM\CLUSTER\Dedup\ /v DeepGCInterval /t REG_DWORD /d 0xffffffff
This workaround helps to reduce all the side effects that are described in the
"Symptoms" section. However, regular-mode garbage collection is not as thorough as
Full GC. Some unreferenced deduplication chunks may not be reclaimed if the system
never runs Full GC. Nevertheless, regular-mode garbage collection should still reclaim
more than 95 percent of unreferenced data.
On a system that's running Windows Server 2012, make sure that hotfix 2897997 is
installed. (This is not necessary for Windows Server 2012 R2.)
Feedback
Was this page helpful? Yes No
This article describes some known issues that may occur after you enable data
deduplication on CSV.
Summary
Data deduplication in Windows Server 2012 R2 supports optimization of storage for
Virtual Desktop Infrastructure (VDI) deployments and optimization of Cluster Shared
Volumes (CSV). Data deduplication is supported on NTFS-formatted CSV and is not
supported on Resilient File System (ReFS)-formatted CSV.
Known Issues
Issue 1
The LastWriteTime property of a file is changed to the time when the file is
processed by a data deduplication optimization job. Additionally, the archive bit of
the file is reset when the data deduplication optimization job is finished.
This behavior does not affect production performance or limit access to the files
that are stored on the CSV. However, this behavior may affect some backup
applications that use the archive bit or the LastWriteTime property to detect
incremental changes of files. For example, when the file properties are changed by
a data deduplication optimization job, the backup application may be triggered to
back up the files again.
Issue 2
When you use the Update-DedupStatus cmdlet to query a data deduplication job
status on a CSV volume from a passive (non-coordinator) cluster node, you receive
an error that resembles the following:
Data deduplication cannot run this job on this CSV volume on this node. Try
running the job on the CSV volume resource owner node.
Data deduplication cannot run this cmdlet on this CSV volume on this node.
Try running the cmdlet on the CSV volume resource owner node.
This behavior is expected because the job status can be queried only from the
coordinator node. To obtain the status of the data deduplication job, log on to the
coordinator node, and then run the Update-DedupStatus cmdlet.
More information
Data deduplication was introduced in Windows Server 2012. Enabling data
deduplication reduces the number of duplicate blocks of data in the storage so that
more data can be stored. Data deduplication is highly scalable, resource efficient, and
nonintrusive and can run on dozens of large volumes of primary data at the same time
and yet have only a minimal effect on the server workload. For more information, see
Data Deduplication Overview and About Data Deduplication.
Feedback
Was this page helpful? Yes No
This article provides help to solve an issue where you can't bind an excluded port again
even though the SO_REUSEADDR option is set.
Symptoms
Assume that you exclude a port by running the following command on a computer that
is running Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2:
Console
Additionally, assume that you bind the SO_REUSEADDR socket to a specific TCP port on
the computer. In this situation, when you try to bind the SO_REUSEADDR socket to the
TCP port again, the bind fails, and you receive the "WSAEACCES (10013)" error.
Therefore, if you use an application that calls the two binds in Windows Server 2012 R2,
Windows Server 2012, or Windows Server 2008 R2, it cannot work correctly.
7 Note
Cause
This issue occurs because of a problem in the tcpip.sys driver. Specifically, the REUSE
flag was overwritten by the RESERVED flag when the tcpip.sys driver binds an excluded
port.
Workaround
To work around this issue, use one of the following methods:
Use a port that is not included in the default dynamic port range (from 49,152 to
65,535), and do not specify the port as an excluded port by running the netsh
command.
Use the CreatePersistentTcpPortReservation and
LookupPersistentTcpPortReservation functions to reserve a port.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
More information
See the setsockopt function to know more about the SO_REUSEADDR option.
Feedback
Was this page helpful? Yes No
This article helps fix an error that occurs when starting the File Server Resource Manager
in Windows Server.
Symptoms
When starting the File Server Resource Manager in Windows Server, you may receive the
following error message:
File Server Resource Manager could not load WMI objects on "Server Name".
Cause
This problem occurs because the Windows Management Instrumentation service is
restarted after the FSRM Service and a new provider load/registration for the FSRM
provider is needed.
Resolution
To resolve this problem, restart the FSRM Service.
If you notice this is a reoccurring issue, there are two actions needed:
More information
In a particular case, the Windows Management Instrumentation is restarted as part of a
WMI Repository Rebuild action. In that case, an investigation would be needed as to
why the WMI Repository is being rebuilt.
If you're running SCCM 2012, ensure that you're not running in the behavior described
in the following article:
Configuration Manager management points fail after the Client Health Evaluation task
runs
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
User Experience issues.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where the File Server Resource Manager
(FSRM) quota usage is incorrect.
Symptoms
This issue occurs on a computer that is running Windows Server 2012 R2 that has the
FSRM feature enabled.
Cause
This issue occurs because FSRM detects that the size of the page file is excluded in the
FSRM quota.
Workaround
Run the Update-FsrmQuota-path paths command in Windows PowerShell to perform the
scan again and recalculate quota usage information.
Status
This behavior is expected.
References
Dirquota quota
General information about the Update-FsrmQuota cmdlet
Feedback
Was this page helpful? Yes No
This article lists the hotfixes that are currently available for users who have installed the File
Services technologies on a Windows Server 2008-based computer or on a Windows Server 2008
R2-based computer.
Applies to: Windows 7 Service Pack 1, Windows Server 2008 R2, Windows Server 2008
Original KB number: 2473205
Summary
File Services provides technologies that help you manage storage, enable file replication, manage
shared folders, ensure fast file searching, and enable access for UNIX client computers. This article
also lists the hotfixes that are currently available for users who utilize File Services from Windows
Vista-based computers or from Windows 7-based computers.
This article contains lists of Microsoft Knowledge Base articles that describe the currently available
fixes. The article is divided into two sections. The first section applies to Windows Server 2008 R2
and to Windows 7, and the second section applies to Windows Server 2008 and to Windows
Vista. Each section is divided into subsections for different component drivers: SRV, MRXSMB, and
RDBSS. In general, the SRV drivers should be updated on the server or client computer that is
hosting the data. The MRXSMB and RDBSS drivers should be updated on the server or client
computer that is initiating access to the data. If you are unsure about which component should be
updated on which computer, you can update all three component drivers both on the computer
that is hosting the data and on the computer that is accessing the data.
ノ Expand table
SP1 installed.
(LDR) Available for
individual
download.
SRV component
ノ Expand table
May/12/2016 3161561 MS16-075 and MS16- This hotfix contains To apply this security
076: Description of the most current update, you must have
the security update version of Windows 7 SP1, or
for Windows srvnet.sys, srv.sys, Windows Server 2008
Netlogon and SMB and srv2.sys. R2 SP1 installed.
Server: June 14, 2016 Available for individual
(LDR) download.
MRXSMB component
ノ Expand table
May/12/2016 3161561 MS16-075 and This security hotfix To apply this security
MS16-076: contains the most hotfix, you must have
Description of the current version of Windows 7 SP1, or
security update for mrxsmb.sys, Windows Server 2008
Windows Netlogon mrxsmb10.sys R2 SP1 installed.
and SMB Server: and mrxsmb20.sys. Available for individual
June 14, 2016 (LDR) download.
RDBSS component
ノ Expand table
ノ Expand table
Jan/02/2015 2928562 Event 55 when you This hotfix To apply this hotfix, you
copy an encrypted contains the most must have Windows Vista
folder to EFS current version of SP 2 Windows Server 2008
shared folder in ntfs.sys. SP2 installed. Available
Windows from Microsoft Update.
SRV component
ノ Expand table
MRXSMB component
ノ Expand table
May/14/2016 3161561 MS16-075 and This security hotfix To apply this security
MS16-076: contains the most hotfix, you must have
Description of the current Version of Windows Vista SP 2 or
security update for mrxsmb .sys, Windows Server 2008
Date added Knowledge Title Why we recommend Hotfix type and
Base article this hotfix availability
RDBSS component
ノ Expand table
More information
Server 2008 R2 Registry keys that have been introduced with hotfixes or security updates:
ノ Expand table
Server 2008 Registry keys that have been introduced with hotfixes or security updates:
ノ Expand table
On the client, applications perform system calls by requesting operations on remote files. These
requests are handled by the redirector subsystem (rdbss.sys) and by the SMB mini-redirector
(mrxsmb.sys), both of which translate the requests into SMB protocol sessions and requests over
TCP/IP. Starting with Windows Vista, the SMB 2.0 protocol is supported. The mrxsmb10.sys driver
handles legacy SMB traffic, and the mrxsmb20.sys driver handles SMB 2.0 traffic.
On the server, SMB connections are accepted, and SMB requests are processed as local file
system operations through NTFS and the local storage stack. The srv.sys driver handles legacy
SMB traffic, and the srv2.sys driver handles SMB 2.0 traffic. The srvnet.sys component implements
the interface between networking and the file server for both SMB protocols. File system
metadata and content can be cached in memory via the system cache in the kernel (ntoskrnl.exe).
The following image provides an overview of the different layers through which a user request on
a client computer must go to perform file operations over the network on a remote SMB file
server by using SMB 2.0.
ノ Expand table
Date Knowledge Title Why we Hotfix type and
added Base article recommend this availability
hotfix
12- 3043762 The process cannot This security update To apply this hotfix, you
Mar- access the file error contains the most must have Windows
2015 when you open files current version of Server 2008 R2 SP1
from NFS server in Nfssvc.exe, and installed. Available for
Windows Server 2008 Nfssvr.sys. individual download.
R2 SP1 Available from Microsoft
(LDR) Update.
29- 2957486 Ls command takes a This hotfix contains To apply this hotfix, you
Aug- long time to list shared the most current must have Windows
2014 files in 2 windows on a version of Server 2008 R2, or
Windows 7 or Rpcxdr.sys. (LDR Windows Server 2008 R2
Windows Server 2008 GDR) SP1 installed. Available for
R2-based NFS server individual download.
ノ Expand table
14-May- 2956990 NFS client can't This hotfix contains To apply this hotfix, you
2014 reconnect to NFS the most current must have Windows 7
server in Windows version of Nfsnp.dll, SP1, or Windows Server
7 SP1 or Windows Nfsclnt.exe, and 2008 R2 SP1 installed.
Server 2008 R2 SP1 Nfsrdr.sys. Available for individual
download.
Apr/03/2015 3042826 POSIX subsystem This hotfix contains To apply this hotfix, you
crashes when you the most current must have Windows 7
try to create a version of Psxdll.dll, SP1, or Windows Server
Telnet session in Psxdllsvr.dll, 2008 R2 SP1 installed.
Windows Psxss.exe, Posix.exe. Available for individual
download.
ノ Expand table
Date added Knowledge Title Why we Hotfix type and
Base article recommend this availability
hotfix
Jan/02/2014 2923150 A memory leak This security update To apply this hotfix,
occurs on an NFS contains the most you must have
share server that is current version of Windows Vista SP2 or
running Windows Nfssvc.exe, Windows Server 2008
Server 2008 Nfssvr.sys, and SP2 installed. Available
Msnfsflt.sys. from Microsoft
Update.
Sep/25/2014 2957486 Ls command takes a This hotfix contains To apply this hotfix,
long time to list the most current you must have
shared files in 2 version of Windows Vista SP2 or
windows on a Rpcxdr.sys. Windows Server 2008
Windows 7 or SP2 installed. Available
Windows Server 2008 from Microsoft
R2-based NFS server Update.
Windows Server 2008 R2 includes both the Server for NFS and Client for NFS components.
However, Windows 7 includes only Client for NFS.
For more information about the step-by-step guide for the services for NFS, see General
information about the step-by-step guide for the services for NFS.
Microsoft Services for NFS provides a file-sharing solution for enterprises that have a mixed
Windows and UNIX environment. This communication model consists of client computers and a
server. Applications on the client request files that are located on the server through the
redirector (Rdbss.sys) and NFS mini-redirector (Nfsrdr.sys). The mini-redirector uses the NFS
protocol to send its request through TCP/IP. The server receives multiple requests from the clients
through TCP/IP and routes the requests to the local file system (Ntfs.sys), which accesses the
storage stack.
References
List of currently available hotfixes for Distributed File System (DFS) technologies in Windows
Server 2008 and in Windows Server 2008 R2 .
An enterprise hotfix rollup is available for Windows 7 SP1 and Windows Server 2008 R2 SP1
List of currently available hotfixes for the File Services technologies in Windows Server 2012
and in Windows Server 2012 R2
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that occurs when you access file shares on a
SMB server that has the Scale-Out File Server role configured.
Symptoms
Consider the following scenario:
You configure the Scale-Out File Server (SOFS) role on a server that's running
Window Server 2012 R2.
You have server applications and clients that access file shares frequently.
The applications and clients open many short-lived sessions in which they connect,
authenticate, change files, and close the session immediately.
In this scenario, after some time, access to the file shares is unsuccessful, and a
STATUS_INSUFF_SERVER_RESOURCES error is recorded in a network capture.
Additionally, when users try to connect to SOFS shares, they receive the following error
message:
You also see a high handle count in Lsass.exe on both the coordinator and non-
coordinator nodes of the cluster.
7 Note
If you failover the disk resource to another node, the issue temporarily does not
occur.
Cause
This issue occurs because the applications create new sessions every time that they
change a file instead of reusing sessions to generate many metadata changes.
The CSV File System uses the SMB protocol to keep metadata information consistent
between the cluster nodes. A high volume of metadata changes generate many SMB
sessions between the non-coordinator and coordinator nodes of the cluster and exhaust
the SMB table on the coordinator node.
Resolution
To fix this issue for these kinds of application workloads, we recommend that you use
the File Server for General Use role instead of SOFS.
7 Note
The SOFS role should not be used if the workload generates an exceptionally high
number of metadata operations, such as opening and creating new files or
renaming existing files.
More information
In a network capture between non-coordinator and coordinator nodes, you see that
after an SMB Session Setup request, the coordinator node responds with a
STATUS_INSUFF_SERVER_RESOURCES error.
Feedback
Was this page helpful? Yes No
This article lists common issues that you might encounter when using File Server
Resource Manager.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2
7 Note
A good troubleshooting option is to look for event logs that have been generated
by File Server Resource Manager. All event log entries for File Server Resource
Manager can be found in the Application event log under the source SRMSVC.
Solution: On the E-mail Notifications tab, in the File Server Resource Manager Options
dialog box, verify that the SMTP server and default e-mail recipients have been specified
and are valid. Send a test e-mail to confirm that the information is correct and that the
SMTP server that is used to send the notifications is working properly. For more
information, see Configure E-Mail Notifications.
Solution: On the Notification Limits tab, in the File Server Resource Manager Options
dialog box, you can set a time limit for each of the notification types: e-mail, event log,
command, and report. Each limit specifies a time period that must pass before another
notification of the same type is generated for the same issue. For more information, see
Configure Notification Limits.
Solution: Run chkdsk on the volume and try generating the reports again.
Solution: On the File Screen Audit tab, in the File Server Resource Manager Options
dialog box, verify that the Record file screening activity in the auditing database check
box is selected.
For more information about recording file screening activity, see Configure File
Screen Audit.
To configure default parameters for the File Screening Audit report, see Configure
Storage Reports.
To edit report parameters for scheduled report tasks or on-demand reports, see
Storage Reports Management.
Solution: Under Quota Management, select Quotas. In the Results pane, select the
quota entry that you're troubleshooting. In the Actions pane, select View Quotas
Affecting Folder, and then look for quotas that are applied to the parent folders. This
will allow you to identify which parent folder quotas have a lower storage limit setting
than the quota you have selected.
Feedback
Was this page helpful? Yes No
This article provides a resolution to an issue that may prevent file shares from being re-
created when you restart the computer.
Symptoms
You use the Microsoft iSCSI Initiator service to connect to an Internet SCSI (iSCSI) disk
device. The file shares that you create for folders that are located on your iSCSI device
may not be re-created when you restart the computer that the shares are created on.
Cause
The issue may occur when the iSCSI Initiator service isn't initialized when the Server
service initializes. The Server service creates file shares. However, because iSCSI disk
devices aren't available, the Server service can't create file shares for iSCSI devices until
the iSCSI service is initialized.
Resolution
1. Make the Server service dependent on the iSCSI Initiator service. For information
about how to do this, see the "Make the Server service dependent on the iSCSI
Initiator service" section.
2. Configure persistent logons to the target. To do this, use one of the following
methods.
7 Note
If you see the target on the Persistent Target tab, the following steps are not
required.
7 Note
a. Select Start > Run, type cmd, and then press Enter.
7 Note
Use this resolution only if you experience this specific issue with version 2.x of the
iSCSI Initiator service.
7 Note
You do not have to modify the registry when you use this method. Therefore, this
method is the preferred way to set the service dependency.
1. Select Start > Run, type cmd, and then press Enter.
If you have administrative access to the server, you can run this command from a
network computer. Type the following command, and then press Enter:
Console
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
4. Type DependOnService in the Value Name box, select REG_MULTI_SZ in the Data
Type box, and then press Enter.
5. In the Multi-String Editor window, type MSiSCSI in the data box, and then select
OK.
More information
You can script the procedures that are described in the "Resolution" section by using the
Sc.exe and Iscsicli.exe utilities. To do this, create a batch file that uses these commands,
and then either run the batch file directly, or run the batch file in another way. For
example, run the batch file by using Group Policy.
Microsoft provides programming examples for illustration only, without warranty either
expressed or implied. This includes, but isn't limited to, the implied warranties of
merchantability or fitness for a particular purpose. This article assumes that you're
familiar with the programming language that is being demonstrated and with the tools
that are used to create and to debug procedures. Microsoft support engineers can help
explain the functionality of a particular procedure. However, they won't modify these
examples to provide added functionality or construct procedures to meet your specific
requirements.
To script the whole operation that is described in the "Resolution" section, create a
batch file that contains the following text:
Console
Console
:Start
dir G: /AH
if %errorlevel% equ 0 goto :OK
ping 127.0.0.1 /n 5
goto :Start
:OK
net stop browser
net stop netlogon
net stop dfs
net stop lanmanserver /y
net start lanmanserver
net start dfs
net start netlogon
net start browser
Feedback
Was this page helpful? Yes No
This article provides help to solve issues that occur when you provision new iSCSI Target
virtual disks through the New iSCSI Target Virtual Disk wizard by using Server Manager
File and Storage Services GUI.
Symptoms
In Windows Server 2012 R2, you can provision new iSCSI Target virtual disks through the
New iSCSI Target Virtual Disk wizard using Server Manager File and Storage Services
GUI. This wizard has the following two incorrect behaviors:
1. The wizard incorrectly blocks any virtual disk size to >= 16TB. Default behavior is
to allow up to 64TB in Windows Server 2012 R2. In this case, the wizard fails with
the following error message:
The size of the iSCSI virtual disk must be between 8MB and 16TB
2. The wizard incorrectly blocks a dynamic virtual disk size to >= free space available
on the hosting volume. Default behavior is to allow virtual disk creation if the initial
dynamic VHDX file (typically a few MB in size) can be successfully created on the
volume. In this case, the wizard fails with the following error message:
The size of the iSCSI virtual disk must be less than or equal to the remaining
free space on the volume
Cause
The GUI behavior corresponds to Windows Server 2012 limits. In Windows Server 2012
R2, support of VHDX as the default storage format for iSCSI virtual disks has increased
the upper limit to 64TB and the newly added support for dynamic VHDX also meant that
the hosting volume is not required to have the capacity for a fully provisioned virtual
disk up front when a dynamic virtual disk is created on this volume. So the GUI behavior
in these cases is erroneous in Windows Server 2012 R2.
Resolution
As of October 2013, there is no GUI resolution to work around these GUI problems.
However, the easy workaround is to use Windows PowerShell instead in these cases, use
the New-iSCSIVirtualDisk cmdlet. The cmdlet documentation is available at New-
IscsiVirtualDisk.
References
iscsi target server in Windows Server 2012 R2
Feedback
Was this page helpful? Yes No
This topic provides the supported and tested Microsoft iSCSI Software Target 3.3 limits.
Summary
The following tables display the tested limits and the enforced limits where applicable.
In addition, the following limits apply:
1. You should not use network adapter teaming with Microsoft iSCSI Software Target
3.3 for iSCSI communication.
2. If you plan to use multiple network adapters for iSCSI communication, you should
separate them into their own subnets, set up virtual IP addresses, and then
implement MPIO.
Basic configuration
ノ Expand table
Initiators that can 16 Enforced When used with MPIO, you can connect no
connect to the same more than 4 sessions per initiator.
iSCSI target
instance
Simultaneous 64 Enforced
sessions
Fault Tolerance
ノ Expand table
Simultaneous 64 Not
connections Enforced
Virtual disks over 64 Not There is an initial delay after creating the disks
MPIO per initiator on Enforced before they appear to the Virtual Disk Service
a stand-alone server and the Disk Management snap-in because
PnP first detects the devices and then MPIO
detects the paths for each disk. This happens
only one time per disk per appliance.
a clustered
application server
Network
ノ Expand table
IPv4 Supported
IPv6 Supported
IPsec Supported
ノ Expand table
From an iSCSI initiator, which converts the iSCSI target disk from a Not Not
fixed disk to a dynamic disk supported enforced
Windows operating systems on which the VDS and VSS hardware providers are
supported
ノ Expand table
All client operating systems (Windows XP, Windows Vista, Windows Not Enforced
7) supported
ノ Expand table
Note: In-place upgrades from Microsoft iSCSI Software Target 3.1 to Microsoft iSCSI
Software Target 3.3 are not supported. To upgrade to Microsoft iSCSI Software Target
3.3, you must first uninstall Microsoft iSCSI Software Target 3.1.
ノ Expand table
ノ Expand table
Windows Storage Server 2008 R2, Windows Storage Server 2008 R2, Supported
stand-alone server failover cluster node
Windows Storage Server 2008 R2, Windows Storage Server 2008 R2, stand- Supported
failover cluster node alone server
Miscellaneous
ノ Expand table
Item Supported
Install Microsoft iSCSI Software Target 3.3 snap-in on Windows XP, Windows Not
Vista, or Windows 7 supported
Install Microsoft iSCSI Software Target 3.3 snap-in on x86 version of Windows Not
Storage Server 2008 supported
Use Microsoft iSCSI Software Target 3.3 snap-in to manage Microsoft iSCSI Supported
Software Target 3.2 target
Use Microsoft iSCSI Software Target 3.2 snap-in to manage Microsoft iSCSI Not
Software Target 3.3 target supported
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where redundant subnets are incorrectly
created in an iSCSI IPv6 network.
Symptoms
You design an iSCSI IPv6 network that contains servers and storage devices. In this
network, some servers use link-local addresses.
In this situation, you encounter an issue in which multiple gateways try to create
separate storage subnets to isolate the traffic. However, the subnets are redundant.
Workaround
To work around this issue, configure the initiator and the target on different subnets.
References
iSCSI Boot Firmware Table (iBFT) as Defined in ACPI 3.0b Specification (download
file)
Windows Hardware Compatibility Program specifications and policies for the iSCSI
industry and Microsoft
Feedback
Was this page helpful? Yes No
Provide product feedback
The Microsoft iSCSI Initiator may fail to
log in to Favorite Targets after the
Initiator Name is changed in Windows
Article • 12/26/2023
This article provides a solution to an issue where the Microsoft iSCSI Initiator fails to log
in to Favorite Targets after the initiator name is changed.
Symptoms
Consider the following scenario. On a system running Windows, you are connecting to
iSCSI-based storage using the Microsoft iSCSI Initiator. In the iSCSI Initiator Properties,
you have configured Favorite Target entries, so that the iSCSI Initiator will automatically
connect to certain iSCSI targets. The iSCSI target(s) you are connecting to uses access
control, and this access control uses the iSCSI Initiator Name (for example, iQN) or
initiator IP address for authentication.
If you change the Initiator Name in the Configuration tab of the iSCSI Initiator
Properties, you may be unable to access certain access-controlled iSCSI targets when
the system is rebooted, or when connectivity to an iSCSI target is lost. By way of
example:
If an iSCSI target is configured to use the new Initiator Name for authentication,
the iSCSI Initiator may fail to log in to the target using Favorite Target entries that
were created while the iSCSI Initiator was configured to use the old Initiator Name.
If an iSCSI target is configured to use the old Initiator Name for authentication, the
iSCSI Initiator may fail to log in to the target using Favorite Target entries that are
created after the Initiator Name is changed. Also, you may no longer be able to
discover the iSCSI target once the Initiator Name is changed.
If the iSCSI target is configured to use the iSCSI initiator's IP address for
authentication, the iSCSI Initiator will be able to log in using Favorite Target entries
that were created both before and after the Initiator Name was changed. However,
for security reasons the iSCSI target may prevent logons from a single IP address
using multiple Initiator Names, and therefore some logon attempts may fail.
Cause
When a Favorite Target entry is created, the iSCSI Initiator sets the Favorite Target entry
to use the Initiator Name that is configured at the time of creation. If the Initiator Name
is later changed, any pre-existing Favorite Target entries are not updated to reflect the
newly configured Initiator Name.
Resolution
When the Initiator Name is changed in the iSCSI Initiator Properties, any pre-existing
Favorite Target entries should be removed and recreated to ensure they use the new
Initiator Name. Also, ensure the Initiator Name always matches the Initiator Name that
the iSCSI target is using for access control.
Feedback
Was this page helpful? Yes No
This article provides workarounds for an issue where you can't install Windows in the
boot LUN from SAN configuration when there are multiple physical paths to the boot
LUN.
Symptoms
Consider the following scenario:
You're installing Windows Server 2008, Windows Server 2008 R2, or Window Server
2012 in a boot from SAN configuration.
There are multiple physical paths to the boot LUN.
The boot LUN is raw and hasn't been initialized by Windows.
In this scenario, when you select the boot LUN in on the "Where do you want to install
Windows?" step of the installation wizard, all paths to the LUN are displayed separately
and a message is displayed:
"Setup was unable to create a new system partition or locate an existing system
partition. See the Setup log files for more information."
Windows Server 2008:
"Windows cannot find a system volume that meets requirements for installation."
Cause
Windows is unable to install to a RAW disk with multiple physical paths. If the boot LUN
is presented on a single physical path or if the boot LUN has already been initialized
prior to installing Windows, Setup will proceed as expected.
1. In the Install Windows dialog box of Windows Setup, under Where do you want to
install Windows?, select Disk 0 and then click the Drive Options (advanced) link.
2. Select New to create a new partition.
3. Click Apply to accept the default partition size.
4. Click OK on the dialog box that explains that additional partitions may be created
automatically by Windows.
5. Now, select Delete to remove the newly created partition while leaving the disk in
its initialized state.
6. Click OK on the warning dialog box to acknowledge that any data on the disk will
be lost.
7. Reboot the system and run Windows Setup normally. Windows Setup will
recognize the disk and Setup will continue.
Feedback
Was this page helpful? Yes No
This article provides help to solve an issue where sequential write performance of disks
decreases by approximately 50% after you enable the Multipath I/O (MPIO) feature on a
system using Serial Attached Storage (SAS) disks.
Symptoms
On a Windows Server 2012, after enabling the MPIO feature on a system using SAS
disks, the sequential write performance of disks used with MPIO decreases by
approximately 50% when operating with the Round Robin load balancing policy.
Cause
This issue can occur when disks are configured as below:
The MPIO feature is enabled to provide access via both SAS ports.
Disk firmware does not provide optimal performance when both SAS ports are in
use.
7 Note
This issue may occur when using Storage Spaces in conjunction with SAS disks and
MPIO.
Resolution
To resolve this issue, obtain updated firmware from your disk vendor.
You can work around this issue by trying a different Load Balance policy using the
appropriate options mentioned below:
Work around when using Storage Spaces or when LB
policies have not been manually set per-disk
Use the Set-MSDSMGlobalDefaultLoadBalancePolicy cmdlet from the MPIO module in
Windows PowerShell to specify a different LB policy to apply to all pool disks.
More information
For a complete listing of the cmdlets contained in the iSCSI module for Windows
PowerShell, refer to the following documents:
iSCSI
Feedback
Was this page helpful? Yes No
This article describes a change in Windows Server 2019, in which MPIO option is no
longer available in Disk Management.
Symptom
After you install the Multipath I/O (MPIO) feature on a server that's running Windows
Server 2019 build 17763, you notice that the MPIO option is not available under Disk
Management > Microsoft Storage Space Device Properties as it was in earlier versions
of Windows.
Workaround
To work around this issue, use a PowerShell cmdlet to configure MPIO. For example:
Reference
For more information, see MPIO.
Feedback
Was this page helpful? Yes No
This article provides solutions to an issue where a volume shows as raw in disk
management but chkdsk shows the file system as NTFS after you extend the partition.
Symptoms
When you extend a volume by using FSExtend, the volume may show as raw in disk
management. However, when you run chkdsk, the file system is shown as NTFS.
Additionally, you see the following error message in the System log:
Cause
The issue occurs because of one of the following reasons:
Resolution
To resolve this issue, use one of the following methods.
Method 1
If there is too little disk space to mount the volume, shrink the NTFS transaction log to 4
MB. Then, the disk will have enough space to mount the volume. To do this, follow these
steps.
1. To shrink the NTFS transaction log to 4 MB, run the following command:
Console
chkdsk d: /l:4096 /f
2. Determine whether you can access the disk. If you can access the disk, you should
free up some free space and then return the NTFS transaction log to the default
value of about 65 MB. To do this, run the following command:
Console
Method 2
Run the following command on the disk to fix any errors on the disk:
Console
chkdsk /f <drive>
After chkdsk is completed successfully, restart the server. Then, run FSExtend on the
drive to extend the file system. To do this, run the following command:
Console
FSExtend <drive>
This should extend the file system on the drive, and the disk should be accessible.
Feedback
Was this page helpful? Yes No
Provide product feedback
Best practices for using dynamic disks
on Windows Server 2003-based
computers
Article • 12/26/2023
This article describes the best practices for using dynamic disks on Windows Server
2003-based computers.
Summary
If you use dynamic disks, you can create fault-tolerant volumes (mirrored volumes and
RAID-5 sets) and large multiple-disk (or logical unit number [LUN]) volumes by using
striped and spanned volumes. These features are available only on dynamic disks.
Dynamic disks are more robust and fault-tolerant in the way they store and replicate
disk and volume configuration information. Dynamic disks are primarily designed to
always be online. For this reason, they aren't available on removable media. Follow the
recommendations in this article to keep your data online and accessible.
More information
After you create a partition on Windows Server 2003, the partition must be formatted
and assigned a drive letter before data can be stored on it. Windows Server 2003
supports two different types of disks for partitions, basic and dynamic disks. On basic
disks, partitions are known as basic volumes. Basic volumes include primary partitions
and logical drives. On dynamic disks, partitions are known as dynamic volumes. Dynamic
volumes include simple, striped, spanned, mirrored, and RAID-5 volumes.
Volumes are an area of storage on a hard disk. A volume is formatted by using a file
system, such as file allocation table (FAT) or NTFS file system, and it has a drive letter
assigned to it. You can view the contents of a volume by clicking its icon in Windows
Explorer or in My Computer. A single hard disk can have multiple volumes, and volumes
can also span multiple disks.
Best practices and limitations of using dynamic
disks
Dynamic disks offer advantages over basic disks. Basic disks use the original MS-DOS-
style master boot record (MBR) partition tables to store primary and logical disk
partitioning information. Dynamic disks use a private region of the disk to maintain a
Logical Disk Manager (LDM) database. The LDM database contains volume types,
offsets, memberships, and drive letters of each volume. The LDM database is also
replicated, so each dynamic disk knows about every other dynamic disk configuration.
This feature makes dynamic disks more reliable and recoverable than basic disks.
Before you use dynamic disks, consider the following recommended best practices and
limitations of using dynamic disks.
7 Note
If you want to increase the size of a hardware RAID-5 disk LUN but don't have to
span the NTFS file system volume across different physical disks (or LUNs), continue
to use basic disks. You can use the DiskPart.exe utility to extend the NTFS volume
after you add new storage capacity to the RAID volume. DiskPart.exe is a text-mode
command interpreter that you can use to manage objects (disks, partitions or
volumes) by using scripts or direct input from a command prompt. For more
information, see Extend a data volume in Windows
Storage devices
If you decide to use dynamic disks and you have both locally attached storage (IDE-
based storage or Small Computer System Interface [SCSI]-based storage) and storage
that is located on a storage area network (SAN), consider the following
recommendations, depending on your situation:
Use dynamic disks on only the SAN storage drives and keep the locally attached
storage as basic disks.
or
Use basic disks on the SAN storage drives and configure the locally attached
storage as dynamic disks. These recommendations are based on the way that the
LDM keeps track of dynamic disks and synchronizes the databases. By following
these recommendations, if you experience an unplanned outage and lose access to
the SAN storage housing the dynamic disks, all dynamic disks drop offline from the
Windows Server 2003-based computer at the same time. Because you have no
dynamic disks attached locally, there are no LDM database synchronization issues
to contend with when the SAN disks eventually come back online. If you have even
one dynamic disk on the locally attached storage, you run the risk of the LDM
databases being mismatched, and you may have trouble getting one or more
SAN-attached dynamic disks back online.
If your environment requires you to have dynamic disks in a mixed configuration that
uses both locally attached storage and SAN-attached storage, it's a good idea to protect
all fiber hubs, routers, switches, SAN cabinets, and the server from power outages by
using uninterruptible power supplies (UPSs) on all connecting devices.
7 Note
In a mixed dynamic disk configuration, if you must take the SAN storage
offline for maintenance, Microsoft recommends that you shut down the server
before you take the SAN storage unit offline and then make sure that all the
SAN devices are available again when you bring the server back online.
Windows does not support mounting a disk volume to multiple hosts at the
same time. This restriction applies to volumes that are located on a BASIC disk
or a dynamic disk. Volume corruption may occur if changes are made to the
volume by both hosts. Windows also does not support exposing and then
importing dynamic disks on multiple hosts (nodes) simultaneously. This
practice can also lead to data loss or to LDM database corruption.
Server clusters
Dynamic disks aren't supported for use with Windows Clustering. This restriction doesn't
prevent you from extending an NTFS volume that is contained on a cluster shared disk
(a disk that is shared between the computers in the cluster) that is basic.
You can use a third-party software such as Veritas Volume Manager to add the dynamic
disk features to a Microsoft cluster infrastructure.
7 Note
By default, Windows 2000 Server and Windows Server 2003 don't support dynamic
disks in a Microsoft Cluster Server (MSCS) environment. You can use Veritas Volume
Manager for Windows to add the dynamic disk features to a Microsoft server
cluster. For customer service support about cluster issues after you install Veritas
Volume Manager, please contact Veritas.
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft doesn't guarantee the
accuracy of this third-party contact information.
Disk signatures
When you start the Disk Management snap-in, all disks on the system are enumerated
to see if any disks have changed or if any new disks have been added to the system. If
Disk Management finds any disks that are unknown, that aren't initialized, or that don't
have a disk signature in the MBR, Disk Management starts a wizard. The wizard prompts
you to select the disks that you want to write disk signatures to. By default, no disks are
selected. Select the check boxes next to the disk numbers to select the disks to be
enumerated. You're then prompted to select the disks that you want to upgrade to
dynamic disks. All disks that you upgrade have a disk signature added and are upgraded
to dynamic disks.
When you start Disk Management, if the MBR of a dynamic disk is zeros, the wizard
starts.
7 Note
The wizard prompts you to convert the disk to a dynamic disk. If you permit the disk to
be reconverted to dynamic, the original LDM database is overwritten by the newly
initialized LDM database. Disk Management shows that disk as healthy, but it only
shows the unallocated free space. If you have another healthy dynamic disk in the
system at the time of conversion, its LDM database is replicated to the newly converted
dynamic disk and a "missing" disk that represents the original dynamic disk is also
shown in Disk Management.
7 Note
Windows software mirroring is a fault-tolerant solution that makes sure you can
maintain access to data if you have a hardware disk failure. Software mirroring is
not intended to be used as an offline backup mechanism.
Hardware Mirroring
If you use dynamic disks with hardware mirroring, make sure that both parts of the
hardware-mirrored drives aren't exposed to the same operating system at the same
time. On hardware-mirrored disks, the LDM databases are exactly the same, but each
dynamic disk on a system contains a unique DiskID in the LDM header so that LDM can
distinguish one dynamic disk from another.
To expose both parts of a hardware-mirrored drive, break the hardware mirror by using
the OEM RAID configuration utility, and then configure both disks as standalone drives
that are both accessible to the operating system.
Unpredictable behavior may occur if two dynamic disks that are exactly the same are
exposed to the operating system at the same time.
References
For more information, see How to use the Disk Management Snap-in to manage Basic
and Dynamic Disks in Windows Server 2003
The third-party products that are discussed in this article are manufactured by
companies that are independent of Microsoft. Microsoft makes no warranty, implied or
otherwise, regarding the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
Provide product feedback
Unable to access ClusterStorage folder
on a passive node in a server cluster
Article • 12/26/2023
This article describes an issue where you can't access a CSV volume from a passive (non-
coordinator) node and receive event ID 5120 or 5142.
Symptoms
On a Windows Server cluster with Cluster Shared Volume(CSV) feature enabled, a user
may be unable to access a CSV volume from a passive (non-coordinator) node. When
clicking on a CSV volume, explorer may hang. One or all of the following events may be
displayed:
Cause
When accessing a CSV volume from a passive (non-coordinator) node, the disk I/O to
the owning (coordinator) node is routed through a 'preferred' network adapter and
requires SMB be enabled on that network adapter. For SMB connections to work on
these network adapters, the following protocols must be enabled:
Resolution
Review each cluster node and verify the following protocols are enabled the network
adapters available for Cluster use:
1. Click Start, click Run, type ncpa.cpl, and then click OK.
2. Right-click the local area connection that is associated with the network adapter,
and then click Properties.
3. Verify that the above protocols appear in the This connection uses the following
items box. If either is missing, follow these steps:
a. Click Install, click Client, and then click Add.
b. Select the missing protocol, click OK, and then click Yes.
4. Verify that the check box that appears next to Client for Microsoft Networks is
selected.
More information
The Event ID 5120 mentioned above will be logged anytime that there's a problem
connecting over the network using SMB to the owning node. If the connection is
restored within a few minutes, then there may be no ill effects other than slowness of
the VMs because of lack of I/O completing.
The meaning of the event codes listed above are as follows:
The Event ID 5142 indicates that the non-owning node is disconnected and CSV is no
longer queuing the I/O. As a result, the VMs on the node logging the errors will see the
storage as disconnected instead of slow in responding.
The preferred network is the network with the lowest cluster network metric value. If the
preferred network is unavailable (due to problems or reconfiguration), then the cluster
network fault tolerance will cause the network with the next lowest metric to be used. If
that network isn't configured to allow SMB connection, then the above error will be
encountered.
The recommendation is for any network that the cluster might use (any network not
disabled for cluster use) should be configured as shown above to allow CSV use.
Reference Articles:
Hyper-V: Using Live Migration with Cluster Shared Volumes in Windows Server 2008 R2
Feedback
Was this page helpful? Yes No
This article provides solutions to an issue where you fail to select or format a hard disk
partition when you try to install Windows.
7 Note
Support for Windows Vista without any service packs installed ended on April 13,
2010. To continue receiving security updates for Windows, make sure you're
running Windows Vista with Service Pack 2 (SP2). For more information, see
Support is ending for some versions of Windows .
) Important
They are not supported for Windows Vista Home Basic, Windows Vista Home
Premium, Windows 7 Home Basic, Windows 7 Starter, and Windows 7 Home
Premium.
There is one exception. When you upgrade your computer from Windows XP
Media Center Edition to Windows Vista Home Premium, some dynamic discs are
handled and supported.
Symptoms
When you try to install Windows Vista, Windows 7 or Windows Server 2008 R2, you may
experience one or more of the following symptoms:
The hard disk on which you want to install Windows Vista, Windows 7, or Windows
Server 2008 R2is not listed.
You cannot select a hard disk partition on which to install Windows Vista, Windows
7, or Windows Server 2008 R2.
You cannot set the correct size for a hard disk partition.
Windows is unable to find a system volume that meets its criteria for
installation
Cause
This problem may occur for one of the following reasons:
1. For a dynamic disk that has a simple volume, use the Diskpart.exe utility to
configure the disk as an active disk. For more information about how to use the
Diskpart.exe utility, see DiskPart Command-Line Options.
2. For a FAT32 partition, reformat the partition, or convert the partition to an NTFS file
system partition by using the Convert.exe command.
7 Note
When you format a partition, all data is removed from the partition. This data
includes all the files on the partition.
7 Note
Windows Setup provides a feature to migrate current drivers to the new operating
system. Therefore, Windows Setup may use the drivers that are currently installed
on the computer. If the computer does not have the latest drivers installed, the
Setup program may use the outdated drivers. In this case, you may experience
compatibility problems.
Windows is unable to find a system volume that meets its criteria for installation
7 Note
3. Change the directory to locate the Setupact.log file, and then open the
Setupact.log file.
5. In the DumpDiskInformation section, locate the log entry that resembles the
following.
6. If this log entry appears after an entry that resembles the following, the hard disk
may not be configured to use a Windows-based operating system.
Unknown
In this case, use the Diskpart.exe utility to configure a different partition as active.
7 Note
7 Note
Use this method only if you want to perform a clean installation of Windows. When
you clean the hard disk, it is formatted. All partitions and all data on the hard disk
are permanently removed. We strongly recommend that you back up the files on
the hard disk before you clean the disk.
To use the Diskpart.exe utility to clean the hard disk, follow these steps:
Feedback
Was this page helpful? Yes No
This article works around a startup failure when you use a USB flash drive that's
formatted to use the FAT32 file system.
Symptoms
You format a USB flash drive to use the FAT32 file system. When you try to start the
computer from this USB flash drive, the startup process stops responding, and the
screen is black.
Cause
This issue occurs because the USB flash drive is listed as removable media. Therefore,
the Windows operating system doesn't create a master boot record (MBR) on the USB
flash drive when you format the flash drive to use the FAT32 file system. The USB flash
drive is treated as a super floppy disk. The FAT32 startup code doesn't support starting a
computer from a super floppy disk without an MBR.
The BIOS tries to transfer the control of the startup from the USB flash drive to the
FAT32 startup code. However, the FAT32 startup code doesn't support this scenario.
Workaround
To work around this issue, use the Diskpart command prompt utility to create and
format the boot partition on the USB flash drive.
For more information about how to use Diskpart , see DiskPart Command-Line Options.
FAT16: MSDOS5.0
FAT32: MSDOS5.0
NTFS: NTFS
FAT32
FAT16
NTFS
If the strings contain FAT32, FAT16, or NTFS, the boot sector was formatted in that
particular file system format.
Feedback
Was this page helpful? Yes No
This article describes an issue where an error occurs when you use the DiskPart break
command to break a mirrored set.
Symptoms
When you use the DiskPart text-mode command interpreter (Diskpart.exe) and you
select a mirrored volume and then use the break command to break the mirrored
volume in two volumes, you may receive one of the following error messages:
The arguments you specified for this command are not valid.
-or-
Cause
This behavior may occur if one of the two disks that contain the mirrors is missing and
you're using incorrect syntax for the break command.
Resolution
To resolve this behavior, use the disk parameter to refer to the missing disk, and use the
nokeep parameter.
Without the nokeep parameter, the break command tries to convert both mirrors to
simple volumes, retaining the data. If one of the disks is missing, this isn't possible. By
using the nokeep parameter, you retain only one half of the mirror as a simple volume,
and the other half is deleted and converted to free space. Neither volume receives the
focus.
For example, select the mirrored volume, issue the "detail volume" command, then
break the mirror as follows:
Console
In this example, the correct command to break the mirrored volume is:
Diskpart> break disk=m0 nokeep
After you issue this command, the mirror on Disk 1 is converted to a simple volume, and
the reference to the missing mirror is deleted from the Logical Disk Management (LDM)
database.
Status
This behavior is by design.
More information
For additional information about using DiskPart to manage disks, click the following
article number to view the article in the Microsoft Knowledge Base:
Feedback
Was this page helpful? Yes No
This article describes how to configure a Low Disk Space Alert by using the Performance
Logs and Alerts Feature.
Summary
This step-by-step article describes how to create and configure a low-disk-space alert by
using the Performance Logs and Alerts feature in Microsoft Windows Server 2003.
4. In the New Alert Settings box, type a name for the new alert (for example, Free disk
space), and then click OK.
The AlertName dialog box appears, in which you configure settings for the alert
that you created.
5. Click the General tab, and then in the Comment box, type Monitors free disk space
on logical drive.
2. Click Select counters from computer, and then select your computer in the list.
3. In the Performance object box, click LogicalDisk.
4. Click Select counters from list, and then click % Free Space.
5. Click Select interfaces from list, and then click the logical drive or volume that you
want to monitor.
7. In the Alert when the value is box, click Under, and then type the value that you
want in the Limit box. For example, to trigger an alert message when disk space is
under 1 megabyte (MB), type 1000.
8. Accept the default value of 5 seconds in the Sample data interval, or specify the
value that you want.
9. Click Apply.
10. Click the Action tab, and then specify the action or actions that you want to
perform when an alert occurs, as follows:
If you want the Performance Logs and Alerts service to create an entry in the
application log of event viewer when an alert occurs, click to select the Log
an entry in the application event log check box.
If you want the Performance Logs and Alerts service to trigger the Messenger
service to send a message, click to select the Send a network message to
check box, and then type the IP address or name of the computer on which
the alert should be displayed.
To run a counter log when an alert occurs, click to select the Start
performance data log check box, and then specify the counter log that you
want to run.
To run a command or program when an alert occurs, click to select the Run
this program check box, and then type the file path and name of the
program or command that you want to run. Or, click Browse to locate the file.
When an alert occurs, the service creates a process and runs the specified
command file. The service also copies any command-line arguments that you
define to the command line that is used to run the file. Click Command Line
Arguments , and then click to select the appropriate check boxes to include the
Click Manually if you want to manually start the scan. After you select this
option, right-click the alert in the right pane, and then click Start to start
the scan.
Click At to start the scan at a specific time and date, and then specify the
time and date that you want.
Click Manually if you want to manually stop the scan. After you click this
option, right-click the alert in the right pane, and then click Stop to stop
the scan.
Click After to stop the scan after a specified duration, and then specify the
time interval that you want.
Click At to stop the scan at a specific time and date, and then specify the
time and date that you want.
c. If you want to start a new scan after the alert scan is complete, click After, and
then click to select the Start a new scan check box.
Troubleshooting
After you complete the procedures in this article, monitoring starts at its scheduled time
and sends alert messages when the threshold is reached or passed. However, the alert
does not automatically restart each time after you restart the computer. To force the
alert to automatically restart after you restart the computer, or after you log off and log
on, follow these steps:
Feedback
Was this page helpful? Yes No
Summary
The Disk Defragmenter tool is based on the full retail version of Diskeeper by Diskeeper
Corporation. The version that is included with Windows provides limited functionality in
maintaining disk performance by defragmenting volumes that use the FAT, the FAT32, or
the NTFS file system.
More information
This version has the following limitations:
The third-party products that are discussed in this article are manufactured by
companies that are independent of Microsoft. Microsoft makes no warranty, implied or
otherwise, regarding the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article describes how you can use the Distributed Link Tracking services in Windows
to track the creation and movement of linked files across NTFS-formatted volumes and
servers.
Distributed Link Tracking consists of a client service and a server service. The Distributed
Link Tracking Server service runs exclusively on Windows Server-based domain
controllers. It stores information in Active Directory, and it provides services to help the
Distributed Link Tracking Client service. The Distributed Link Tracking Client service runs
on all Windows 2000-based and Microsoft Windows XP-based computers, including
those in workgroup environments or those that are not in a workgroup. It provides the
sole interaction with Distributed Link Tracking servers.
Distributed Link Tracking clients occasionally provide the Distributed Link Tracking
Server service with information about file links, which the Distributed Link Tracking
Server service stores in Active Directory. Distributed Link Tracking clients also may query
the Distributed Link Tracking Server service for that information when a shell shortcut or
an OLE link cannot be resolved. Distributed Link Tracking clients prompt the Distributed
Link Tracking server to update links every 30 days. The Distributed Link Tracking Server
service scavenges objects that have not been updated in 90 days
When a file that is referenced by a link is moved to another volume (on the same
computer or on a different computer), the Distributed Link Tracking client notifies the
Distributed Link Tracking server, which creates a linkTrackOMTEntry object in Active
Directory. A linkTrackVolEntry object is created in Active Directory for every NTFS volume
in the domain.
7 Note
In Windows Server 2008 and newer, the Distributed Link Tracking Server Service is
not included in Windows anymore. So you can safely remove the objects from
Active Directory.
Distributed Link Tracking objects exist in the following two tables under the
CN=FileLinks,CN=System folder:
This object stores information about linked files that have been moved in the domain.
This object stores information about each NTFS volume in the domain.
Distributed Link Tracking objects consume little space individually, but they can
consume large amounts of space in Active Directory when they are allowed to
accumulate over time.
If you disable Distributed Link Tracking and delete the Distributed Link Tracking objects
from Active Directory, the following behavior may occur:
Active Directory database size may be reduced (this behavior occurs after the
objects have been tombstoned and garbage collected, and after you perform an
offline defragmentation procedure).
Replication traffic between domain controllers may be reduced.
Distributed Link Tracking Server service
defaults on Windows Server-based domain
controllers
In Windows 2000, Windows XP, and Windows Server 2003, the start value for the
Distributed Link Tracking Client service is set to Automatic. On Windows 2000-based
servers, the Distributed Link Tracking Server service starts manually, by default. However,
if you use Dcpromo.exe to promote a server to a domain, the Distributed Link Tracking
Server service is configured to start automatically.
For Windows Server 2003-based servers, the Distributed Link Tracking Server service is
disabled by default. When you use Dcpromo.exe to promote a server to a domain, the
Distributed Link Tracking Server service is not configured to start automatically. When a
Windows 2000-based domain controller is upgraded to Windows Server 2003, the
Distributed Link Tracking Server service is also disabled during the upgrade. If you are an
administrator and you want to use the Distributed Link Tracking Server service, you must
either use Group Policy or you must manually set the service to start automatically. In
addition, the Distributed Link Tracking Client service on computers that are running
Windows Server 2003 or Windows XP SP1 does not try to use the Distributed Link
Tracking Server service by default. If you want to configure those computers to take
advantage of the Distributed Link Tracking Server service, enable the Allow Distributed
Link Tracking clients to use domain resources policy setting. To do so, open the
Computer Configuration/Administrative Templates/System node in Group Policy.
1. Turn off the Distributed Link Tracking Server service on all domain controllers (this
is the default configuration on all Windows Server 2003-based servers).
Because of replication overhead and the space that FileLinks tables uses in Active
Directory, Microsoft recommends that you turn off the Distributed Link Tracking
Server service on Active Directory domain controllers. To stop the service, use any
of the following methods:
Define the policy settings on an organizational unit that hosts all Windows
2000 domain controllers.
Restart the domain controllers after the policy has replicated so that the policy will
be applied. If you do not restart the domain controllers, you will have to manually
stop the service on each domain controller.
2. Delete Distributed Link Tracking objects from Active Directory domain controllers.
See the "How to Delete Distributed Link Tracking Object" section of this article for
more information about how to delete Distributed Link Tracking objects. It is
recommended that you delete objects after you disable the Distributed Link
Tracking Server service.
7 Note
The Directory Information Tree (DIT) size on domain controllers is not reduced
until the following actions are completed.
7 Note
Deleted objects are stored in the Deleted Objects container until the
tombstone lifetime expires. The default value for a tombstone lifetime is 60
days. The minimum value is two days. By default, the value is 180 days for
new forests that are installed together with Windows Server 2003 Service
Pack 1 or a later version of Windows Server 2003.
When you run the Dltpurge.vbs VBScript, all Active Directory objects that are used by
the Distributed Link Tracking Server service are deleted from the domain where the
script is run. You must run the script on one domain controller for each domain in a
forest. To run Dltpurge.vbs:
2. Stop the Distributed Link Tracking Server service on all domain controllers in the
domain that is being targeted by Dltpurge.vbs.
Console
-s is the DNS host name of the domain controller on which you want to
delete Distributed Link Tracking objects.
-d is the distinguished name path of the domain on which you want to delete
Distributed Link Tracking objects.
5. Perform an offline defragmentation procedure of the Ntds.dit file after the objects
have been tombstoned and garbage collected. For more information about the
garbage collection process, click the following article number to view the article in
the Microsoft Knowledge Base:
Trey Research, a fictitious Fortune 500 customer with over 40,000 employees worldwide
deploys a single Active Directory forest that consists of an empty root domain with child
domains that map major geographic regions of the world (North America, Asia, Europe,
and so on). The largest domain in the forest contains about 35,000 user accounts and
the same number of computer accounts.
The Ntds.dit files were placed on 18-gigabyte (GB) raid arrays. Since the initial
deployment of Windows 2000, the global catalog files have grown to 17 GB.
Trey Research wants to deploy Windows Server 2003 within the next 10 days but needs
at least 1.5 GB of available disk space on the database partition before they initiate the
upgrade. They need this much disk space because Adprep.exe is known to add three to
five inherited aces depending on the hotfixes and service packs that have been
previously installed. The following conditions contribute to the large global catalog size
or the lack of disk space:
Condition 1: Trey Research was an early adopter of Windows 2000 and the largest
drives that they received from their preferred hardware vendor were 9 GB or 18 GB
when they were configured in a raid array. Current drives are double the size for
half the cost.
Condition 1: Trey Research decided not to deploy new drives because of the cost
and the time it would take to do so. Also, they only needed the disk space
temporarily because they expected the Active Directory Database to shrink after
they upgraded to Windows Server 2003 and the Single Instance Store (SIS) process
was completed (SIS implements a more efficient storage of permissions in Active
Directory databases).
Conditions 2 and 3: Trey Research decided that these conditions were the best
practices; however, even if Trey Research implemented them, they would not
achieve the needed results. They decided to enable DNS scavenging because it is
easily implemented.
Condition 4: Trey Research realized that if they redefined security descriptors and
system access control lists (SACLs), they would achieve the results they are looking
for, but they decided that this procedure would be time consuming to implement
until they could thoroughly test the size reduction, replication overhead and, most
importantly, program/administration compatibility in the lab scenario that mirrors
the production environment.
Because Trey Research has deployed Windows 2000 SP2 and a few hotfixes, they
expected that the incremental inherited aces that were added by Adprep (to
objects in the domain NC) could be as small as 300 megabytes (MBs). They could
verify this behavior in a lab environment that is used to test upgrades of the
production forest.
Condition 6: Trey Research agreed that the obvious course of action would be to
perform a simple bulk deletion of all of the Distributed Link Tracking objects from
the CN=FileLinks,CN=System,DC= domain name container on a domain controller
in each domain in the forest. However, they realized that if they did so, additional
disk space would not be freed up until the objects had been tombstoned and
garbage collected, and until they completed an offline defragmentation procedure
on each domain controller in that domain. While the tombstone lifetime value can
be set to values as low as two days, several domain controllers in the Trey Research
forest were offline as they awaited hardware and software updates. If objects are
tombstoned before end-to-end replication can take place, deleted objects may be
reanimated or inconsistent data may be reported among global catalog servers in
the forest. To provide immediate relief, Trey Research performed the following
procedure:
1. They removed the default security descriptor for Distributed Link Tracking schema
class objects and replaced it with a single security principal (user account).
2. They wrote a VBScript program that removed all of the existing security
descriptors, and then replaced them with an explicit ace for a single security
principal.
3. They deleted Distributed Link Tracking objects in 10,000-unit increments with a
three-hour delay between each object deletion.
4. They performed an offline defragmentation procedure on each domain controller
in the domain after all Distributed Link Tracking objects were deleted. When Trey
Research removed the descriptor and performed the defragmentation procedure,
the database recovered about 1.5 GB of disk space on all domain controllers in the
domain. This amount of space was enough to comfortably run the Adprep tool and
upgrade all Windows 2000-based domain controllers and global catalogs to
Windows Server 2003.
After Trey Research upgraded the operating system to Windows Server 2003, more disk
space was freed when the single instance store feature in Windows Server 2003 reduced
database size to about 8 GB (you must perform an offline defragmentation procedure to
get these results). More space was recovered after the TSL interval expired, Distributed
Link Tracking objects were garbage collected, and they performed an offline
defragmentation procedure.
Trey Research promoted a new replica Windows 2000-based domain controller into the
domain and placed the computer account in a different organizational unit than they
typically used. In two days, around 8,000 Distributed Link Tracking objects were present
on the Windows 2000-based domain controller. Trey Research either stopped
Distributed Link Tracking or created a policy to stop the service, and then linked the
policy to organizational units that host Windows 2000-based domain controllers. Finally,
Trey Research used Dltpurge.vbs to mark the remaining Distributed Link Tracking objects
for deletion.
Anatomy of DLT object deletion
DLT objects themselves contain few attributes and use little space in Active Directory.
When an object is marked for deletion (tombstoned), all the unnecessary attributes are
stripped away, except for those necessary to track the object until it is purged from
Active Directory.
In the case of the link-tracking objects, marking the object for deletion only amounts to
two attributes being removed: dscorepropagationdata and objectcategory. The deletion
of the two attributes results in an initial savings of 34 bytes. However, the process of
marking the link-tracking object for deletion also updates the object by adding an
IS_DELETED attribute (4 bytes), and by mangling the RDN and the "common name"
attributes, causing each of those attributes to grow by about 80 bytes. In addition, the
"replication metadata" attribute also grows by about 50 bytes to reflect the updates
performed on this object. So, by marking a link-tracking object for deletion, the object
will end up growing by approximately 200 bytes. The NTDS.DIT will not exhibit a
reduction in size until the deleted objects have tombstoned, been garbage collected
and an offline defragmentation performed.
7 Note
If the service is turned off as this article recommends, the autocleanup does not
occur.
1. Copy all of the text between the <Start Copy Here> tag and the <End Copy Here>
tag in this article, and then paste the text to a ASCII text editor file (for example, a
Microsoft Notepad file).
2. Save the file as "Dltpurge.vbs". 3 Complete the procedure that is described in How
to delete Distributed Link Tracking objects
Option Explicit
'
' Globals, also local to main.
'
Dim oProvider
Dim oTarget
Dim sServer
Dim sDomain
Dim bTest
Dim BatchSize
Dim BatchDelayMinutes
'
' Set defaults
'
BatchSize = 1000
BatchDelayMinutes = 15
bTest = False
'===========================================================================
===
'
' ProcessArgs
'
' Parse the command-line arguments. Results are set in global variables
' (oProvider, oTarget, sServer, sDomain, BatchSize, and
BatchDelayMinutes).
'
'===========================================================================
===
public function ProcessArgs
Dim iCount
Dim oArgs
'
' Get the command-line arguments
'
'
' We have command-line arguments. Loop through them.
'
iCount = 0
ProcessArgs = 0
'
' Server name argument
'
case "-s"
sServer = oArgs.Item(iCount+1)
if Len(sServer) > 0 then sServer = sServer & "/"
iCount = iCount + 2
'
' Enable testing option
'
case "-t"
iCount = iCount + 1
bTest = True
'
' Domain name option
'
case "-d"
sDomain = oArgs.Item(iCount+1)
iCount = iCount + 2
'
' Batching option (batch size, batch delay)
'
case "-b"
Err.Clear
iCount = iCount + 3
'
' Help option
'
case "-?"
Syntax
ProcessArgs = -1
exit do
'
' Invalid argument
'
case else
' Display the syntax and return an error
end select
loop
else
'
' There were no command-line arguments, display the syntax
' and return an error.
'
Syntax
ProcessArgs = -1
end if
'===========================================================================
===
'
' Syntax
'
' Show the command-line syntax
'
'===========================================================================
===
'===========================================================================
===
'
' PurgeContainer
'
' Delete all objects of the specified class in the specified container.
' This subroutine is called once for the volume table and once for
' the object move table.
'
'===========================================================================
===
dim oChild
dim iBatch
dim iTotal
iTotal = 0
iBatch = 0
'
' Is this a DLT object?
'
'
' Yes, this is a DLT object, it may be deleted
'
iTotal = iTotal + 1
iBatch = iBatch + 1
'
' Delete the object
'
if bTest then
wscript.echo "Object that would be deleted: " &
oChild.adspath
else
oParent.Delete oChild.Class, oChild.Name
end if
'
' If this is the end of a batch, delay to let replication
' catch up.
'
iBatch = 0
end if
else
end if
oChild = NULL
Next
'===========================================================================
===
'
' Main
'
'===========================================================================
===
'
' Explain what's about to happen
'
'
' When running in cscript, pause to give an opportunity to break out
' (These 3 lines are for cscript and ignored by wscript.)
'
wscript.stdout.writeline ""
wscript.stdout.writeline "Press Enter to continue ..."
wscript.stdin.readline
'
' Get an ADSI object
'
'
' Purge the System/FileLinks/ObjectMoveTable
'
'
' Purge the System/FileLinks/VolumeTable
'
oProvider = NULL
<END Copy Here>
Feedback
Was this page helpful? Yes No
This article describes how to successfully set up dynamic boot partition mirroring on
GUID Partition Table (GPT) disks.
Summary
Unlike Master Boot Record (MBR) mirrors in 32-bit Windows, there are more steps to
successfully create and boot to mirrored boot volumes on GPT disks. This article also
describes how to recover after a primary disk failure if the shadow disk did not already
have an EFI partition established. The disk must have an EFI partition to boot.
You must have the built-in Diskpart.exe and Bootcfg.exe utilities to create bootable
mirror volumes on GPT disks. You can do some of these steps with the Disk
Management console, but others you can do only with the built-in Diskpart.exe utility.
For consistency and ease of use, this article uses the Diskpart.exe utility to perform the
steps. For help with any Diskpart.exe commands, start Diskmgmt.msc, and then open
the help topics on the Help menu.
The steps are performed with real examples. The steps show the expected results
returned from each command. Disk 0 is the primary system and boot drive. Disk 1 is the
shadow drive.
2. Select the disk that you want to be the shadow drive, and then convert the drive to
GPT. In this example, disk 1 is used for the mirror (shadow) drive.
7 Note
The disk that you select must not contain any data partitions and must
be a raw basic disk with only unallocated space of equal or greater
capacity than the primary system disk.
The following are the commands that you type at the command prompt.
Partition 1 Reserved 32 MB 17 KB
7 Note
If you show more than one partition at this point, you have either
selected the wrong drive, or you did not start with a raw drive. Correct
this before you continue, or data loss may occur.
3. Select partition 1 on disk 1, then delete it - you must use the override command to
delete the Microsoft Reserved (MSR) partition. You will re-create a new MSR
partition after you create the required EFI partition.
4. Select disk-0, and then list the partitions on disk-0. With the output of the list
command, create new EFI and MSR partitions on disk 1 that are the same sizes as
those on disk 0.
5. Select the EFI partition on the shadow drive, and then assign a letter to the EFI
partition so it can be formatted. In this example, the drive letter S is assigned to
the shadow EFI partition. You can use any available drive letter for this step.
6. Open a new command prompt, and then use the format utility to format the EFI
partition (S:) with the FAT file system. You must do this so that you can copy the
system files from the primary EFI partition to this new EFI partition. Do not format
with NTFS. The system cannot boot from an EFI partition unless it is formatted with
the FAT file system.
7. Press ALT+TAB to return to the diskpart command window. Select the EFI partition
on the primary drive (disk-0), and then assign a drive letter to that EFI partition. In
this example, the drive letter P is assigned to the primary EFI partition on disk-0.
You can use any available drive letter for this step.
8. Press ALT+TAB again to return to the other command prompt. Use the xcopy
command to copy the system files from the primary EFI partition (P:) to the
Shadow EFI partition (S:). You must do this to make sure that the shadow drive can
boot the system if disk-0 fails. Make sure that you use the correct drive letters if
you used different letters for your EFI partitions.
p:\EFI\Microsoft\WINNT50\Boot0003
p:\EFI\Microsoft\WINNT50\ia64ldr.efi
p:\EFI\Microsoft\EFIDrivers\fpswa.efi
p:\MSUtil\diskpart.efi
p:\MSUtil\fdisk.efi
p:\MSUtil\format.efi
p:\MSUtil\nvrboot.efi
7 File(s) copied
9. Remove the drive letters assigned to both EFI partitions. This step is optional,
because after a reboot they will not be re-assigned.
DISKPART> Remove
1. With Diskpart.exe, select the disk that you want to convert to dynamic, and then
convert it to dynamic. Perform this on both the shadow and primary GPT disks.
Start with the shadow disk.
DISKPART> Exit
Leaving Diskpart...
2. Shut down and restart your computer to complete the conversion of the system
drive (disk-0) to dynamic. This may require two reboots.
1. With Diskpart.exe, select the boot volume (C:), and then mirror the volume to the
shadow disk (disk-1).
2. Wait for the volume synchronization to complete, and then quit Diskpart.
1. At a command prompt, run the Bootcfg.exe utility to display the current boot
entries. You have one boot entry for the main operating system (boot entry id:1),
and one boot entry for the Mirror (shadow) drive (boot entry id:5).
C:> bootcfg
Boot Options
Timeout: 30
Default:
\Device\HarddiskDmVolumes\PhysicalDmVolumes\BlockVolume1\WIND
O
CurrentBootEntryID: 5
Boot Entries
2. Before you can add the new entries for the EFI partition and boot partition on the
shadow drive to NVRAM, you have to list the existing partitions on disk-0 so that
you can extract partition GUID information about the current EFI partition. Use the
bootcfg /list command against disk-0 to display all the partitions:
Partition No: 2
Partition Style: GPT
Starting offset: 213,857,280
Partition length: 5,142,056,960
Partition GUID: {68d298c0-1b6a-01c1-f1b3-12714f758821}
GUID type: {af9b60a0-1431-4f62-bc68-3311714a69ad}
Partition name: LDM data partition
Partition No: 3
Partition Style: GPT
Starting offset: 9,153,031,680
Partition length: 1,048,576
Partition GUID: {73e47280-0d38-11d7-b47f-806e6f6e6963}
GUID type: {5808c8aa-7e8f-42e0-85d2-e1e90434cfb3}
Partition name: LDM metadata partition
Partition No: 4
Partition Style: GPT
Starting offset: 9,154,080,256
Partition length: 32,505,856
Partition GUID: {1ca4672d-a37c-4e12-bacb-c5ae97924965}
GUID type: {e3c9e316-0b5c-4db8-817d-f92df00215ae}
Partition name: Microsoft reserved partition
3. Use the bootcfg /list command against disk-1 to display all of its partitions:
Partition No: 2
Partition Style: GPT
Starting offset: 213,926,912
Partition length: 1,048,576
Partition GUID: {b72d10f6-e94e-4a4d-bb8e-4da985cc1679}
GUID type: {5808c8aa-7e8f-42e0-85d2-e1e90434cfb3}
Partition name: LDM metadata partition
Partition No: 3
Partition Style: GPT
Starting offset: 214,975,488
Partition length: 32,505,856
Partition GUID: {824858f3-b8d5-4b4d-a3c7-18aac4442b7e}
GUID type: {e3c9e316-0b5c-4db8-817d-f92df00215ae}
Partition name: Microsoft reserved partition
Partition No: 4
Partition Style: GPT
Starting offset: 247,481,344
Partition length: 5,142,056,960
Partition GUID: {f3d11286-2582-4d76-889c-b82c346be44e}
GUID type: {af9b60a0-1431-4f62-bc68-3311714a69ad}
Partition name: LDM data partition
4. Now you have the SOURCE and TARGET EFI GUID values that you have to clone the
boot entries in NVRAM. The new entries use the new EFI partition GUID on the
shadow drive to boot the system if disk-0 fails in any way. Use the bootcfg /clone
command to add new NVRAM boot entries with your source and target GUID
values recorded in steps 2 and 3.
C:>bootcfg /clone /sg {68d298c0-1b6a-01c1-507b-9e5f8078f531} /tg
{476688c5-8ebf-47d2-80e7-cf9d06 5edb81} /d+ Cloned_Entry
5. To see the new Cloned entries added to NVRAM, use the bootcfg command and
notice you now have seven entries instead of five. The bottom two entries are the
cloned entries and will use the EFI partition on the shadow drive (disk-1) to boot.
C:\>bootcfg
Boot Options
Timeout: 30
Default:
\Device\HarddiskDmVolumes\PhysicalDmVolumes\BlockVolume1\WIND
OWS
CurrentBootEntryID: 5
Boot Entries
You must now use the following procedure to recover the original operating system
(shadow) drive. These following steps show you the whole process. The process includes
replacing the failed disk-0, re-installing Windows on the new replacement disk, which
creates a new EFI system partition, and then adding new boot entries into NVRAM so
that you can boot back into the original operating system on the shadow disk-1.
1. Remove the failed system drive (disk-0) and replace it with a good disk. See your
hardware manuals for the correct way to replace the failed disk. The replacement
disk does not have to be partitioned or formatted. It can be a brand new disk.
2. Insert the Windows 2003 Server installation CD into the computer's CD-ROM drive,
then power on the system.
3. When the system boot options menu is displayed, select to boot from CD-ROM.
When you are prompted to press any key to boot from the CD, press any key.
4. On the Welcome to Windows Setup screen, press ENTER to install and allow Setup
to automatically create the new system partition.
5. After the new EFI and MSR partitions are created, select the free space on disk-0
and create a new partition large enough to install Windows and hold a page file.
6. Select the newly created partition to install Windows on, and then select the
format option that you want to format the partition. Setup continues. Answer all
appropriate questions that you are prompted with, and then let Setup finish.
8. At a command prompt, run the bootcfg command to display the current boot
menu items from NVRAM.
C:\>bootcfg
Boot Options
Boot Entries
9. Use the bootcfg /list command to display all of the partitions on the shadow
disk (disk-1). Locate the original Windows boot partition. It has the name of LDM
data partition and has a partition length the same size as the original boot
partition.
In this example, the boot partition is entry No: 3 with the GUID of {9aee294a-fa7d-
4d4a-8a47-51a1dd1f9867}
C:\bootcfg /list 1
Partition No: 1
Partition Style: GPT
Starting offset: 17,408
Partition length: 1,048,576
Partition GUID: {646091f1-b826-47e8-a72c-f22072e9a769}
GUID type: {5808c8aa-7e8f-42e0-85d2-e1e90434cfb3}
Partition name: LDM metadata partition
Partition No: 2
Partition Style: GPT
Starting offset: 1,065,984
Partition length: 32,505,856
Partition GUID: {afb1e6b9-d8a6-456d-8df1-31327f94f3fe}
GUID type: {e3c9e316-0b5c-4db8-817d-f92df00215ae}
Partition name: Microsoft reserved partition
Partition No: 3
Partition Style: GPT
Starting offset: 33,571,840
Partition length: 3,142,056,960
Partition GUID: {9aee294a-fa7d-4d4a-8a47-51a1dd1f9867}
GUID type: {af9b60a0-1431-4f62-bc68-3311714a69ad}
Partition name: LDM data partition
Partition No: 4
Partition Style: GPT
Starting offset: 3,175,628,800
Partition length: 1,174,758,912
Partition GUID: {ab104fde-0782-4810-842e-0fb291e385ad}
GUID type: {af9b60a0-1431-4f62-bc68-3311714a69ad}
Partition name: LDM data partition
10. Use the bootcfg /mirror command to add a boot entry into NVRAM for the
shadow disks boot partition and give it a meaningful description. Use the Partition
GUID from the boot partition extracted earlier.
11. Use bootcfg to display the boot menu items again. Notice the new entry was
added to the bottom of the list. You can now use this entry to boot to the original
Windows operating system.
- C:\>bootcfg
Boot Options
Timeout: 5
Default: \Device\HarddiskVolume3\WINDOWS
CurrentBootEntryID: 1
Boot Entries
12. Shut down the computer, and then restart it. Select the boot menu item Original
Shadow Drive to boot into the original operating system. This brings the server
back into production. To fix the mirroring so that you can use the new disk-0 as
your primary operating system drive and again be in a fault tolerant environment,
continue with the following steps.
7 Note
If there were additional volumes on the original failed dynamic disk-0, they must
also be deleted before you are permitted to delete the missing disk.
1. With Diskpart.exe, list the volumes, and then make a note of the volume number
(Volume #) of the failed mirror. Select the mirror volume (volume #), and then view
the details to see what missing disk (m#) you need to break the mirror from. In this
example, you are working with volume 0 on missing disk m0.
2. Break the mirror by specifying the missing disk (m0), and then use the no keep
option to remove the plex (partition) from the missing disk. List the volumes to
make sure the mirror is gone and the volume is now listed as a simple volume.
4. Delete the new Windows Server operating system partition on disk-0, because it is
no longer required. This makes room to re-mirror back to disk-0.
7 Note
This step is optional if you have sufficient free space on disk-0 to re-establish
the mirror.
5. Convert disk-0 to Dynamic, and then select the operating system volume on disk-1
and re-establish the mirror back to disk-0. This puts the computer back into a fault
tolerant environment, and after the mirror is healthy you can boot back into disk-0
with the new boot option that was automatically added to the NVRAM.
DISKPART> exit
Leaving Diskpart...
7. Use the bootcfg command to view the new boot option that was added to the
NVRAM. This new entry is named Boot Mirror C: - secondary plex and is most
likely menu item ID 1. You can now clean up the original boot entries for the
original operating system and the original secondary plex with the bootcfg /delete
/ID # command.
C:\>bootcfg
Boot Options
Timeout: 30
Default: (null)
CurrentBootEntryID: 7
Boot Entries
8. This concludes this procedure and the remaining boot entries in the boot menu
are all valid boot entries to boot to both the primary and shadow drives.
Feedback
Was this page helpful? Yes No
How to use the Diskpart.exe command prompt utility to extend a data volume into
unallocated space in Windows Server 2003, Windows XP, and Windows 2000.
How to extend the boot partition in Windows Server 2008.
Use the extend command to incorporate unallocated space into an existing volume
while preserving the data.
For Basic volumes, the unallocated space for the extension must be the next
contiguous space on the same disk.
For Dynamic Volumes, the unallocated space can be any empty area on any
Dynamic disk on the system.
Only the extension of data volumes is supported. System or boot volumes may be
blocked from being extended, and you may receive the following error:
Diskpart failed to extend the volume. Please make sure the volume is valid for
extending
You can't extend the partition if the system page file is located on the partition.
Move the page file to a partition that you don't want to extend.
To extend a partition or volume, first select the volume to give it the focus, and then
specify how large to make the extension. To extend a volume, follow these steps:
3. Type Select volume <volume number> where <volume number> is number of the
volume that you want to extend.
4. Type extend [size=n] [disk=n] [noerr]. The following section describes the
parameters:
size=n
The space, in megabytes (MB), to add to the current partition. If you don't
specify a size, the disk is extended to use all the next contiguous unallocated
space.
disk=n
The dynamic disk on which to extend the volume. Space equal to size=n is
allocated on the disk. If no disk is specified, the volume is extended on the
current disk.
noerr
For scripting only. When an error is thrown, this parameter specifies that
Diskpart continue to process commands as if the error didn't occur. Without
the noerr parameter, an error causes Diskpart to exit with an error code.
When the extend command is complete, you should receive a message that states that
Diskpart successfully extended the volume. The new space should be added to the
existing drive while maintaining the data on the volume.
In Windows XP and Windows 2000, you can't use Diskpart.exe to extend a simple
volume on a Dynamic disk that was originally created on a Basic disk. You can extend
only simple volumes that were created after the disk was upgraded to Dynamic disk. If
you try to extend a simple volume on a Dynamic disk that was originally created on a
Basic disk, you receive the following error message. This restriction was removed in
Windows Server 2003.
Diskpart failed to extend the volume.
Please make sure the volume is valid for extending
7 Note
7 Note
You can only extend the boot partition in contiguous unallocated disk space.
Feedback
Was this page helpful? Yes No
This article provides a list of frequently asked questions about the GUID Partition Table
disk architecture.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
The GUID Partition Table disk partition format is well defined and fully self-identifying.
Data that is critical to the operating system is located in partitions and not in
unpartitioned or hidden sectors. GUID Partition Table does not allow for hidden sectors
or partitions. GUID Partition Table disks use primary and backup partition tables for
redundancy and CRC32 fields for improved partition data structure integrity. The GUID
Partition Table partition format uses version number and size fields for future expansion.
Each GUID Partition Table partition has a unique identification GUID and a partition
content type, so no coordination is necessary to prevent partition identifier collision.
Each GUID Partition Table partition has a 36-character Unicode name, which means that
any software can present an easily readable name for the partition without any
additional understanding of the partition.
Only one extended partition can be present on any given drive, and the maximum
number of logical drives is MAXULONG/4. All MBR disk partitions and logical drives
must be cylinder-aligned, even on hardware RAID sets that are built from multiple
different drives with no clear underlying physical geometry.
MBR partitioning rules are complex and poorly specified. For example, does cylinder
alignment mean that each partition must be at least one cylinder in length? An MBR
partition is identified by a two-byte field, and coordination is necessary to avoid
collision. IBM originally provided that coordination, but as of July 2001, there is no
single authoritative list of partition identifiers.
The Unified EFI Specification Defines an Interface Between an Operating System and
Platform Firmware
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
The 64-bit version of Windows XP can read and write GUID Partition Table disks,
but cannot boot from GUID Partition Table disks.
Can the 64-bit version of Windows XP read, write, and boot from MBR disks?
Yes.
Can the 32-bit version of Windows XP read, write, and boot from GUID Partition
Table disks?
No. The 32-bit version will see only the Protective MBR. The EE partition will not be
mounted or otherwise exposed to program software.
Can the 32-bit version of Windows XP read, write, and boot from MBR disks?
Yes.
Both MBR and GUID Partition Table disks can be present in a single dynamic disk
group. Volume sets can span both MBR and GUID Partition Table disks, however,
the MBR cylinder alignment restriction might cause some difficulties with mirroring
or striping MBR and GUID Partition Table disks.
What is a superfloppy
Removable media without either GUID Partition Table or MBR formatting is considered a
superfloppy. The entire media is treated as a single partition.
The media manufacturer performs any MBR partitioning of removable media; Windows
never partitions removable media. If the media does have an MBR, only one partition is
supported. There is little user-discernible difference between MBR-partitioned media
and superfloppies.
Examples of removable media include floppy disk drives, JAZZ disk cartridges, magneto-
optical media, DVD-ROM, and CD-ROM. Hard disk drives on external buses such as SCSI
or IEEE 1394 are not considered removable.
Fixed disks are partitioned by using GUID Partition Table partitioning. GUID
Partition Table disks can be converted to MBR disks only if all existing partitioning
is first deleted, with associated loss of data.
Only MBR disks can be used. MBR disks cannot be converted to GUID Partition
Table disks.
Extensible Firmware Interface Firmware
How can a drive letter in the operating system be mapped to a partition in
Extensible Firmware Interface Firmware?
There is no inherent mapping between drive letter and partition that can be used
to determine one from the other. A basic data partition must be identified by its
partition GUID.
The Extensible Firmware Interface System Partition contains the NTLDR, Boot.ini,
and other files that are necessary to boot the computer, such as drivers. The
Partition GUID defines the Extensible Firmware Interface System Partition:
DEFINE_GUID (PARTITION_SYSTEM_GUID, 0xC12A7328L, 0xF81F, 0x11D2, 0xBA,
0x4B, 0x00, 0xA0, 0xC9, 0x3E, 0xC9, 0x3B)
Do only GUID Partition Table disks have Extensible Firmware Interface System
Partitions?
No, MBR disks can also have Extensible Firmware Interface System Partitions.
Extensible Firmware Interface specifies booting from either GUID Partition Table or
MBR. The Extensible Firmware Interface System Partitions on an MBR disk is
identified by partition type 0xEF. However, Windows XP does not support booting
Extensible Firmware Interface from MBR disks or 0xEF partitions.
In other words, the size of the Extensible Firmware Interface System Partition must
be the larger of these two numbers, 100 MB or 1 percent of the physical disk size
(up to 1 GB). The physical disk size is measured at the time of disk partitioning.
The value 1 percent of the physical disk is calculated at the time that the Extensible
Firmware Interface System Partition is created and does not change if the disk is
extended later (for example, by using RAID).
Can there be two Extensible Firmware Interface System Partitions on a single disk?
What about two Extensible Firmware Interface System Partitions on two different
disks?
What does Microsoft place in the Extensible Firmware Interface System Partition?
Microsoft places the loader, and other files that are necessary to boot the
operating system in the Extensible Firmware Interface System Partition.
Where should the Extensible Firmware Interface System Partition be placed on the
disk?
The Extensible Firmware Interface System Partition must be first on the disk. While
there is no architectural requirement, there are numerous reasons why it is
beneficial to place the Extensible Firmware Interface System Partition first. The
primary reason for this is that it is impossible to span volumes when the Extensible
Firmware Interface System Partition is logically between the two data partitions you
are attempting to span.
The Extensible Firmware Interface System Partition should only include files that
are required for booting an operating system, platform tools that run before
operating system boot, or files that must be accessed before operating system
boot, for example in performing pre-boot system maintenance. Other value-added
files or diagnostics that are used while the operating system is running should not
be placed in the Extensible Firmware Interface System Partition. It is important to
note that the space in the Extensible Firmware Interface System Partition is a
limited system resource; its primary purpose is to provide storage for the files that
are necessary to boot the operating system.
The Microsoft Reserved Partition reserves space on each disk drive for subsequent
use by operating system software. GUID Partition Table disks do not allow hidden
sectors. Software components that formerly used hidden sectors now allocate
portions of the Microsoft Reserved Partition for component-specific partitions. For
example, converting a basic disk to a dynamic disk causes the Microsoft Reserved
Partition on that disk to be reduced in size and a newly created partition holds the
dynamic disk database. The Microsoft Reserved Partition has the following Partition
GUID:
Every GUID Partition Table disk must contain a Microsoft Reserved Partition. The
Microsoft Reserved Partition must be the first partition after the Extensible
Firmware Interface System Partition (if any) on the disk. It is particularly important
that the Microsoft Reserved Partition be created before other primary data
partitions.
Why must the Microsoft Reserved Partition be created when the disk is first
partitioned?
After the disk is partitioned, there will be no free space left to create a Microsoft
Reserved Partition.
All basic data partitions on the drive should be contiguous. As previously noted, placing
an OEM-specific or other unrecognized partition between data partitions imposes
limitations on later volume spanning
The Extensible Firmware Interface System Partition FAT file system is mounted, but not
exposed. This allows programs running under Windows to update the contents of the
Extensible Firmware Interface System Partition. The following registry key locates the
Extensible Firmware Interface System Partition:
HKEY_LOCAL_MACHINE/System/Setup/SystemPartition
The Microsoft Reserved Partition (and any partitions that are created from the Microsoft
Reserved Partition) could have recognizable file systems; none are exposed.
Any OEM-specific partitions or partitions that are associated with other operating
systems are not recognized by Windows. Unrecognized partitions with recognizable file
systems are treated like the Extensible Firmware Interface System Partition. They will be
mounted, but not exposed. Unlike MBR disks, there is no practical difference between
OEM-specific partitions and other operating system partitions; all are unrecognized.
A data container partition corresponding to the MBR partition 0x42, with the
following GUID:DEFINE_GUID (PARTITION_LDM_DATA_GUID, 0xAF9B60A0L, 0x1431,
0x4F62, 0xBC, 0x68, 0x33, 0x11, 0x71, 0x4A, 0x69, 0xAD)
The first step in conversion is to separate a portion of the Microsoft Reserved Partition
to create the configuration database partition. All non-bootable basic partitions are then
combined into a single data container partition. Boot partitions are retained as separate
data container partitions. This is analogous to conversion of primary partitions.
Windows XP differs from Windows 2000 in that basic and extended partitions are
preferentially converted to a single 0x42 partition, rather than being retained as multiple
distinct 0x42 partitions as on Windows 2000.
Diskpart.efi:
Firmware: Extensible Firmware Interface System Partition
Microsoft Reserved Partition
Diskpart.exe:
Windows XP: Extensible Firmware Interface System Partition
Microsoft Reserved Partition
Diskgmt.msc:
Windows XP: Extensible Firmware Interface System Partition
DATA
Explorer.exe:
Windows XP: DATA
You can also develop your own tools (by using the Microsoft Win32 or Microsoft Win64
APIs) to access the GUID Partition Table disk partitions at their primitive levels.
If a program has recorded any Disk or Partition GUIDs, the program may not work. Any
programs, drivers, utilities, or firmware implementations that are supplied by computer
manufacturers or program vendors that rely on GUIDs should be capable of handling
GUIDs that change from the OPK initialization values to those that are generated by the
operating system.
ノ Expand table
For example, to format a volume that has a cluster size of 8 KB, you would use a
command such as the following from a command prompt, where /a: #### specifies the
number of bytes per cluster:
Console
If you choose a cluster size that is too small for the size of the partition, you receive the
following error message when you try to format the partition:
The format operation did not complete because the cluster count is higher than
expected
To determine the cluster size of a volume, run the following command at a command
prompt, and then note the Bytes Per Cluster value:
Console
7 Note
For example, when you run the fsutil fsinfo ntfsinfo c: command, you may receive
results that resemble the following output:
7 Note
In this example, the Bytes Per Cluster value is 4096. This value represents a 4-
kilobyte (KB) cluster size.
Feedback
Was this page helpful? Yes No
FIX: Heavy memory usage in ReFS on
Windows
Article • 12/26/2023
This article provides a solution to memory pressure and performance issues that occur
in the Resilient File System (ReFS) in Windows.
Applies to: Windows 10 - all editions, Windows Server 2016, Windows Server 2019
Original KB number: 4016173
Symptoms
You notice heavy memory usage on a computer that's running Windows 10, Windows
Server 2016, Windows Server 2019, Windows Server, 1903 or Windows Server, version
1909.
Cause
To provide greater resiliency for its metadata, the Resilient File System (ReFS) in
Windows Server 2016 uses allocate-on-write semantics for all metadata updates. Which
means that ReFS never makes in-place updates to metadata. Instead, it makes all writes
to newly allocated regions.
However, allocating-on-write causes ReFS to issue more metadata I/O to new regions of
the volume than write-in-place file systems do. Additionally, ReFS uses block caching
logic to cache its metadata in RAM. It isn't as resource-efficient as file caching logic.
Together, the ReFS block caching logic and allocate-on-write semantics cause ReFS
metadata streams to be large. ReFS uses the cache manager to create the metadata
streams, and the cache manager lazily unmaps inactive views. In some situations, this
lazy unmapping causes the active working set on the server to grow. This creates
memory pressure that can cause poor performance.
Resolution
This issue is addressed in cumulative update 4013429 that was released on March 14,
2017. The update introduces three tunable registry parameters.
Cumulative update 4013429 is available through Windows Update. You can also
download it directly through the Microsoft Update Catalog .
For more information, see March 14, 2017—KB4013429 (OS Build 14393.953)
) Important
Option 1
This option causes ReFS to try a complete an MM unmap of all metadata streams at
every checkpoint. This option will produce the expected result only if the volume is idle
and doesn't have any mapped pages.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Option 2
ReFS has a lazy MM unmap logic. So when ReFS cycles the entire namespace to
complete an MM unmap, it unmaps at a certain granularity. The amount of virtual
address space that is unmapped is determined by the following formula:
This option works if the VA range that's being unmapped doesn't have any active
references (that is, mapped metadata pages).
Specify the indicated values in the following subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
7 Note
Option 3
In this option, ReFS sends down an MM trim inline while it unmaps its metadata page.
This is the most aggressive option because it can cause performance regression if ReFS
is used on high-performance media, such as an SSD or NVMe.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Recommendation:
If a large active working set causes poor performance, first try to set
RefsEnableLargeWorkingSetTrim = 1.
If this setting doesn't produce a satisfactory result, try different values for
RefsNumberOfChunksToTrim, such as 8, 16, 32, and so on.
More information
To update its metadata, ReFS uses allocate-on-write instead of writing-in-place to
improve its resiliency to corruption.
Writing-in-place is susceptible to torn writes. It occurs if a power failure or an
unexpected dismount causes a write to be only partially completed.
References
Resilient File System (ReFS) overview
Feedback
Was this page helpful? Yes No
This article provides some workarounds for the issue where Hot-swap disks are not
recognized.
Symptoms
Assume that you have a computer that supports hot-swap SATA disks and is running
Windows Server 2012 R2. For some system configurations, when you insert one or more
drives into the computer, Windows cannot detect all the inserted drives. Therefore, you
cannot see the drives in This PC or the Windows Disk Management snap-in.
Cause
This issue occurs because of a communication error that occurs between the affected
drives and Windows.
Workaround
To work around this issue, you can use one of the following methods.
Method 1
Method 2
Use the Windows Disk Management snap-in tool, and then rescan for disks.
Status
Microsoft has confirmed that this is a problem in the Microsoft products at the
beginning of this article.
Feedback
Was this page helpful? Yes No
This article describes how NTFS reserves space for its Master File Table (MFT).
Summary
The NTFS file system contains at its core, a file called the master file table (MFT). There is
at least one entry in the MFT for every file on an NTFS volume, including the MFT itself.
Because utilities that defragment NTFS volumes cannot move MFT entries, and because
excessive fragmentation of the MFT can impact performance, NTFS reserves space for
the MFT in an effort to keep the MFT as contiguous as possible as it grows.
An MFT can be too large if a volume used to have lots of files that were deleted. The
files that were deleted cause internal holes in the MFT. These holes are significant
regions that are unused by files. It is impossible to reclaim this space. This is at least true
on a live NTFS volume.
More information
NTFS uses MFT entries to define the files to which they correspond. All information
about a file, including its size, time and date stamps, permissions, and data content is
either stored in MFT entries or in space external to the MFT but described by the MFT
entries.
(Directory entries, external to the MFT, also contain some redundant information
regarding files. But a full discussion of all the structures on NTFS is beyond the scope of
this article.)
As files are added to an NTFS volume, more entries are added to the MFT and so the
MFT increases in size. When files are deleted from an NTFS volume, their MFT entries are
marked as free and may be reused, but the MFT does not shrink. Thus, space used by
these entries is not reclaimed from the disk.
Because of the importance of the MFT to NTFS and the possible impact on performance
if this file becomes highly fragmented, NTFS makes a special effort to keep this file
contiguous. NTFS reserves 12.5 percent of the volume for exclusive use of the MFT until
and unless the remainder of the volume is used up. Thus, space for files and directories
is not allocated from this MFT zone until all other space is allocated first.
7 Note
You can change the NtfsMFTZoneReservation registry key to increase the volume
in Windows. For more information about the MFT, please see the Key elements in
the disk defragmentation process section of Maintaining Windows 2000 Peak
Performance Through Defragmentation.
Depending on the average file size and other variables, either the reserved MFT zone or
the unreserved space on the disk may be used up before the other as the disk fills to
capacity.
Volumes with a small number of relatively large files exhaust the unreserved space first,
while volumes with a large number of relatively small files exhaust the MFT zone space
first. In either case, fragmentation of the MFT starts to take place when one region or
the other becomes full. If the unreserved space becomes full, space for user files and
directories starts to be allocated from the MFT zone competing with the MFT for
allocation. If the MFT zone becomes full, space for new MFT entries is allocated from the
remainder of the disk, again competing with other files.
A new registry parameter can increase the percentage of a volume that NTFS reserves
for its master file table. NtfsMftZoneReservation is a REG_DWORD value that can take
on a value between 1 and 4, where 1 corresponds to the minimum MFT zone size and 4
corresponds to the maximum. If the parameter is not specified or an invalid value is
supplied, NTFS uses a default value of 1 for this parameter. The exact ratios that
correspond to each setting are undocumented because they are not standardized and
may change in future releases. In order to know what setting is best for your
environment, it may be necessary to experiment with different values.
To determine the current size of the MFT on a Windows computer, type the dir /a $mft
command on an NTFS volume.
To determine the current size of the MFT on a Windows computer, use Disk
Defragmenter to analyze the NTFS drive, and then click View Report. This displays the
drive statistics, including the current MFT size and number of fragments.
The Disk Defragmenter displays green for what is called system files and on an NTFS
formatted volume this is simply the combination of the MFT, pagefile.sys (if one exists
on this volume) and what is called the "MFT Zone" or reserved space for MFT Expansion.
The defragmentation report only displays information about the pagefile and MFT; it
does not mention the MFT Zone because it does not affect in any way disk utilization or
capacity.
The MFT Zone is not subtracted from available (free) drive space used for user data files,
it is only space that is used last. When the MFT needs to increase in size, for example,
you created new files and directories, it is taken from the MFT Zone first, thus
decreasing MFT fragmentation and optimizing MFT performance.
The default MFT Zone is calculated and reserved by Ntfs.sys when it mounts the volume,
and is based on volume size. You can increase the MFT Zone by means of the registry
entry documented below, but you cannot make the default MFT Zone smaller than what
is calculated by Ntfs.sys. Increasing the MFT Zone does not decrease in any way disk
space that can be used by users for data files.
7 Note
The results returned by the dir command may not be current. The size reported by
the dir command may reflect cached data that reflects the size of the MFT at the
time the system was started following an orderly shutdown.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem
7 Note
This is a run-time parameter and does not affect the actual format of a volume.
Rather, it affects the way NTFS allocates space on all volumes on a given system.
Therefore, to be completely effective, the parameter must be in effect from the
time that a volume is formatted and throughout the life of the volume. If the
registry parameter is adjusted downward or removed, the MFT zone will be
reduced accordingly, but this will not have any affect on MFT space already
allocated and used.
Feedback
Was this page helpful? Yes No
This article describes the steps to establish a striped volume (RAID 0) in Windows Server
2003.
Summary
A striped volume (RAID 0) combines areas of free space from multiple hard disks
(anywhere from 2 to 32) into one logical volume. Data that is written to a striped volume
is interleaved to all disks at the same time instead of sequentially. Therefore, disk
performance is the fastest on a RAID 0 volume as compared to any other type of disk
configuration. Administrators prefer to use striped volumes when input/output (I/O)
speed is important. Any file system, including FAT, FAT32, or NTFS, can be used on a
striped volume.
Requirements
There must be at least two hard disk drives. IDE, small computer system interface
(SCSI), or mixed architecture is permissible.
All disks involved in the striped volume must be dynamic disks.
Each portion of the free space must be exactly the same (for example, the size and
file system type).
4. On the View menu, point to Top, and then click Disk List.
In the right pane, a column appears that lists the attributes of each disk in the
system.
5. On the View menu, point to Bottom, and then click Graphical View.
The Disk Description pane (which is displayed in gray) is positioned on the left side of
the volume description, which is displayed in color. The disk description contains
information about each disk's disk number, whether it's a basic or dynamic
configuration, its size, and its status (online or offline).
The volume descriptions are color-coded. They hold information about each volume,
such as the drive letter (if assigned), whether the volume is allocated or unallocated, the
partition or volume size, and the health status of the volume.
7 Note
You must be logged on as an administrator or a member of the Administrators
group to complete this procedure. If your computer is connected to a network,
network policy settings may also prevent you from completing this procedure.
1. Before you upgrade disks, quit any programs that are running on those disks.
2. Right-click the gray Disk Description pane that is located to the left of the color-
coded volume panes, and then click Upgrade to Dynamic Disk.
3. If the second disk isn't a dynamic disk, follow steps 1 and 2 to upgrade it to a
dynamic disk.
1. In the lower-right pane of the Disk Management tool, right-click the free,
unallocated volume space on either disk, and then click Create Volume.
4. In the left pane under Select Two or More Disks, a list is displayed that contains all
disks that have enough free, unallocated space to participate in the striped volume.
In the right pane under Selected, the disk that you right-clicked in step 1 is
displayed.
5. In the left pane under All Available Dynamic Disks, click the disk, and then click
Add.
All disks that are displayed in the right pane are labeled Selected. View the bottom
of the Select Disk dialog box under the Size label. The For All Selected Disks box
displays the maximum size of the striped volume that you can make.
7 Note
The volume on each disk is the same size in the completed striped volume.
For example, if you have 100 MB on the first disk, you have 100 MB on the
second disk. Therefore, the total size of your combined volumes is double that
of the smaller of the volumes on the two disks.
You can reduce the size of the volume by modifying the value in the Disk Size box.
Keep in mind that on a system that has two disks, the total striped volume size is
double the size that you enter. The Total Volume Size box under the right pane
displays the actual size of the striped volume.
6. Click Next to advance to the Assign Drive Letter Path page of the wizard.
7. At this time, you may want to assign a drive letter to your striped volume (you can
also do this at any other time). To do so, click Assign Drive Letter, and then enter
an available drive letter.
Alternatively, you can click Do not assign drive letter or path. You can also click
Mount this volume on an empty folder that supports drive paths. However, this
selection is beyond the scope of this article.
8. After you enter a drive letter for your striped volume, click Next.
9. Click Format this partition with the following settings, and then follow these
steps:
c. In the Volume Label box, you can keep the default New Volume label or you
can type you own label.
d. At this time, you can click to select the Quick Format and File and Folder
Compression check boxes. Or you can defer both of these tasks if you want.
10. Click Next, check your selection in the Summary window, and then click Finish.
The striped volumes are displayed on the two disks on your system. They have the same
color code, the same drive letter (if you mapped the drive during the procedure), and
they're both the same size.
Troubleshooting
Don't mix hardware RAID 0 with software RAID 0.
A striped volume can't hold the system or boot partition of a Windows Server
2003-based system.
You can't extend or mirror striped volumes.
There's no fault tolerance on a striped volume. This means that if one of the disks
becomes damaged or no longer functions properly, the whole volume is lost.
Feedback
Was this page helpful? Yes No
This article describes how to mirror the system and boot partition (RAID1).
Summary
This step-by-step article describes how to mirror the system and boot partition in
Windows Server 2003. This scenario is based on the assumption that the system and
boot files are located on disk 0 and that disk 1 is unallocated space.
Requirements
At least two hard-disk drives; IDE, small computer system interface (SCSI), or mixed
architecture is permissible.
The second drive must be at least the size of the volume on which the operating
system boot and system files reside to permit mirroring.
The Windows Server 2003 system and boot files must reside on the same volume
to be mirrored.
7 Note
The memory dump file is written only to the boot hard disk. Windows Server 2003
can continue to work with a mirrored system disk configuration even if one of the
disks in the mirror is removed. However, the memory dump file cannot be written
to the remaining system disk in the mirror. You must schedule a system restart for
the memory dump file to be written to the remaining hard disk.
4. On the View menu, point to Top, and then click Disk List.
In the right pane, the attributes of each disk in the system are displayed.
5. On the View menu, point to Bottom, and then click Graphical View.
At the bottom of the right pane, a color-coded graphical view of the disks on the
system is displayed:
Disk description panel: The disk description panel (which is gray) is located to
the left of the volume description, which is in color. The disk description
contains information about each disk's disk number, whether its
configuration is basic or dynamic, its size, and its online or offline status.
Volume description panel: The volume description panels are color-coded.
They hold information about each volume, such as the drive letter (if
assigned), whether the volume is allocated or unallocated, the partition or
volume size, and the health status of the volume.
7 Note
1. Before you upgrade disks, quit any programs that are running on those disks.
2. Right-click the gray disk description panel, and then click Upgrade to Dynamic
Disk.
3. If the second disk is not a dynamic disk, follow these steps to upgrade it to a
dynamic disk.
7 Note
1. Disk 1 must be unallocated space before you can proceed with mirroring.
2. Right-click disk 0 (which contains the boot and system files), and then click Add
Mirror.
3. A dialog box opens in which any disk on your system that is available for mirroring
is displayed. Select the disk of your choice (in this example, it is disk 1), and then
click Add Mirror.
Both disk 0 and disk 1 will now have the same color code, the same drive letter,
and the volumes will have the status note "Regenerating" displayed while the
information is being copied from the first disk to the second disk. The system will
automatically size the volume of the new mirror to the same size as of the original
boot and system volume.
4. If you now want to boot from the new mirrored disk, you have to change the
Boot.ini ARC path that points the computer to the partition in which the system
files are located.
Troubleshooting
After you upgrade a basic disk to a dynamic disk, any existing partitions on the basic
disk become (dynamic) simple volumes. You cannot change the dynamic volumes back
to partitions.
A dynamic disk cannot contain partitions or logical drives, nor can it be accessed by MS-
DOS or by any Windows operating systems other than Windows Server 2003.
) Important
Do not use a hardware RAID solution and a software RAID solution on the same
disk.
Feedback
Was this page helpful? Yes No
This article describes how to run the Disk Cleanup tool (cleanmgr.exe) by using
command-line switches. cleanmgr.exe is designed to clear unnecessary files from your
computer's hard disk. You can configure cleanmgr.exe with command-line switches to
clean up the files you want. You can then schedule the task to run at a specific time by
using the Scheduled Tasks tool.
Applies to: Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1
Original KB number: 253597
Command-line switches
You can start the Disk Cleanup tool by running cleanmgr.exe, or by selecting Start >
Programs > Accessories > System Tools > Disk Cleanup. Disk Cleanup supports the
following command-line switches:
/d <driveletter> : - This switch selects the drive that you want Disk Cleanup to
/sageset:n - This switch displays the Disk Cleanup Settings dialog box and creates
a registry key to store the settings you select. The n value is stored in the registry
and allows you to specify different tasks for Disk Cleanup to run. The n value can
be any integer value from 0 to 65535. To get all the available options when you use
the /sageset switch, you may need to specify the drive letter that contains the
Windows installation.
For more information, see Registry key information.
/sagerun:n - This switch runs the specified tasks that are assigned to the n value
by using the /sageset switch. All drives in the computer will be enumerated, and
the selected profile will be run against each drive.
For example, in Scheduled Tasks, you could run the following command after
running the cleanmgr /sageset:11 command:
cleanmgr /sagerun:11 .
This command runs Disk Cleanup with the options that were specified with the
cleanmgr /sageset:11 command.
The available options for Disk Cleanup that you can specify by using the /sageset and
/sagerun switches include:
Temporary Setup Files - These files shouldn't be needed anymore. They were
originally created by a Setup program that's no longer running.
Downloaded Program Files - They are ActiveX controls and Java programs that are
downloaded automatically from the Internet when you view certain pages. They're
temporarily stored in the Downloaded Program Files folder on your hard disk. This
option includes a View Files button that allows you to see the files that would be
removed.
Temporary Internet Files - The Temporary Internet Files folder contains Web pages
that are stored on your hard disk for quick viewing. Your personalized settings for
Web pages are left intact. This option includes a View Files button that displays the
files to be deleted.
Old Chkdsk Files - When Chkdsk checks your disk for errors, it might save lost file
fragments as files in your disk's root folder. These files are unnecessary and can be
removed.
Recycle Bin - The Recycle Bin contains files you've deleted from your computer.
These files aren't permanently removed until you empty the Recycle Bin. This
option includes a View Files button that opens the Recycle Bin.
Temporary Files - Programs sometimes store temporary information in a Temp
folder. Before a program quits, it usually deletes this information. You can safely
delete temporary files that haven't been modified in over a week.
Temporary Offline Files - Temporary offline files are local copies of recently used
network files that are automatically cached for you. You can use them when you're
disconnected from the network. There's a View Files button that opens the Offline
Files folder.
Offline Files - Temporary files are local copies of network files that you specifically
made available offline. You can use them when you're disconnected from the
network. There's a View Files button that opens the Offline Files folder.
Compress Old Files - Windows can compress files that you haven't used in a while.
Compressing the files saves disk space while still enabling you to use them. No
files are deleted. Because files are compressed at different rates, the displayed
amount of disk space you'll gain is approximate. You can use the Options button
to specify the number of days to wait before an unused file is compressed.
Catalog Files for the Content Indexer - The Indexing service speeds up and
improves file searches by maintaining an index of the files on the disk. These files
are left over from a previous indexing operation and can be deleted safely.
If you select the drive that contains the Windows installation, all of these options are
available on the Disk Cleanup tab. If you select any other drive, only the Recycle Bin and
Catalog files for content index options are available on the Disk Cleanup tab.
The More Options tab contains options for cleaning up Windows components or
installed programs. You can use the Windows Components option to create free space
by removing optional Windows components that you don't use. Selecting the Clean Up
button for this option starts the Windows Components Wizard. You can use the
Installed Programs option to free more disk space by removing programs that you
don't use. Selecting this Clean Up button starts the Change or Remove Programs
option in the Add/Remove Programs tool.
Each of the modified registry sub keys may contain a REG_DWORD type registry value
StateFlagsNNNN, where NNNN is the number n specified in the switch. For example,
after you run the cleanmgr /sageset:9 command, a registry value Stateflags0009 is
added. The registry value can be set as one of the following values.
7 Note
Under the VolumeCaches registry key, the Offline Pages Files registry sub key
doesn't have the stateflags values. There is not an option to delete these files.
Additional information
For a Microsoft Windows XP version of this article, see How to Automate the Disk
Cleanup Tool in Windows XP .
7 Note
Disk Cleanup option on drive's general properties and cleanmgr.exe is not present
in Windows Server 2008 R2 by default. For more information on how to have Disk
Cleanup button or cleanmgr.exe on Windows Server 2008 R2, see Disk Cleanup
option on drive’s general properties and cleanmgr.exe is not present in Windows
Server 2008 R2 by default.
Feedback
Was this page helpful? Yes No
This article contains steps and examples of how to set up dynamic boot partition
mirroring on GUID partition table (GPT) disks in Windows Server 2008.
Introduction
This step-by-step article describes how to successfully set up dynamic boot partition
mirroring on GUID partition table (GPT) disks in Windows Server 2008. Unlike the master
boot record (MBR) mirrors on 32-bit versions of Windows, there are more steps to
successfully create and to start mirrored boot volumes on GPT disks. This article also
describes how to recover after a primary disk failure.
You must have the built-in Diskpart.exe and Bcdedit.exe utilities to create mirrored boot
volumes on GPT disks in Windows Server 2008. You can use the Disk Management
console do some of these tasks. But for other tasks, you have to use the built-in
Diskpart.exe utility.
For consistency and for ease of use, this article uses the Diskpart.exe utility in the
procedures in this article. For help with any of the Diskpart.exe commands, start
Diskmgmt.msc, and then open the Help topics on the Help menu. The steps that are
described in the procedures in this article use real examples.
The procedures in this article show the expected results that each command returns. In
these procedures, disk 0 is the primary system and the boot drive, and disk 1 is the
secondary drive.
7 Note
For Windows Server 2012 documentation, see the following TechNet blog post:
Tip of the Day: Configuring Disk Mirroring for Windows Server 2012
More information
Before you start the following procedure, make sure that you have another basic disk
that has unallocated free space that is greater than or equal to the capacity of the
system and boot partitions of the primary disk. If you already converted the spare drive
to a dynamic disk, revert it back to a basic drive before you follow these steps.
7 Note
This starts the diskpart console. After the console is initialized, DISKPART> is
displayed. The diskpart console is now ready for input commands.
2. Select the disk that you want to be the secondary drive, and then convert the drive
to GPT. In this example, disk 1 is used for the mirror (secondary) drive.
7 Note
The disk that you select must not contain any data partitions. Additionally, the
disk must be a raw basic disk that has unallocated space that is greater than
or equal to the capacity of the primary system disk.
The following are the commands that you type at the command prompt. The
commands are formatted in bold, and the comments about the command or
about the contents of the screen display are formatted in plain text.
Console
DISKPART> Select disk 1
Disk 1 is now the selected disk.
7 Note
If you notice that more than one partition is displayed, you have selected the
wrong drive, or you did not start with a raw drive. Correct this before you
continue, or data loss may occur.
3. Select partition 1 on disk 1, and then delete it. You must use the override
command to delete the Microsoft Reserved (MSR) partition. You'll re-create a new
MSR partition after you create the required EFI partition.
Console
4. Select disk 0, and then list the partitions that are on disk 0. With the output of the
list command, create new EFI and MSR partitions on disk 1 that are the same sizes
as the EFI and MSR partitions on disk 0.
Console
When you use the Diskpart.exe utility, select the drive that you want to convert to a
dynamic disk, and then convert the drive to a dynamic disk. You must follow this step on
both the secondary and primary GPT drives. To convert both the primary and secondary
drives to dynamic disks, follow these steps:
Console
DISKPART> Exit
Leaving Diskpart...
Establish a mirror from the boot volume to the secondary
drive
After you convert both the primary drive (disk 0) and secondary drive (disk 1) to
dynamic disks, you can establish a mirror from the boot volume to the secondary drive.
To do this, you can use either the Disk management console or the Diskpart.exe utility.
To do this by using the Diskpart.exe utility, follow these steps.
1. At the DISKPART> prompt, select the boot volume (C:), and then mirror the volume
to the secondary drive (disk 1).
Console
2. Wait for the volume synchronization to complete, and then exit Diskpart.exe. You
can check the progress of the synchronization in the Diskmgmt.msc console.
7 Note
You must follow these steps when the BCD store is modified on either drive.
Use the Diskpart.exe utility to select the EFI partition on the secondary drive, and then
assign a letter to the EFI partition so that it can be formatted. In the following example,
the drive letter "S" is assigned to the EFI partition on the secondary drive. You can use
any available drive letter for this step.
Console
Use Diskpart to format the "S" partition to use the FAT32 file system. The system can't
start from an EFI partition unless it's formatted to use the FAT32 file system. To do this,
type the following command, and then press ENTER:
Console
Select the EFI partition on the primary drive (disk 0), and then assign a drive letter to
that EFI partition. In this example, the drive letter "P" is assigned to the primary EFI
partition on disk 0. You can use any available drive letter for this step.
Console
Exit Diskpart.
2. At the command prompt, type P: , and then press ENTER to change to drive P.
The Windows Boot Loader with the description, "Microsoft Windows Server 2008 -
secondary plex," was created by VDS during the "add disk" operation. The
Windows Boot Loader entry "Partition=C:" represents the volume C that is
mirrored, and this entry references the copy of Winload.efi file on disk 1 that will
start Windows Server 2008 from disk 1.Next, create a copy of the current Windows
Boot Manager so that it can be used from the EFI firmware startup menu to make
Windows Server 2008 start from either disk 0 or disk 1. The bcdedit /copy
command copies the current Windows Boot Manager entry to a new Windows
Boot Manager entry that has the description, "Windows Boot Manager Cloned."
The bcdedit /set command uses the GUID of the new Windows Boot Manager, and
the command sets the device partition to reference the copy of the Bootmgr.efi file
that is located on the "S" partition on disk 1. The following is an example of a
GUID:
FD221F0A-5B5D-484A-99FE-DEB4B3F90C32
1. At the command prompt, type bcdedit /copy {bootmgr} /d "Windows Boot Manager
Cloned" , and then press ENTER. An output that resembles the following is
displayed:
3. At the command prompt, type bcdedit /enum all , and then press ENTER to verify
the changes that were made. Then, you see output that resembles the following:
That the last GUID in the Firmware Boot Manager display order is the same
GUID as the secondary Windows Boot Manager on the "S" partition. This
means that the new Windows Boot Manager that has the description
"Windows Boot Manager Cloned" is synchronized in the NVRAM that is used
by the firmware when the EFI firmware displays the firmware startup menu.
There are now two NVRAM entries for Windows Boot Manager, one on the
"P" partition and the other on the "S" partition. The EFI firmware lists these
entries in the EFI startup menu.
Copy the EFI partition and the BCD store to the second
drive
To export the EFI partition and the BCD store to the second drive, follow these steps:
1. Export the BCD store to the EFI partition on disk 0. This lets you copy the BCD
store from disk 0 to disk 1. To do this, follow these steps:
2. Use the Robocopy command to copy the system files from "P" (the EFI partition on
the primary drive) to "S" (the EFI partition on the secondary drive). You must do
this to make sure that the secondary drive can start the system if disk 0 fails. Make
sure that you use the correct drive letters if you used different letters for your EFI
partitions. To do this, type robocopy p:\ s:\ /e /r:0 at the command prompt, and
then press ENTER.
3. Rename the BCD store on disk 1 so that it matches the name of the store on disk 0.
To do this, type rename S:\EFI\Microsoft\Boot\BCD2 BCD at the command prompt,
and then press ENTER.
2. On the startup menu, select the startup entry in EFI that is named "Windows Boot
Manager Cloned." This option lets you restart to the Windows Boot Manager on
the EFI partition of the secondary drive. Then, select "Microsoft Windows Server
2008 - secondary plex" to start Windows Server 2008 from the secondary drive.
7 Note
After you complete this step to give the secondary plex entry a more meaningful
name, make sure that you copy the BCD store to the secondary drive by using the
steps that are described in the "Copy the EFI partition and the BCD store to the
second drive" section.
Reestablish the primary boot drive mirror
If there's a failure of the primary drive (disk 0), you must start the computer in the
secondary drive (disk 1), and then re-create the mirror to return the boot volume to a
fault-tolerant state. To do this, follow these steps.
1. Replace the failed dynamic disk 0 by using the directions that are provided by your
hardware vendor. Make sure that the disk has no partition information. The
diskpart clean command can be used to destroy any existing partition information
on the disk.
7 Note
Be careful when you run the diskpart clean command because it will
destroy the partition table on the selected disk, and it will make the
contents of the disk inaccessible.
Throughout this section, the former primary disk will continue to be
known as disk 0, and the former secondary disk will continue to be
known as disk 1. However, after you follow these steps, disk 1 will be the
new primary disk, and disk 0 will be the new secondary disk.
2. Select Windows Boot Manager Cloned to start the computer by using the EFI
partition on the secondary drive. When the Boot Manager appears, select
Microsoft Windows Server 2008 - secondary plex.
3. Import the BCD store located on the EFI partition on disk 1. This sets the BCD store
on disk 1 as the active system store, and lets it be modified. To do this, follow these
steps:
a. Start DiskPart.
b. Run the following commands to select the EFI partition on disk 1, and to assign
to it drive letter "S."
Console
c. Exit DiskPart.
d. Run the command bcdedit /import S:\EFI\Microsoft\Boot\BCD /clean to
import the store from the EFI partition on disk 1.
4. You have to break the broken mirror. However, you must first determine which is
the correct disk on which to run the diskpart break command. After you do this,
select the mirror volume (Volume #), and then view the details to determine from
which missing disk (m#) you have to break the mirror. To do this, follow these
steps:
a. Start DiskPart.
Console
c. Use the detail volume or list disk command to determine the identifier for the
missing disk, typically m0:
Console
d. Break the mirror by specifying the identifier for the missing disk that you
obtained in step 5c (for example, m0):
Console
e. List the volumes to make sure that the mirror is gone and that the volume is
now listed as a simple volume:
Console
Console
g. Exit DiskPart.
5. Remove all stale entries from the BCD store to return the system to a known clean
state. Also, rename the entries to accurately reflect the current state of the system.
To do this, follow these steps:
a. Run the command bcdedit /enum all /v to determine the GUID of the entry in
NVRAM that has the description "Windows Boot Manager" and that has a
device parameter of unknown or a missing device parameter. After you
determined the GUID for this entry, use the command bcdedit /set {GUID}
device partition=s: to point the entry to disk 1.
b. Use the output from the bcdedit /enum all /v command to determine the
GUID of the "Windows Boot Manager Cloned" entry in NVRAM. After you
determine the GUID for this entry, use the command bcdedit /delete {GUID} to
delete the old entry for disk 1 from NVRAM.
c. In the output for the bcdedit /enum all /v command, look for an entry named
"Windows Resume Application" that has a device parameter of unknown or a
missing device parameter. Delete this entry using the bcdedit /delete {GUID}
command.
d. In the bcdedit /enum all /v output, look for an entry that has the description,
"Windows Resume Application - Secondary Plex." Use the command bcdedit
/set {GUID} description "Windows Resume Application" command to rename
the entry to reflect that this is now the Windows Resume Application entry for
the primary mirror plex.
e. In the output for the bcdedit /enum all /v command, look for an entry that has
the description, "Windows Server 2008" and that has a device parameter of
unknown or a missing device parameter. Delete this entry using the bcdedit
/delete {GUID} command.
f. In the bcdedit /enum all /v output, look for an entry that has the description
"Windows Server 2008 - Secondary Plex." Use the command bcdedit /set
{GUID} description "Windows Server 2008" to rename the entry to reflect that
this is now the boot manager entry for the primary mirror plex.
g. Look for the BCD entry that has the description, "Windows Memory Diagnostic."
Use the command bcdedit /set {GUID} device partition=s: to point the entry to
the memory tester that is located on disk 1.
h. Run the command bcdedit /enum all /v to verify the NVRAM and BCD entries.
i. Restart the computer. Select "Windows Boot Manager" and "Windows Server
2008" to start in disk 1.
6. Convert the newly added disk to GPT format, and then create the partition
structure. To do this, follow these steps:
a. Start DiskPart.
Console
Console
d. Record the partition layout for disk 1 to duplicate the layout on disk 0:
Console
e. Duplicate the layout of disk 1 on disk 0. To calculate the size of the MSR
partition for this step, add together the size of the MSR "Reserved" partition and
the "Dynamic Reserved" partition that is listed in DiskPart for disk 1. For
example, if the MSR partition is 127 MB on disk 1, and if the "Dynamic
Reserved" partition is 1 MB on disk 1, then create a 128-MB MSR partition on
disk 0. Generally, the EFI partition should be 200 MB, and the MSR partition
should be 128 MB. To duplicate the layout of disk 1, run these commands:
Console
f. List the partitions that are on the system to verify that disk 0 contains both an
EFI and an MSR partition:
Console
DISKPART> list partition
7. Convert both disks to dynamic disks if they aren't already dynamic disks:
Console
Console
9. While the mirror resynchronization is occurring, prepare the EFI partition on disk 0:
Console
Exit DiskPart
10. Wait for the mirror resynchronization to finish. You can use Disk Management to
check on the resynchronization process.
11. If the EFI partition on disk 0 isn't already assigned the drive letter "P," and if the EFI
partition on disk 1 isn't already assigned the drive letter of "S," assign the
appropriate drive letters to the EFI partitions on disk 0 and disk 1: Start Diskpart.
Console
Exit DiskPart.
12. Clone the boot manager entry in NVRAM for disk 1:
a. Clone the boot manager entry using the bcdedit /copy {bootmgr} /d "Windows
Boot Manager Cloned" command. Record the GUID for the new entry that is
13. Copy the contents of the EFI partition on disk 1 to the EFI partition on disk 0 so
that you can boot from disk 0:
a. Export the active BCD store by using the command bcdedit /export
S:\EFI\Microsoft\Boot\BCD2
b. Copy the EFI partition from disk 1 to disk 0 by using the command robocopy s:\
p:\ /e /r:0
c. Rename the copied BCD store on disk 0 to BCD by using the command rename
P:\EFI\Microsoft\Boot\BCD2 BCD .
d. Delete the duplicate exported BCD store on disk 1 by using the command del
S:\EFI\Microsoft\Boot\BCD2
Console
b. Restart the computer to verify that you can boot from either disk 0 or disk 1.
7 Note
By default, the boot entries will point to disk 1. If you boot from disk 0, and If you
have to modify the BCD store when you start in disk 0, you first have to import the
store:
1. Start DiskPart.
2. Select the EFI partition on disk 0, and assign to it the drive letter "P":
Console
3. Exit DiskPart.
7 Note
You should always boot from the BCD entry that corresponds to the NVRAM entry
that you selected when you started the computer. For example, if you selected the
"Windows Boot Manager" (primary disk) NVRAM entry, you may have to select the
"Windows Server 2008" (primary disk) BCD entry for the system to start correctly. If
you selected the "Windows Boot Manager Cloned" (secondary disk) NVRAM entry,
you should select the "Microsoft Windows Server 2008 - secondary plex"
(secondary disk) BCD entry.
Feedback
Was this page helpful? Yes No
This article discusses that Intel SSD D3-S4510 and Intel SSD D3-S4610 series 1.92 TB and
3.84 TB drives become unresponsive after 1,700 cumulative idle power-on hours.
Symptoms
Intel SSD D3-S4510 and Intel SSD D3-S4610 series drives in the 1.92 TB and 3.84 TB
capacities may experience an NAND "channel hang" condition in firmware release
XCV10100 that could cause the drive to become unresponsive after approximately 1,700
hours of cumulative idle power-on time.
When this issue occurs on a Windows Server Storage Spaces Direct (S2D) cluster, the
cluster may experience any of the following symptoms:
Resolution
The NAND "channel hang" issue is currently addressed in the Maintenance Release 1
(MR1) of Intel firmware (version XCV10110) as of March 2019. We recommend that you
update to the latest firmware before the drive reaches 1,700 cumulative idle power-on
hours.
Run the Intel SSD Data Center Tool to inspect all affected disks as soon as possible, and
take corrective actions as recommended. For more information, see Intel SSD Data
Center Tool .
The following MR1 firmware binary is available for use together with the Storage Spaces
Direct automated firmware update method, as appropriate for your device.
Dell Serial-ATA_Firmware_8VGP8_WN64_DL63_A00.EXE
Lenovo Intel S4510 and S4610 SATA SSD issue - Lenovo Server, Lenovo
ThinkSystem and IBM Server
7 Note
There is no counter or other attribute that reports drive idle power-on hours. Intel
recommends that you use SMART 09h (drive power-on hours) as an approximation
of the idle power-on hours. Therefore, Intel strongly recommends that you update
the firmware as soon as possible to avoid the risk of unrecoverable data loss. The
new MR1 firmware will not resolve any read-uncorrectable errors that existed
before the firmware upgrade. Intel has released a Data Center Tool (DCT) to identify
whether the issue is successfully corrected by installing the MR1 firmware. The tool
also describes possible next steps.
For more information about the DCT tool, see Intel Solid State Drive Data Center
Tool User Guide .
More information
This is a hardware issue that may affect the Microsoft products that are listed in the
"Applies to" section. Intel has determined the root cause of the issue and confirmed that
the issue is addressed in the firmware version that is based on "Maintenance Release 1."
References
For more information about how to update storage device firmware in an automated
manner by using Storage Spaces Direct (S2D), see the following Docs website:
Automated firmware updates with Storage Spaces Direct
For a step-by-step video about how to update storage device firmware in an automated
manner by using Storage Spaces Direct (S2D), see the following Windows Server
Channel website:
Update Drive Firmware Without Downtime in Storage Spaces Direct
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article introduces the new logging mechanism for Virtual Disk Service (VDS) in
Windows Server 2012.
Introduction
The VDS in Microsoft Windows Server is a set of APIs that provides a single interface to
manage disks. The VDS provides an end-to-end solution to manage storage hardware
and disks and to create volumes on the disks. This article introduces the new logging
mechanism for VDS in Windows Server 2012. The VDS logging for previous version of
Windows is removed.
More information
To help you troubleshoot any problems with the VDS, capture VDS trace. To capture VDS
trace, follow these steps:
1. Open an elevated command prompt, and then run the following commands:
a. md %systemroot%\system32\LogFiles\VDS
b. Logman start vds -o %systemroot%\system32\LogFiles\VDS\VdsTrace.etl -ets -p
{012F855E-CC34-4da0-895F-07AF2826C03E} 0xffff 0xff
TraceView
Feedback
Was this page helpful? Yes No
This article helps to resolve an issue in which DPM or ReFS volume becomes
unresponsive on Windows Server 2016.
Symptom
You notice a Resilient File System (ReFS) volume that uses Data Protection Management
(DPM) become unresponsive or freeze when you perform backups, specifically when
DPM issues large block-clone operations.
Cause
DPM uses loopback-mounted-VHDs. These appear like normal disks to the OS.
Therefore, these disks are displayed in Windows Explorer, Diskmgt, and other GUI tools.
These tools periodically poll the disks to make sure that they are functioning correctly.
This causes IOs to be sent down the loopback stack to the ReFS volume. If the ReFS
volume is busy, these IOs will have to wait. Therefore, when ReFS performs a long-
duration operation, such as flushing or a large block-clone call, these IOs will have to
wait longer. When these IOs are stuck, the UI of Explorer or Diskmgt won't be refreshed.
As a result, it appears like the disks are hung or dismounted.
Additionally, the loopback mount miniport driver (vhdmp) starts generating warning
events if any IOs don't complete within 30 seconds.
7 Note
Resolution
This issue is resolved in the July 18, 2017 cumulative update . The fix contains:
More Information
) Important
Before you follow these steps, make sure that you have read and implemented the
three registry parameters as described in KB article 4016173 . If these don't
adequately address any issues that you encounter,do not disable these registry
parameters. These parameters and the ones described in this section do not
overlap functionally, so they can be used together.
This update describes additional registry parameters that help address the latency issues
described in the "Symptoms" section. These parameters can be used in any
combination.
2 Warning
Serious problems might occur if you change the registry incorrectly by using
Registry Editor or by using another method. These problems might require you to
reinstall the operating system. Microsoft cannot guarantee that these problems can
be resolved. Change the registry at your own risk.
) Important
Tunable parameters
Option 1
This option disables cached pins, which were a major cause of the large active working
set.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Option 2
This option adds a heuristic to ReFS checkpointing logic, which causes ReFS to
checkpoint when the delete queue reach a certain size. IOs are stuck on ReFS because
the checkpoint logic would get stuck processing a large delete queue.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
7 Note
Option 3
Large duplicate extents calls introduce latency into the system, as other operations will
have to wait until these long-running operations are complete. This option reduces the
size of the duplicate extents call.
7 Note
DPM will set this registry key change as the default value as part of UR4, which will
release within August 2017.
Option 4
This option extends the TimeOutValue.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Disk
7 Note
The default value for TimeOutValue is 0x41 (65 decimal). 0x78 translates to 120
decimal.
Feedback
Was this page helpful? Yes No
This article describes how to change the system or boot drive letter in Windows.
Summary
2 Warning
Don't use the procedure that's described in this article to change a drive on a
computer where the drive letter hasn't changed. If you do so, you may not be able
to start your operating system. Follow the procedure that's described in this article
only to recover from a drive letter change, not to change an existing computer
drive to something else. Back up your registry keys before you make this change.
This article describes how to change the system or boot drive letter. Usually it isn't
recommended, especially if the drive letter is the same as when Windows was installed.
The only time that you may want to do so is when the drive letters get changed without
any user intervention. It may happen when you break a mirror volume or there's a drive
configuration change. This situation should be a rare occurrence, and you should
change the drive letters back to match the initial installation.
To change or swap drive letters on volumes that can't otherwise be changed using the
Disk Management snap-in, use the following steps.
7 Note
In these steps, drive D refers to the (wrong) drive letter assigned to a volume, and
drive C refers to the (new) drive letter you want to change to, or to assign to the
volume.
This procedure swaps drive letters for drives C and D. If you don't need to swap drive
letters, name the \DosDevice\letter: value to any new drive letter not in use.
Change the system or boot drive letter
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
2. Sign in as an Administrator.
3. Start Regedt32.exe.
HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices
5. Select MountedDevices.
7. Verify that Administrators have full control. Change it back when you are finished
with these steps.
HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices
10. Find the drive letter you want to change to (new). Look for \DosDevices\C: .
7 Note
You must use Regedit instead of Regedt32 to rename this registry key.
13. Find the drive letter you want changed. Look for \DosDevices\D: .
16. Select the value for \DosDevices\Z: , select Rename, and then name it back to
\DosDevices\D: .
18. Change the permissions back to the previous setting for Administrators. It should
probably be Read Only.
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that simple volumes may become
inaccessible if a power loss occurs shortly after creation.
Symptoms
Consider the following scenario. In Windows 7, you create a new simple volume in Disk
Management or DiskPart.exe on a non-removable disk. If your Windows 7 system
experiences a sudden power loss within a few minutes of volume creation, you may
notice the volume you created before the power loss is inaccessible and is not assigned
a drive letter when you power the system back on.
Additionally, in Disk Management the volume may not have a status (for example,
"Healthy") or a file system type listed. If you try to modify the volume in Disk
Management, you may receive the following error message:
The operation failed to complete because the Disk Management console view is not
up-to-date. Refresh the view by using the refresh task. If the problem persists close
the Disk Management Console, then restart Disk Management or restart the
computer.
Cause
This issue occurs because the configuration information for the new volume was not
written to disk by the time the power loss occurred.
Resolution
If you are experiencing the issue described in the "Symptoms" section, reinstalling the
volume will resolve the issue. Follow these steps to reinstall the volume.
1. Open Device Manager. You can access Device Manager by typing "Device
Manager" or "devmgmt.msc" in the Start Search box.
2. Once Device Manager is open, click on "Storage Volumes" to expand the Storage
Volumes portion of the device tree.
3. Under Storage Volumes, you should notice a volume listed as "Unknown device."
Right click on this device and choose "Uninstall." When asked to confirm, choose
OK.
4. Restart the system if you are prompted to do so. The volume should be accessible
once the system finishes restarting. If you are not prompted to restart the system,
right click in Device Manager and choose "Scan for hardware changes." Once the
scan is complete and installation of the volume completes, you will be able to
access the volume.
7 Note
If the power loss occurs within a few seconds of volume creation, in rare
circumstances you may be prompted to format the volume after you follow
the above steps. If this occurs, the file system configuration was not written by
the time the power loss occurred. You may need to reformat or recreate the
volume.
If the problem is fixed, you are finished with this section. If the problem is not fixed, you
can contact support .
Feedback
Was this page helpful? Yes No
This article lists some common issues you might see when using Disk Management and
it provides basic troubleshooting steps to try.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 11, Windows 10
Tip
If you get an error or something doesn't work when following these steps, there's
more help available. This article lists just the first few things to try. There's much
more information on the Microsoft community site in the Files, folders, and
storage section. That section lists the wide variety of hardware and software
configurations you might be dealing with. If you still need help, post a question
there, Contact Microsoft Support , or contact the manufacturer of your hardware.
1. In the search box on the taskbar, enter Computer Management, select and hold (or
right-click) Computer Management, and then choose Run as administrator.
2. After Computer Management opens, go to Storage > Disk Management.
Solution:
If the drive is new and just needs to be initialized, the solution is to initialize the disk. For
more information, see Initialize new disks. But there's a good chance you've already
tried this approach, and it didn't work. Or maybe you have a disk full of important files
that you don't want the initializing process to erase.
There are many reasons a disk or memory card might be missing or fail to initialize, but
the most common reason is that the disk is failing. There's only so much you can do to
fix a failing disk. The following are some steps to try to get it working again. If the disk
works after you've completed one of these steps, don't bother with the remaining ones.
At this point, maybe update your backups.
1. Look at the disk in Disk Management. If it displays Offline as shown below, right-
click on the Offline disk and select Online.
2. If the disk appears in Disk Management as Online, and has a primary partition
that's listed as Healthy, as shown here, that's a good sign.
If a partition has a file system, but no drive letter (for example, E:), see Change
a drive letter to manually add a drive letter.
If a partition doesn't have a file system (it's listed as RAW instead of NTFS,
ReFS, FAT32, or exFAT) and you know that the disk is empty, select and hold
(or right-click) the partition and select Format. Formatting a disk erases all
data on it, so don't do this step if you're trying to recover files from the disk.
Instead, skip ahead to the next step.
If the partition is listed as Unallocated and you know that the partition is
empty, select and hold (or right-click) the unallocated partition. Then select
New Simple Volume and follow the instructions to create a volume in the
free space. Don't do this step if you're trying to recover files from this
partition. Instead, skip ahead to the next step.
7 Note
Ignore any partitions that are listed as EFI System Partition or Recovery
Partition. These partitions are full of important files that your PC needs to
operate properly. It's best to just leave them alone to do their job of starting
your PC and helping you recover from problems.
3. If you have an external disk that's not showing up, unplug the disk, plug it back in,
and then select Action > Rescan Disks.
4. Shut down your PC, turn off your external hard disk (if it's an external disk with a
power cord), and then turn your PC and the disk back on. To turn off your PC in
Windows 10, select the Start button, select the Power button, and then select Shut
down.
5. Plug the disk into a different USB port that's directly on your PC (not on a hub).
Sometimes, USB disks don't get enough power from some ports, or they have
other issues with particular ports. This issue is especially common with USB hubs,
but sometimes there are differences between ports on a PC. So if you have other
ports, try a few different ones.
6. Try a different cable. Cables fail often, so try using a different cable to plug in the
disk. If you have an internal disk in a desktop PC, you need to shut down your PC
before switching cables. See your PC's manual for details.
7. Check Device Manager for issues. Select and hold (or right-click) the Start button,
then select Device Manager from the context menu. Look for any devices with an
exclamation point beside it or other issues. Select the device and then read its
status.
Here's a list of Error codes in Device Manager , but one approach that sometimes
works is to select and hold (or right-click) the problematic device, select Uninstall
device, and then Action > Scan for hardware changes.
8. Plug the disk into a different PC.
If the disk doesn't work on another PC, it's a good sign that there's something
wrong with the disk, and not your PC. Search for and ask for help at the Microsoft
community site, or contact your disk manufacturer or Microsoft Support .
If you just can't get it working, there are apps that can try to recover data from a
failing disk. Or if the files are vitally important, you can pay a data recovery lab to
try to recover them. If you find something that works for you, let us know in the
comments section.
) Important
Disks fail often, so it's important to regularly back up any files you care about. If
you have a disk that sometimes doesn't appear or gives errors, consider this a
reminder to double-check your backup methods. It's OK if you're a little behind -
we've all been there. The best backup solution is one you use, so we encourage you
to find one that works for you and stick with it.
Tip
For more information on using apps built into Windows to backup files to an
external drive such as a USB drive, see Backup and restore in Windows . You can
also save files in Microsoft OneDrive, which syncs files from your PC to the cloud. If
your hard disk fails, you'll still be able to get any files you store in OneDrive from
OneDrive.com. For more information, see Sync files with OneDrive in Windows .
A basic or dynamic disk's status is Unreadable
Cause: The basic or dynamic disk isn't accessible and might have experienced hardware
failure, corruption, or I/O errors. The disk's copy of the system's disk configuration
database might be corrupted. An error icon appears on disks that display the
Unreadable status.
Disks might also display the Unreadable status while they're spinning up or when Disk
Management is rescanning all of the disks on the system. In some cases, an unreadable
disk has failed and isn't recoverable. For dynamic disks, the Unreadable status usually
results from corruption or I/O errors on part of the disk, rather than failure of the entire
disk.
Solution: Rescan the disks or restart the computer to see if the disk status changes. Also
try the troubleshooting steps described in Disks that are missing or not initialized, plus
general troubleshooting steps.
In some cases, a disk that was previously connected to the system can display the
Foreign status. Configuration data for dynamic disks is stored on all dynamic disks, so
the information about which disks the system owns is lost when all dynamic disks fail.
Solution: Add the disk to your computer's system configuration so that you can access
data on the disk. To add a disk to your computer's system configuration, import the
foreign disk. Select and hold (or right-click) the disk, and then select Import Foreign
Disks. Any existing volumes on the foreign disk become visible and accessible when you
import the disk.
Solution: If the I/O errors are temporary, reactivate the disk to return it to Online status.
If the disk status is Offline and the disk's name changes to Missing, the disk was
recently available on the system but can no longer be located or identified. The missing
disk might be corrupted, powered down, or disconnected.
Solution:
To bring a disk that is Offline and is still named Disk # (not Missing) back online, try one
or more of the following procedures:
1. In Disk Management, select and hold (or right-click) the disk and then select
Reactivate Disk to bring the disk back online. If the disk status remains Offline,
check the cables and disk controller, and make sure that the physical disk is
healthy. Correct any problems and try to reactivate the disk again. If the disk
reactivation succeeds, any volumes on the disk should automatically return to the
Healthy status.
2. In Event Viewer, check the event logs for any disk-related errors such as "No good
config copies." If the event logs contain this error, you can search additional
resources for answers. Or contact Microsoft Product Support .
3. Try moving the disk to another computer. If you can get the disk to go Online on
another computer, the problem is most likely due to the configuration of the
computer on which the disk doesn't go Online.
4. Try moving the disk to another computer that has dynamic disks. Import the disk
on that computer and then move the disk back to the computer on which it
wouldn't go Online.
Solution:
Make sure that the underlying physical disk is turned on, plugged in, and attached
to the computer.
Try the troubleshooting steps described in Disks that are missing or not initialized,
plus general troubleshooting steps.
Make sure the underlying disks are online. If not, return the disks to the Online
status. If this step succeeds, the volume automatically restarts and returns to the
Healthy status. If the dynamic disk returns to the Online status, but the dynamic
volume doesn't return to the Healthy status, you can reactivate the volume
manually.
If the dynamic volume is a mirrored or RAID-5 volume with old data, bringing the
underlying disk online doesn't automatically restart the volume. If the disks that
contain current data are disconnected, bring those disks online first (to let the data
synchronize). Otherwise, restart the mirrored or RAID-5 volume manually, and then
run the error-checking tool or Chkdsk.exe.
Try the troubleshooting steps described in Disks that are missing or not initialized,
plus general troubleshooting steps.
Solution: Initialize the disk. For more information, see Initialize new disks.
A dynamic volume's status is Data Incomplete
Cause: You moved some, but not all of the disks in a multi-disk volume. Data on this
volume gets destroyed unless you move and import the remaining disks that contain
this volume.
Solution:
1. Move all the disks that comprise the multi-disk volume to the computer.
2. Import the disks. For more information on how to move and import disks, see
Move disks to another computer.
If you no longer require the multi-disk volume, you can import the disk and create new
volumes on it. To do so:
1. Select and hold (or right-click) the volume with Failed or Failed Redundancy status
and then select Delete Volume.
2. Select and hold (or right-click) the disk and then select New Volume.
When the volume status is Healthy (At Risk), an underlying disk's status is usually
Online (Errors).
Solution:
1. Return the underlying disk to the Online status. Once you return the disk to Online
status, the volume should return to the Healthy status. If the Healthy (At Risk)
status persists, the disk might be failing.
2. Back up the data and replace the disk as soon as possible.
Solution:
1. If the remote computer supports VDS, you can configure Windows Firewall to
allow VDS connections. If the remote computer doesn't support VDS, you can use
Remote Desktop Connection to connect to it, and then run Disk Management
directly on the remote computer.
2. To manage disks on remote computers that support VDS, configure the Windows
Firewall on both the local computer (on which you're running Disk Management)
and the remote computer.
3. On the local computer, configure Windows Firewall to enable the Remote Volume
Management Exception.
7 Note
Reference
Free up drive space in Windows 10 .
Feedback
Was this page helpful? Yes No
This article provides a workaround for usability limit of Volume Shadow Copy Service
(VSS).
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows 10 - all editions, Windows 7 Service Pack 1
Original KB number: 2967756
Symptoms
You may receive an error message or notice a failure if you try to perform one of the
following operations on Windows client or Windows Server operating systems:
You enable the Volume Shadow Copy Service (VSS) on a volume that is larger than
64 terabytes (TB).
You create writable snapshots or snapshots that are larger than 64 TB.
You enable VSS for a shared folder on a volume that is larger than 64 TB.
You run a backup operation on a volume that is larger than 64 TB that has a
shadow copy enabled.
You run chkdsk.exe on a volume that is larger than 64 TB.
STOP: 0x0000007E
Error 0x80042306: The shadow copy provider had an error. Check the System
and Application event logs for more information.
Cause
This issue occurs because Microsoft does not support VSS on volumes larger than 64 TB.
Also, writable snapshots or snapshots larger than 64 TB are not supported.
Workaround
To work around this issue, do not perform any of the operations that are described in
the "Symptoms" section on a volume that is larger than 64 TB.
More information
For more information about VSS, go to the following Microsoft websites:
Volume Shadow Copy Service
Feedback
Was this page helpful? Yes No
This article describes how to use the Disk Management Snap-in to manage Basic and
Dynamic Disks.
Summary
You can use the Windows Server 2003 Disk Management snap-in tool to manage your
hard disks and the volumes or partitions that they contain. With Disk Management, you
can create and delete partitions; format volumes with the FAT, FAT32, or NTFS file
systems; change basic disks to dynamic disks, and change dynamic disks back to basic
disks; and create fault-tolerant disk systems. You can perform most disk-related tasks
without having to restart your computer because most configuration changes take
effect immediately. This article describes some of the more common disk storage
management tasks that you can perform by using Disk Management.
7 Note
1. Click Start, point to Administrative Tools, and then click Computer Management.
The Disk Management window that appears displays your disks and volumes in a
graphical view or list view.
To customize whether you view your disks and volumes in the upper or lower pane
of the window, point to Top or Bottom on the View menu, and then click the view
that you want.
7 Note
Use basic disks, instead of dynamic disks, on computers that run Microsoft Windows XP
Professional or a member of Windows Server 2003 that are configured to dual-boot or
multi-boot with Microsoft Windows XP Home Edition, Microsoft Windows NT 4.0,
Microsoft Windows Millennium Edition (Me), Microsoft Windows 98 or earlier, or
Microsoft MS-DOS. These operating systems cannot access data that is stored on
dynamic disks.
7 Note
-or-
To create a new logical drive, right-click free space on an extended partition
where you want to create the logical drive, and then click New Logical Drive.
3. On the Select Partition Type page, click the type of partition that you want to
create, and then click Next.
4. On the Specify Partition Size page, specify the size in megabytes (MB) of the
partition that you want to create, and then click Next.
5. On the Assign Drive Letter or Path page, enter a drive letter or drive path, and
then click Next.
6. On the Format Partition page, specify the formatting options that you want, and
then click Next.
7. On the Completing the New Partition Wizard page, verify that the options that
you selected are correct, and then click Finish.
Disk Management creates the new partition or logical drive and displays it in the
appropriate basic disk in the Disk Management window. If you chose to format the
partition in step 6, the format process now starts.
1. In the Disk Management window, right-click the partition or logical drive that you
want to view the properties of, and then click Properties.
2. Click the appropriate tab to view a property.
When you delete a partition or logical drive, you delete all data on that
partition or logical drive and the partition or logical drive itself.
You cannot delete the system partition, the boot partition, or a partition
that contains the active paging (swap) file.
You cannot delete an extended partition unless the extended partition is
empty. You must delete all logical drives before you can delete the
extended partition.
Before you change a basic disk to a dynamic disk, note the following instructions:
You must have at least 1 megabyte (MB) of unallocated disk space available on any
master boot record (MBR) basic disk that you want to change to a dynamic disk.
When you change a basic disk to a dynamic disk, you change the existing
partitions on the basic disk to simple volumes on the dynamic disk.
After you change a basic disk to a dynamic disk, you cannot change the dynamic
volumes back to partitions. Delete all dynamic volumes on the disk first, and then
change the dynamic disk back to a basic disk.
Windows Server 2003 operating systems, Windows XP Professional, and Windows
2000 support dynamic disks. After you change a basic disk to a dynamic disk, you
can only access the disk locally from these operating systems.
1. In the graphical view of the Disk Management window, right-click the basic disk
that you want to change, and then click Convert to Dynamic Disk.
7 Note
To right-click the basic disk, you must right-click the gray area that contains
the disk title at the left of the Disk Management details pane (for example,
Disk 0).
2. Click to select the check box next to the disk that you want to change, and then
click OK.
3. If you want to view the list of volumes in the disk, click Details in the Disks to
Convert dialog box.
4. Click Convert.
5. Click Yes when you are prompted to confirm the conversion, and then click OK.
Local access to dynamic disks (and the data that they contain) is limited to computers
that run Windows Server 2003 operating systems, Windows XP Professional, or Windows
2000. You cannot access or create dynamic volumes on computers that are configured
to dual-boot or multi-boot a Windows Server 2003, Windows XP Professional, or
Windows 2000 and one or more of Windows XP Home Edition, Windows NT 4.0 and
earlier, Windows Millennium Edition, Windows 98 Second Edition and earlier, or MS-
DOS.
You create dynamic disks when you use the Convert to Dynamic Disk command in Disk
Management to change a basic disk.
-or-
3. On the Select Volume Type page, click either Simple volume or Spanned volume,
and then click Next.
4. On the Select Disks page, select one below:
If you are creating a simple volume, verify that the disk that you want to
create a simple volume on is listed in the Selected dynamic disks box.
-or-
If you are creating a spanned volume, click to select the disks that you want
under All available dynamic disks, and then click Add.
Verify that the disks that you want to create a spanned volume on are listed
in the Selected dynamic disks box.
5. In the Size box, specify the size (in MB) that you want for the volume, and then
click Next.
6. On the Assign Drive Letter or Path page, enter a drive letter or drive path, and
then click Next.
7. On the Format Volume page, specify the formatting options that you want, and
then click Next.
8. On the Completing the New Volume Wizard page, make sure that the options
that you selected are correct, and then click Finish.
1. In the Disk Management window, right-click the simple or spanned volume that
you want to extend, and then click Extend Volume.
3. On the Select Disks page, click to select the disk or disks that you want to extend
the volume on, and then click Add.
4. Verify that the disks that you want to extend the volume on are listed in the
Selected dynamic disks box.
5. In the Size box, specify how much unallocated disk space (in MB) that you want to
add, and then Next.
6. On the Completing the Extend Volume Wizard page, make sure that the options
that you selected are correct, and then click Finish.
7 Note
You can only extend NTFS volumes or volumes that do not yet contain a
file system.
If you upgraded from Windows 2000 to Windows Server 2003 (or to
Windows XP Professional), you cannot extend a simple or spanned
volume that you originally created as a basic volume and then changed
to a dynamic volume in Windows 2000.
You cannot extend the system or boot volume.
A RAID-5 volume is a fault-tolerant volume in which data and parity is striped across
three or more physical disks. If part of one physical disk fails, you can recover the data
on the failed disk by using the data and parity information on the functioning disks.
1. In the Disk Management window, right-click the dynamic volume that you want to
view the properties of, and then click Properties.
2. Click the appropriate tab to view a property.
When you delete a volume, you delete all data on the volume and the
volume itself.
You cannot delete the system volume, the boot volume, or any volume
that contains the active paging (swap) file.
To change a dynamic disk back to a basic disk, right-click the dynamic disk that you
want to change back to a basic disk in the Disk Management window, and then click
Convert to Basic Disk.
7 Note
To right-click the disk, right-click the gray area that contains the disk title at the left
of the Disk Management details pane (for example, Disk 0 ).
Troubleshooting
When a disk or volume fails, Disk Management displays status descriptions of disks and
volumes in the Disk Management window. These descriptions, which are shown in the
following list, inform you of the current status of the disk or volume.
Online: It is the normal disk status when the disk is accessible and functioning
correctly.
Healthy: It is the normal volume status when the volume is accessible and
functioning correctly.
Online (Errors) (displayed with dynamic disks only): I/O errors may have been
detected on the dynamic disk.
To resolve this issue, right-click the disk, and then click Reactivate Disk to return
the disk to Online status.
Offline or Missing (displayed with dynamic disks only): The disk may be
inaccessible. This issue may occur if the disk is corrupted or made temporarily
unavailable.
To resolve this issue, repair any disk, controller, or connection problems, verify that
the physical disk is turned on and correctly attached to the computer, right-click
the disk, and then click Reactivate Disk to return the disk to Online status.
For a complete list of disk and volume status descriptions, see Disk Management Help.
(In the Disk Management snap-in, click the Action menu, and then click Help. )
Feedback
Was this page helpful? Yes No
This article discusses the manner in which Windows supports hard disks that have a
storage capacity of more than 2 TB and explains how to initialize and partition disks to
maximize space usage.
Applies to: Windows Server 2022 Standard and Datacenter, Windows Server 2019,
Windows Server 2016, Windows Server 2012 R2
Original KB number: 2581408
Summary
In order for an operating system to fully support storage devices that have capacities
that exceed 2 terabytes (2 TB, or 2 trillion bytes), the device must be initialized by using
the GUID Partition Table (GPT) partitioning scheme. This scheme supports addressing of
the full range of storage capacity. If the user intends to start the computer from one of
these large disks, the system's base firmware interface must use the Unified Extensible
Firmware Interface (UEFI) and not BIOS.
This article outlines Microsoft support across all Windows versions since Windows XP. It
also describes the requirements to address the full storage capability of these devices.
7 Note
This article refers to disk capacity in powers of two instead of powers of 10,
which is the more common designation on storage device capacity labels.
Therefore, references to 2 TB actually refer to a product that is labeled as
having 2.2 TB of capacity.
The operating system-specific behavior that is noted in this article also applies
to the server variants of that system. Therefore, a reference to Windows 7
includes Windows Server 2008 R2, Windows Vista includes Windows Server
2008, and Windows XP includes Windows Server 2003 and Windows Server
2003 R2.
More information
The management of modern storage devices is addressed by using a scheme called
Logical Block Addressing (LBA). It's the arrangement of the logical sectors that
constitute the media. LBA0 represents the first logical sector of the device, and the last
LBA designation represents the last logical sector of the device, one label per sector. To
determine the capacity of the storage device, you multiply the number of logical sectors
within the device by the size of each logical sector. The current size standard is 512
bytes. For example, to achieve a device that has a capacity of 2 TB, you must have
3,906,250,000 512-byte sectors. However, a computer system requires 32 bits (1 s and 0
s) of information to represent this large number. Therefore, any storage capacity that is
greater than what can be represented by using 32 bits would require an additional bit.
That is, 33 bits.
The problem in this computation is that the partitioning scheme that is used by most
modern Windows-based computers is MBR (master boot record). This scheme sets a
limit of 32 for the number of bits that are available to represent the number of logical
sectors.
The 2-TB barrier is the result of this 32-bit limitation. Because the maximum number that
can be represented by using 32 bits is 4,294,967,295, it translates to 2.199 TB of capacity
by using 512-byte sectors (approximately 2.2 TB). Therefore, a capacity beyond 2.2 TB
isn't addressable by using the MBR partitioning scheme.
To make more bits available for addressing, the storage device must be initialized by
using GPT. This partitioning scheme lets up to 64 bits of information be used within
logical sectors. It translates to a theoretical limitation of 9.4 ZB (9.4 zettabytes, or 9.4
billion terabytes). However, the issue that affects GPT is that most currently available
systems are based on the aging BIOS platform. BIOS supports only MBR-initialized disks
to start the computer. To restart from a device that is initialized by using GPT, your
system must be UEFI-capable. By default, many current systems can support UEFI.
Microsoft expects that most future systems will have this support. Customers should
consult with their system vendor to determine the ability of their systems to support
UEFI and disks that have storage capacities that are greater than 2 TB.
The latest storage drivers from your storage controller manufacturer must be
installed. For example, if your system uses an Intel storage controller that is set to
"RAID" mode, make sure that you have the latest applicable drivers from the Intel
support site .
Overall, you should contact your system vendor to determine whether the system
supports device sizes of more than 2 TB.
The Windows version must be one of the following (64-bit only, but including all
SKU editions):
Windows Server 2008 R2
Windows Server 2008
Windows 7
Windows Vista
The latest storage drivers from your storage controller manufacturer must be
installed. For example, if your system uses an Intel storage controller set to RAID
mode, make sure that you have the latest applicable drivers from the Intel support
site .
7 Note
Windows does not support starting GPT-initialized volumes by using UEFI systems
on 32-bit versions of Windows. Also, legacy BIOS systems do not support starting
GPT-partitioned volumes. Consult your system vendor to determine whether the
system supports both UEFI and the startup of devices that have storage capacities
of greater than 2 TB.
Support matrix
The following tables list Microsoft support for the various concepts that are discussed in
this article. This information provides an overall support statement about disks that have
a storage capacity of greater than 2 TB.
ノ Expand table
ノ Expand table
ノ Expand table
Windows Supported Not supported Boot volume not Boot volume not
XP supported supported
ノ Expand table
System >2-TB single disk - MBR >2-TB single disk - >2-TB single disk
Hybrid-MBR - GPT
1. Click Start, type diskmgmt.msc in the Start search box, right-click diskmgmt.msc,
and then click Run as Administrator. If it's necessary, enter the credentials for a
user account that has Administrator privileges.
7 Note
2. In the Initialize Disk dialog box, click GPT (GUID Partition Table), and then press
OK.
7 Note
If you select this option, this hard disk will not be recognized by Windows
versions earlier than and including Windows XP.
3. Check the Disk Management window to verify that the disk is initialized. If it is, the
status row for that disk at the bottom of the window should indicate that the disk
is Online.
4. After the disk is initialized, you must create a partition, and then format that
partition by using a file system. It's to be able to store data in that partition, and
assign a name and a drive letter to that partition. To do it, right-click the
unallocated space on the right side of the status row for that disk, and then click
New Simple Volume. Follow the steps in the partition wizard to complete this
process.
1. Click Start, type diskmgmt.msc in the Start search box, right-click diskmgmt.msc,
and then click Run as Administrator. If it's necessary, enter the credentials for a
user account that has Administrator privileges.
2. In the Disk Management window, examine the disk status rows at the bottom. In
the following example, the user has a 3-TB disk that was previously initialized by
using the MBR partitioning scheme. That device is labeled here as Disk 1.
3. Disk 1 contains two separate unallocated sections. This separation indicates that
the first 2 TB of the disk space can be used. However, the remaining space is non-
addressable because of the 32-bit addressing space limitation of the MBR
partitioning scheme. To enable the system to fully address the total capacity of the
storage device, you must convert the disk to use the GPT partitioning scheme.
4. Right-click the label on the left for the disk that you want to convert, and then click
Convert to GPT Disk.
7 Note
The display should now show that the full amount of available space in
unallocated.
5. Now that the disk is initialized to access the full storage capacity, you must create
a partition, and then format that partition by using a file system. It's to be able to
store data in that partition, and assign a name and a drive letter to that partition.
To do it, right-click the unallocated space on the right side of the status row for
that disk, and then click New Simple Volume. Follow the steps in the partition
wizard to complete this process.
To this point, the following incorrect behavior is known to occur when Windows handles
single-disk storage capacity of greater than 2 TB:
The numeric capacity beyond 2 TB overflows. It results in the system being able to
address only the capacity beyond 2 TB. For example, on a 3-TB disk, the available
capacity may be only 1 TB.
The numeric capacity beyond 2 TB is truncated. It results in no more than 2 TB of
addressable space. For example, on a 3-TB disk, the available capacity may be only
2 TB.
The storage device isn't detected correctly. In this case, it isn't displayed in either
the Device Manager or Disk Management windows. Many storage controller
manufacturers offer updated drivers that provide support for storage capacities of
more than 2 TB. Contact your storage controller manufacturer or OEM to
determine what downloadable support is available for single-disk capacities that
are greater than 2 TB.
For LBA address space that is greater than 2 TB, the disk requires SCSI sense data in
Descriptor format. This format isn't supported by Windows 7 or Windows Server 2008
R2, which retrieves SCSI sense data in Fixed format. Therefore, the retrieved SCSI sense
data either does not contain information about bad sectors or it contains incorrect
information about bad sectors. Administrators should note this limitation when they
look for bad sector LBA information that's recorded in the Windows event log.
Feedback
Was this page helpful? Yes No
This article helps to fix the error "You don't have permission" when you try to mount an
ISO image.
Symptoms
When you try to mount an ISO image in Windows Server 2012 R2, Windows Server
2012, Windows 8.1, or Windows 8, you receive the following error message:
This problem occurs when you perform either of the following operations:
You double-click an .iso file or you use disk image tools to mount an ISO image
from either a local or network source.
You try to mount an ISO image through the shortcut menu in Windows Explorer.
7 Note
Although you receive the error message, the ISO image is mounted successfully in
most cases.
Other reported symptoms
When you click an .iso file in Windows Explorer to try to mount the ISO image, the
operation fails and you receive the following error message:
mount-diskimage: "The version does not support this version of the file
format".
Hresult 0xc03a0005
Cause
This problem may occur for one or more of the following reasons:
To determine whether a file is a sparse file, use one of the following methods.
PowerShell
(get-item c:\test\mydisk.iso).attributes
2. Check for the word "SparseFile" in the command output to indicate a sparse file.
Resolution
To resolve this problem, use one of the following methods.
Resolution 1
Copy the ISO file to a new file by saving it to a different folder or giving it a different
name.
This process should remove the sparse attribute and enable the file to be mounted.
Resolution 2
If you have a flash media reader or any removable media, try to eject the removable
media. Then, reassign the drive letters in such a manner that you leave a lower drive
letter available to mount the ISO image. The file might not behave correctly if it has an
assigned drive that follows other drives.
ノ Expand table
Drive Assignment
C Hard disk
D DVD
E USB device
In this layout, the ISO image is auto assigned to drive F when it is mounted. It causes the
error that is mentioned in the "Symptoms" section. However, the drive continues to
function.
After you eject the ISO drive F, reassign the USB drive to drive F. Now when you mount
the ISO image, it will be auto assigned to drive E without generating any errors. The new
layout will be as follows.
ノ Expand table
Drive Assignment
C Hard disk
D DVD
F USB device
Feedback
Was this page helpful? Yes No
This article describes steps to manually turn disk write caching on or off.
Summary
With some third-party programs, disk write caching has to be turned on or off.
Additionally, turning disk write caching on may increase operating system performance;
however, it may also result in the loss of information if a power failure, equipment
failure, or software failure occurs. This article describes how to turn disk write caching on
or off.
Feedback
Was this page helpful? Yes No
Event ID 51 may occur when you write information to the physical disk. This article
describes how to decode the data section of an Event ID 51 event message.
Summary
When you write information to the physical disk, the following event message may be
logged in the System log:
Output
Event ID: 51
Event Type: Warning
Event Source: Disk
Description: An error was detected on device \Device\Harddisk3\DR3 during a
paging operation.
Data:
0000: 04 00 22 00 01 00 72 00
0008: 00 00 00 00 33 00 04 80
0010: 2d 01 00 00 00 00 00 00
0018: 00 00 00 00 00 00 00 00
0020: 00 52 ea 04 15 00 00 00
0028: 01 00 00 00 04 00 00 00
0030: 03 00 00 00 2a 00 00 00
0038: 02 84 00 00 00 29 06 00
0040: 2a 60 0a 82 75 29 00 00
0048: 80 00
7 Note
The device in the description and the specific hexadecimal data may vary.
More information
If a generic error occurs when your computer pages information to or from the disk, an
Event ID 51 event message is logged. In a paging operation, the operating system either
swaps a page of memory from memory to disk, or retrieves a page of memory from disk
to memory. It's part of the memory management of Windows.
However, the computer may log this event message when it loads images from a
storage device, reads, and writes to locally mapped files or to any file (as long as it's
buffered I/O). The computer doesn't log this event message when it performs
nonbuffered I/O. You can troubleshoot an Event ID 51 event message exactly like you
troubleshoot Event ID 9 or Event ID 11 event messages.
Under certain circumstances, the system logs the following Event ID 51 event message:
Output
In this case, no harmful effects are experienced. For example, Event ID 51 is logged
when blank media such as CDR, CDRW, DVDR, is inserted into a writable drive while a
USB device is plugged in. The system logs the event even though the disc is writable,
and the USB device is still usable. In these particular cases, you can safely ignore the log
entries. No action is required.
7 Note
On Windows Vista and later versions, the event log entry size has been increased, and
DeviceName isn't truncated.
You can use the binary data associated with any DISK error (Event ID 7, 9, 11, 51, and
other Event IDs) to help you identify the problem by decoding the data section.
An Event ID 51 has an extra Command Descriptor Block (CDB) box. Consider the
following information when you review the data section of an Event ID 51 event
message.
ノ Expand table
0x08 2 Unused
0x35 3 Unused
0008: 00 00 00 00 33 00 04 80
ErrorCode = 0x80040033
This code is the code for error 51. This code is the same for all Event ID 51 event
messages:
IO_WARNING_PAGING_FAILURE
7 Note
When you interpret the hexadecimal data in the Event ID to the status code,
remember that the values are represented in the little endian format.
0010: 2d 01 00 00 00 00 00 00
FinalStatus = 0x00000000
7 Note
When you interpret the hexadecimal data in the Event ID to the status code,
remember that the values are represented in the little endian format.
0028: 01 00 00 00 04 00 00 00
0030: 03 00 00 00 2a 00 00 00
LUN = 0x0000003
It may be easier to identify the volume by using the symbolic link listed to the drive in
the description of the Event ID. For example, \Device\Harddisk3\DR3 .
7 Note
The destination disk information is how it appears to the operating system. Storage
virtualization and multipath I/O software may mask what is presented to the
operating system. This information may not directly correspond to the physical
mappings.
0038: 02 84 00 00 00 29 06 00
ScsiStatus of 0x02:
SCSISTAT_CHECK_CONDITION
C++
0x00 = SCSISTAT_GOOD
0x02 = SCSISTAT_CHECK_CONDITION
0x04 = SCSISTAT_CONDITION_MET
0x08 = SCSISTAT_BUSY
0x10 = SCSISTAT_INTERMEDIATE
0x14 = SCSISTAT_INTERMEDIATE_COND_MET
0x18 = SCSISTAT_RESERVATION_CONFLICT
0x22 = SCSISTAT_COMMAND_TERMINATED
0x28 = SCSISTAT_QUEUE_FULL
SrbStatus of 0x84:
SRB_STATUS_AUTOSENSE_VALID | SRB_STATUS_ERROR
C++
0x00 = SRB_STATUS_PENDING
0x01 = SRB_STATUS_SUCCESS
0x02 = SRB_STATUS_ABORTED
0x03 = SRB_STATUS_ABORT_FAILED
0x04 = SRB_STATUS_ERROR
0x05 = SRB_STATUS_BUSY
0x06 = SRB_STATUS_INVALID_REQUEST
0x07 = SRB_STATUS_INVALID_PATH_ID
0x08 = SRB_STATUS_NO_DEVICE
0x09 = SRB_STATUS_TIMEOUT
0x0A = SRB_STATUS_SELECTION_TIMEOUT
0x0B = SRB_STATUS_COMMAND_TIMEOUT
0x0D = SRB_STATUS_MESSAGE_REJECTED
0x0E = SRB_STATUS_BUS_RESET
0x0F = SRB_STATUS_PARITY_ERROR
0x10 = SRB_STATUS_REQUEST_SENSE_FAILED
0x11 = SRB_STATUS_NO_HBA
0x12 = SRB_STATUS_DATA_OVERRUN
0x13 = SRB_STATUS_UNEXPECTED_BUS_FREE
0x14 = SRB_STATUS_PHASE_SEQUENCE_FAILURE
0x15 = SRB_STATUS_BAD_SRB_BLOCK_LENGTH
0x16 = SRB_STATUS_REQUEST_FLUSHED
0x20 = SRB_STATUS_INVALID_LUN
0x21 = SRB_STATUS_INVALID_TARGET_ID
0x22 = SRB_STATUS_BAD_FUNCTION
0x23 = SRB_STATUS_ERROR_RECOVERY
0x24 = SRB_STATUS_NOT_POWERED
0x30 = SRB_STATUS_INTERNAL_ERROR
(used by the port driver to indicate that a non-scsi-related error occurred)
0x38 - 0x3f = Srb status values reserved for internal port driver use.
C++
0x80 = SRB_STATUS_AUTOSENSE_VALID
0x40 = SRB_STATUS_QUEUE_FROZEN
You must break down SRB status masks because they are a substatus. They are
combined with the SRB status codes.
0038: 02 84 00 00 00 29 06 00
C++
0x06 = SCSI_SENSE_UNIT_ATTENTION
C++
0x00 = SCSI_SENSE_NO_SENSE
0x01 = SCSI_SENSE_RECOVERED_ERROR
0x02 = SCSI_SENSE_NOT_READY
0x03 = SCSI_SENSE_MEDIUM_ERROR
0x04 = SCSI_SENSE_HARDWARE_ERROR
0x05 = SCSI_SENSE_ILLEGAL_REQUEST
0x06 = SCSI_SENSE_UNIT_ATTENTION
0x07 = SCSI_SENSE_DATA_PROTECT
0x08 = SCSI_SENSE_BLANK_CHECK
0x09 = SCSI_SENSE_UNIQUE
0x0A = SCSI_SENSE_COPY_ABORTED
0x0B = SCSI_SENSE_ABORTED_COMMAND
0x0C = SCSI_SENSE_EQUAL
0x0D = SCSI_SENSE_VOL_OVERFLOW
0x0E = SCSI_SENSE_MISCOMPARE
0x0F = SCSI_SENSE_RESERVED
The ASC is located in the sixth byte in line 0038 at offset 003d, and has a value of 29. For
the specified sense key, it maps to:
C++
0x29 = SCSI_ADSENSE_BUS_RESET
Additional sense codes: (from SCSI.H)
C++
0x00 = SCSI_ADSENSE_NO_SENSE
0x02 = SCSI_ADSENSE_NO_SEEK_COMPLETE
0x04 = SCSI_ADSENSE_LUN_NOT_READY
0x0C = SCSI_ADSENSE_WRITE_ERROR
0x14 = SCSI_ADSENSE_TRACK_ERROR
0x15 = SCSI_ADSENSE_SEEK_ERROR
0x17 = SCSI_ADSENSE_REC_DATA_NOECC
0x18 = SCSI_ADSENSE_REC_DATA_ECC
0x20 = SCSI_ADSENSE_ILLEGAL_COMMAND
0x21 = SCSI_ADSENSE_ILLEGAL_BLOCK
0x24 = SCSI_ADSENSE_INVALID_CDB
0x25 = SCSI_ADSENSE_INVALID_LUN
0x27 = SCSI_ADSENSE_WRITE_PROTECT
0x28 = SCSI_ADSENSE_MEDIUM_CHANGED
0x29 = SCSI_ADSENSE_BUS_RESET
0x2E = SCSI_ADSENSE_INSUFFICIENT_TIME_FOR_OPERATION
0x30 = SCSI_ADSENSE_INVALID_MEDIA
0x3a = SCSI_ADSENSE_NO_MEDIA_IN_DEVICE
0x3b = SCSI_ADSENSE_POSITION_ERROR
0x5a = SCSI_ADSENSE_OPERATOR_REQUEST
0x5d = SCSI_ADSENSE_FAILURE_PREDICTION_THRESHOLD_EXCEEDED
0x64 = SCSI_ADSENSE_ILLEGAL_MODE_FOR_THIS_TRACK
0x6f = SCSI_ADSENSE_COPY_PROTECTION_FAILURE
0x73 = SCSI_ADSENSE_POWER_CALIBRATION_ERROR
0x80 = SCSI_ADSENSE_VENDOR_UNIQUE
0xA0 = SCSI_ADSENSE_MUSIC_AREA
0xA1 = SCSI_ADSENSE_DATA_AREA
0xA7 = SCSI_ADSENSE_VOLUME_OVERFLOW
The ASCQ is located in the fifth byte in line 0038 at offset 003C, and has a value of 00.
It's 00 in this example, so it doesn't apply for the specified ASC. This list of ASCQ for
each sense code is too large to include in this article. View SCSI.H in the DDK for more
information.
7 Note
All ASC and ASCQ values above 0x80 are vendor specific and are not documented
in the SCSI specification or Microsoft DDK. Refer to the hardware vendor.
The bytes at offset 0x40 represent the CDB code. The bytes from offset 0x43 to 0x46
represent the starting sector, and offset 0x47 to 0x49 represent the number of sectors
involved in the operation.
7 Note
The CDB data section isn't in the little-endian format. So the bytes shouldn't be
flipped. Be careful when you decode this section, because the format is different
from earlier sections.
C++
C++
0x00 = SCSIOP_TEST_UNIT_READY
0x01 = SCSIOP_REZERO_UNIT
0x01 = SCSIOP_REWIND
0x02 = SCSIOP_REQUEST_BLOCK_ADDR
0x03 = SCSIOP_REQUEST_SENSE
0x04 = SCSIOP_FORMAT_UNIT
0x05 = SCSIOP_READ_BLOCK_LIMITS
0x07 = SCSIOP_REASSIGN_BLOCKS
0x07 = SCSIOP_INIT_ELEMENT_STATUS
0x08 = SCSIOP_READ6
0x08 = SCSIOP_RECEIVE
0x0A = SCSIOP_WRITE6
0x0A = SCSIOP_PRINT
0x0A = SCSIOP_SEND
0x0B = SCSIOP_SEEK6
0x0B = SCSIOP_TRACK_SELECT
0x0B = SCSIOP_SLEW_PRINT
0x0C = SCSIOP_SEEK_BLOCK
0x0D = SCSIOP_PARTITION
0x0F = SCSIOP_READ_REVERSE
0x10 = SCSIOP_WRITE_FILEMARKS
0x10 = SCSIOP_FLUSH_BUFFER
0x11 = SCSIOP_SPACE
0x12 = SCSIOP_INQUIRY
0x13 = SCSIOP_VERIFY6
0x14 = SCSIOP_RECOVER_BUF_DATA
0x15 = SCSIOP_MODE_SELECT
0x16 = SCSIOP_RESERVE_UNIT
0x17 = SCSIOP_RELEASE_UNIT
0x18 = SCSIOP_COPY
0x19 = SCSIOP_ERASE
0x1A = SCSIOP_MODE_SENSE
0x1B = SCSIOP_START_STOP_UNIT
0x1B = SCSIOP_STOP_PRINT
0x1B = SCSIOP_LOAD_UNLOAD
0x1C = SCSIOP_RECEIVE_DIAGNOSTIC
0x1D = SCSIOP_SEND_DIAGNOSTIC
0x1E = SCSIOP_MEDIUM_REMOVAL
0x23 = SCSIOP_READ_FORMATTED_CAPACITY
0x25 = SCSIOP_READ_CAPACITY
0x28 = SCSIOP_READ
0x2A = SCSIOP_WRITE
0x2B = SCSIOP_SEEK
0x2B = SCSIOP_LOCATE
0x2B = SCSIOP_POSITION_TO_ELEMENT
0x2E = SCSIOP_WRITE_VERIFY
0x2F = SCSIOP_VERIFY
0x30 = SCSIOP_SEARCH_DATA_HIGH
0x31 = SCSIOP_SEARCH_DATA_EQUAL
0x32 = SCSIOP_SEARCH_DATA_LOW
0x33 = SCSIOP_SET_LIMITS
0x34 = SCSIOP_READ_POSITION
0x35 = SCSIOP_SYNCHRONIZE_CACHE
0x39 = SCSIOP_COMPARE
0x3A = SCSIOP_COPY_COMPARE
0x3B = SCSIOP_WRITE_DATA_BUFF
0x3C = SCSIOP_READ_DATA_BUFF
0x40 = SCSIOP_CHANGE_DEFINITION
0x42 = SCSIOP_READ_SUB_CHANNEL
0x43 = SCSIOP_READ_TOC
0x44 = SCSIOP_READ_HEADER
0x45 = SCSIOP_PLAY_AUDIO
0x46 = SCSIOP_GET_CONFIGURATION
0x47 = SCSIOP_PLAY_AUDIO_MSF
0x48 = SCSIOP_PLAY_TRACK_INDEX
0x49 = SCSIOP_PLAY_TRACK_RELATIVE
0x4A = SCSIOP_GET_EVENT_STATUS
0x4B = SCSIOP_PAUSE_RESUME
0x4C = SCSIOP_LOG_SELECT
0x4D = SCSIOP_LOG_SENSE
0x4E = SCSIOP_STOP_PLAY_SCAN
0x51 = SCSIOP_READ_DISK_INFORMATION
0x52 = SCSIOP_READ_TRACK_INFORMATION
0x53 = SCSIOP_RESERVE_TRACK_RZONE
0x54 = SCSIOP_SEND_OPC_INFORMATION
0x55 = SCSIOP_MODE_SELECT10
0x5A = SCSIOP_MODE_SENSE10
0x5B = SCSIOP_CLOSE_TRACK_SESSION
0x5C = SCSIOP_READ_BUFFER_CAPACITY
0x5D = SCSIOP_SEND_CUE_SHEET
0x5E = SCSIOP_PERSISTENT_RESERVE_IN
0x5F = SCSIOP_PERSISTENT_RESERVE_OUT
0xA0 = SCSIOP_REPORT_LUNS
0xA1 = SCSIOP_BLANK
0xA3 = SCSIOP_SEND_KEY
0xA4 = SCSIOP_REPORT_KEY
0xA5 = SCSIOP_MOVE_MEDIUM
0xA6 = SCSIOP_LOAD_UNLOAD_SLOT
0xA6 = SCSIOP_EXCHANGE_MEDIUM
0xA7 = SCSIOP_SET_READ_AHEAD
0xAD = SCSIOP_READ_DVD_STRUCTURE
0xB5 = SCSIOP_REQUEST_VOL_ELEMENT
0xB6 = SCSIOP_SEND_VOLUME_TAG
0xB8 = SCSIOP_READ_ELEMENT_STATUS
0xB9 = SCSIOP_READ_CD_MSF
0xBA = SCSIOP_SCAN_CD
0xBB = SCSIOP_SET_CD_SPEED
0xBC = SCSIOP_PLAY_CD
0xBD = SCSIOP_MECHANISM_STATUS
0xBE = SCSIOP_READ_CD
0xBF = SCSIOP_SEND_DVD_STRUCTURE
0xE7 = SCSIOP_INIT_ELEMENT_RANGE
Feedback
Was this page helpful? Yes No
This article provides the steps to add a pass-through disk to a highly available virtual
machine (VM) in a Windows Server 2008 R2 Service Pack 1 (SP1)-based failover cluster,
and helps solve the issue where the added pass-through disk status is displayed as
read-only.
2. Configure the pass-through disk on the Storage Area Network (SAN), and map the
disk to each cluster node.
3. Open the Disk Management snap-in, and then verify that each cluster node
detects the disk and that the disk status is Offline.
4. Right-click the name of the disk, and then click Online to bring the disk online.
5. Right-click the name of the disk, and then click Initialize Disk to initialize the disk.
6. Right-click the name of the disk, and then click Offline to take the disk offline.
7 Note
You must take the disk offline before you add the disk to the cluster.
7. Add the disk to the failover cluster. To do this, follow these steps:
a. Open the Failover Cluster Manager snap-in, right-click Storage in the console
tree, and then click Add disk.
b. In the Add Disks to a Cluster dialog box, click to select the check box for the
disk that you want to add, and then click OK.
c. In the Storage pane, verify that the disk is listed in Available Storage and that
the disk status is Online.
8. Add the disk to an existing highly available VM in the cluster. To do this, follow
these steps:
a. In the Failover Cluster Manager snap-in, right-click the VM listed under Virtual
Machine, and then click Settings.
b. In the Settings dialog box, select a disk controller, and then click Add to add the
disk to the disk controller. For example, click SCSI Controller, and then click Add
to add the disk to the SCSI controller.
c. In the Hard Drive pane, select the disk from the Physical hard disk list, and then
click OK.
7 Note
If you cannot find the disk from the Physical hard disk list, verify that the
disk status is Offline in the Disk Management snap-in.
d. Verify that the disk is displayed under Disk Drivers of the VM. Verify that the
disk is displayed in the Dependencies tab of the properties dialog box for the
VM.
9. In the Failover Cluster Manager snap-in, right-click the VM, and then click
Connect.
10. In the Disk Management snap-in, verify that the disk is added and that the disk
status is Offline.
11. Right-click the name of the disk, and then click Online to bring the disk online.
7 Note
1. Open a command prompt on the VM, type the net stop vds command, and then
press ENTER to stop the Virtual Disk Service (VDS).
2. At the command prompt on the VM, type the net start vds command, and then
press ENTER to restart the VDS.
3. Open the Disk Management snap-in, and verify the disk status. If the disk status is
still Read Only, restart the VM.
Feedback
Was this page helpful? Yes No
This article provides methods to start the StorageReplica service after an Azure Stack
hyperconverged infrastructure (HCI) upgrade.
Summary
After you upgrade a stretched cluster from Azure Stack HCI, version 20H2 to version
21H2, all the replicated Cluster Shared Volumes are offline.
Output
7 Note
These methods are required only once on each server after a Cluster-Aware
Updating (CAU) upgrade.
7 Note
PowerShell
PowerShell
Feedback
Was this page helpful? Yes No
This article describes the support information for the large-sector (4K) drives when
they're used with Windows and other Microsoft products.
Applies to: Windows 10, version 1809, and later versions, Windows Server 2019,
Windows 7 Service Pack 1, Windows Server 2016, Windows Server 2012 R2
Original KB number: 2510009
Summary
Over the next few years, the data storage industry will be transitioning the physical
format of hard disk drives from 512-byte sectors to 4,096-byte sectors (also known as
4K, or 4KB sectors). This transition is driven by several factors, including increases in
storage density and reliability. This transition causes incompatibility issues with existing
software (including operating systems and applications).
This article describes the current Microsoft support policy for these new drive types in
Windows. Applications and hardware devices may have reliability and performance
issues when they're connected to these new kinds of drives. Contact your application
and hardware vendors about their support policies for these new drive types.
There are three drive types that we'll discuss here. Because Microsoft support policy
differs for each, you should verify the drive type that you've installed before you read
any further.
ノ Expand table
To verify the kind of drive that you have, follow these steps:
1. Install KB 982018 .
Console
3. Use the following values to determine the kind of drive that you have.
ノ Expand table
Bytes Per Sector Bytes per Physical Sector Drive type
value value
The below list summarizes the new features delivered as part of Windows 8 and
Windows Server 2012 to help improve customer experience with large sector disks.
For more detailed description for each item, see Advanced format (4K) disk
compatibility update.
Builds upon the Windows 7 SP1 support for 4K disks with emulation (512e). And
it provides full inbox support for disks with 4K sector size without emulation (4K
Native). Some supported apps and scenarios include:
Ability to install Windows to and boot from a 4K sector disk without
emulation (4K Native Disk)
New VHDx file format
Full Hyper-V support
Windows backup
Full support with the NT File System (NTFS)
Full support with the Resilient File System (ReFS)
Full support with Storage Spaces
Full support with Windows Defender
Inbox application support
Make sure that the drivers and firmware for your storage controller and other
hardware components are updated. Also, make sure that the drives and
firmware support large-sector drives.
Use the updated Windows Preinstallation Environment (Windows PE) for SP1
that will be released as part of the updated pieces of the Windows Automated
Installation Kit (AIK) Supplement for Windows® 7 SP1 and of the Windows
OEM Preinstallation Kit (OPK). Or, embed update 982018 into Windows PE.
Hyper-V: Using Hyper-V with large-sector drives in Windows Server 2008 and
Windows Server 2008 R2
On Windows 7 and Windows 2008 R2, installation will fail with an error Windows
Setup could not configure Windows on this computer's hardware. This issue
occurs under the conditions that are outlined in the following article:
"Windows Setup could not configure Windows on this computer's hardware"
installation error on a Windows 7 or Windows Server 2008 R2 computer .
If you're using a logical sector drive of a size other than 512 bytes, Windows
system image backup and restore operations may fail. And you receive the
following error message:
If you create a virtual hard disk (VHD) on a native 4K sector drive by using Disk
Management or Hyper-V in Windows Server 2008 R2, the operation fails with an
Incorrect Function error.
In Hyper-V, the following error message is generated when the New Virtual
Hard Disk Wizard is used:
The server encountered an error trying to create the virtual hard disk. The
system failed to create 'I:\Disk0.vhd.' Error Code: Incorrect function.
In Hyper-V, the following error message is generated when the New Virtual
Machine Wizard is used:
The server encountered an error while configuring hard disk on TestVM. The
system failed to create 'I:\TestVM\TestVM.vhd.' Error Code: Incorrect
function.
If fsutil.exe continues to display Bytes Per Physical Sector: <Not Supported> after
you apply the latest storage driver and the required hotfixes, make sure that the
following registry path exists:
Location: HKEY_LOCAL_MACHINE\CurrentControlSet\Services\<miniport's service
name>\Parameters\Device\
Name: EnableQueryAccessAlignment
Type: REG_DWORD
Value: 1: Enable
Unsupported scenarios
If your storage device and operating system are noted as unsupported, Microsoft
Support will offer troubleshooting tips if the customer requests them. Microsoft doesn't
guarantee that a resolution will be found for problems that involve unsupported storage
devices. If no resolution is found, the cost of investigating the incident isn't refunded. If
it's not agreed that a solution isn't guaranteed, Microsoft Support won't troubleshoot
the issue and will refund the cost of investigating the incident.
Microsoft Support will use standard troubleshooting processes to isolate the storage
issue. Some typical troubleshooting methods that Microsoft Support will use include:
7 Note
Feedback
Was this page helpful? Yes No
This article provides methods to solve the USB Device not recognized error that occurs
when you try to access a USB external hard drive.
Symptoms
When you try to access data on an external USB hard drive, you may receive the
following error:
USB Device not recognized: One of the devices attached to this computer has
malfunctioned and windows does not recognize it.
Cause
This issue can be caused if any of the following situations exist:
7 Note
Connecting your USB external hard drive into a non-powered USB hub can cause a
lack of enough power to operate the external drive. Instead, plug it directly into
your computer.
1. Go to KB976972 You encounter problems when you move data over USB from a
Windows 7-based computer that has an NVIDIA USB EHCI chipset and at least 4
GB of RAM .
2. Under Update information, select Download the update package now that
corresponds with your version of Windows 7.
a. If you're unsure of which version of Windows 7 you are running, select the Start
button, press and hold (or right-click) Computer > Properties.
If 64-bit Operating System is listed next to System type, you're running the
64-bit version of Windows 7.
If 32-bit Operating System is listed next to System type, you're running the
32-bit (x86) version of Windows 7.
3. Select Continue. If a User Account Control permission prompt occurs, select Yes.
9. If prompted, review the license agreement. If you agree to the terms, select I
Accept.
10. Check the box next to your version of Windows 7, then enter your email in the
boxes below.
12. Check your email. You will soon see an email from Microsoft with a download link
for the hotfix. Select the link and follow the onscreen instructions to download and
install the hotfix.
1. Select the Start button, type Windows Update in the Search box, and then select
Windows Update in the results pane.
2. Select Check for Updates. After the scan is complete, select Review optional
updates.
3. Select the check box next to the updates, then select Install updates.
4. If prompted, review the license agreement, then select I Accept.
5. Follow the onscreen instructions to download and install the updates.
6. If prompted, reboot your computer.
1. Select Start, then type device manager in the Search box, and then select Device
Manager.
2. Expand Universal Serial Bus controllers. Press and hold (or right-click) a device and
select Uninstall. Repeat for each device.
3. Once complete, restart your computer. Your USB controllers will automatically
install.
1. Select the Start button, type power plan in the Search box, and then select Choose
a power plan.
2. Next to your currently selected plan, select Change Plan Settings.
3. Select Change advanced power settings.
4. Select the box to expand USB Settings > USB selective suspend settings.
5. Select Plugged in, select the drop-down menu, and then select disabled.
6. If you're using a laptop, select Battery, select the drop-down menu, and then
select disabled.
7. Select Apply > OK.
1. Review your computer's documentation that should contain the name of the
motherboard manufacturer.
2. Visit your computer manufacturer's support website. For a list of computer
manufacturers' support sites, see Computer manufacturers' contact information .
3. Navigate their website to find the appropriate drivers for your motherboard. For
assistance, contact your computer manufacturer.
If your issue still exists, we recommend contacting Microsoft product support.
More information
For more information, see Windows Update .
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4562879
The following article explains how to expand tiered storage spaces on a stand-alone
server. Here's an example of a tiered space created with a 12.1 TB size in Windows
Server 2016.
3. Run the get-physicaldisk | fl * cmdlet and copy the UniqueId of the newly
added disk:
4. Run the following cmdlet to change the Media Type of the newly added disk:
PowerShell
PowerShell
This article describes how to create a system state backup on one computer and how to
restore it to the same computer or to a different physical computer of the same make
and model.
Summary
One of the following problems may occur with your computer:
Hardware failure
Software failure
Computer theft
Natural disaster
User error
To recover from one of these problems, you can restore the Microsoft Windows
operating system from a system state backup. You can restore a system state backup to
the same physical computer from which the system state backup was created, or to a
different physical computer that has the same make, model, and configuration (identical
hardware).
However, we do not support restoring a system state backup from one computer to a
second computer of a different make, model, or hardware configuration. We only
provide commercially reasonable efforts to support this process. Even if the source and
destination computers seem to be identical makes and models, the source computers
may have different drivers, hardware, or firmware than the destination computers.
7 Note
Both the Target machine being backed up and the Destination machine receiving
the restore have to be either Unified Extensible Firmware Interface (UEFI) or BIOS
based. You cannot mix the two in a BMR scenario.
In this scenario, you can protect the server by doing a BMR backup of all critical
volumes on the server. You then recover the server by doing a BMR recovery
through Windows Recovery. In this scenario, BMR is supported to different
hardware.
In this scenario, you can protect the server by doing a System State Backup or a
BMR backup. You would then recover the server by doing a System State Recovery
from the started operating system.
The following table outlines supported and unsupported system recovery scenarios.
ノ Expand table
Scenario Supported
System State Recovery after BMR / Full Server restore to the same hardware Yes
System State Recovery after BMR / Full Server restore to different hardware No
System State Recovery after Full Server restore (without BMR) to the same or No
different hardware
7 Note
Windows Server Backup ensures that the system boots successfully after the BMR
restore process. Applications/Roles that rely on hardware-specific identifiers like
NIC address, and so on, may require additional reconfiguration or recovery to make
them functional.
For example, if the source is using the MPS multiprocessor HAL, you can restore data to
a destination computer that uses the MPS uniprocessor HAL. However, you can't restore
data to a destination computer that uses the ACPI multiprocessor HAL.
7 Note
If the destination computer's HAL is compatible, but not identical, to the source
computer's HAL, you must update the HAL on the destination computer after you
finish the restore. For example, if the source computer has a single processor and is
using the ACPI uniprocessor HAL, you can restore a backup from that computer to
a multiprocessor destination computer. However, the destination computer will not
use more than one processor until you update the HAL to an ACPI multiprocessor
HAL.
To determine the computer HAL type that you're using on each computer, follow these
steps:
1. Select Start, point to Settings, select Control Panel, and then select System.
2. On the Hardware tab, select Device Manager, and then expand the Computer
branch.
Filter drivers
Uninstall third-party filter drivers on the source computer before you do the backup.
These kinds of drivers can cause problems when the backup is restored to a different
computer.
Hardware
If you remove any hardware on the destination computer that isn't required to complete
the restore process, you increase the probability of a successful restore operation. For
example, physically remove or disable all except one network adapter. Install or enable
the additional adapters after you restart the operating system after the restore
operation.
To resolve issues with the display settings or with a network adapter, remove the
graphics adapter or the network adapter from Device Manager, and then restart the
computer. Windows will detect again the device and possibly prompt you for drivers.
To resolve the Stop error or the problem where a computer stops responding, do an in-
place upgrade of Windows.
After you finish the in-place upgrade, verify that the ClientProtocols registry subkey
exists and is populated correctly. To do this, follow these steps:
1. Select Start, select Run, type regedit, and then select OK.
2. Locate and then right-click the following registry subkey. Verify that the values in
the following list exist:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\ClientProtocols
ノ Expand table
Value name Value type Value data
7 Note
If the source computer was upgraded from Windows NT 4.0, the user profiles may
be stored in the %systemroot%\Profiles folder instead of in the
%systemdrive%\Documents and Settings folder. After an in-place upgrade is
performed, you may have to change the following registry value back to
%systemroot%\Profiles.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
ノ Expand table
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Microsoft Windows Server backup fails
with an error: A Volume Shadow Copy Service Operation failed.
Symptoms
A backup of the server may fail with the following error message:
A Volume Shadow Copy Service Operation failed. Detailed Error: The volume
shadow copy operation failed with error 0x800423F4. View the event log for more
information.
The following error message will be recorded in the application event log:
Output
If you examine the application event log more, you will notice numerous errors from
sources SQLWriter and SQLVDI.
Output
Output
Cause
When Windows Server backup attempts to back up a disk volume, a Volume Shadow
Copy Snapshot is created for the volume. When the snapshot is created, any Volume
Shadow Copy Service (VSS) writer associated with the volume is called. If any of the VSS
writers encounter an error, the entire backup job will fail. In this example, the SQL VSS
writer is encountering an error and causing the backup job to fail.
Resolution
The error is typically caused by a problem with one of the SQL Server instances. In order
to troubleshoot the problem, you must first figure out which SQL Server instance has
the problem. Usually, the problematic SQL Server instance will be named in the first
recorded SQLVDI error.
For example:
Output
Log Name: Application
Source: SQLVDI
Event ID: 1
Level: Error
Description:
SQLVDI: Loc=SignalAbort. Desc=Client initiates abort. ErrorCode=(0).
Process=4772. Thread=10300. Client. Instance= SBSMONITORING .
VD=Global{3AB8F080-950C-4EF9-B637-0F37B2428F17}1_SQLVDIMemoryName_0.
In this example, the SQL Server instance named SBSMONITORING is failing the snapshot.
There may also be an error message from source SQLWRITER that occurs at about the
same time as the first SQLVDI error. The SQLWRITER error message may identify the
database name that is having a problem with the snapshot.
For example:
Output
Once you have identified the SQL Server instance that is having a problem, the first step
would be to test the backup with that SQL Server instance stopped. In our example of
the SBSMonitoring instance, you would stop the SQL Server (SBSMonitoring) service
on the server.
You would then run the backup job with the affected SQL Server instance stopped. If the
backup completes, then you know the failure is caused by the SQL Server instance that
is not running. You would then examine the SQL Server error log files and the event logs
to see if we can determine what is wrong with that particular instance of SQL Server.
If you can't determine the problematic SQL Server instance from the event logs, you can
always stop all the SQL Server instances on the server and try to run backup with SQL
stopped. If all the SQL Server instances are stopped, the SQL VSS writer will not be used.
On a default installation of Small Business Server 2008, you would stop the following
services:
On a default installation of Small Business Server 2011 Standard, you would stop the
following services:
Feedback
Was this page helpful? Yes No
This article discusses an issue where backup operation using Windows Server Backup or
a third-party backup application fails.
Symptoms
A backup operation using Windows Server Backup or a third-party backup application
fails on Windows Server.
On Windows Server 2008, if Windows Server Backup was used to perform the backup,
the backup operation fails with one of the following errors:
Or
On Windows Server 2008 R2, if Windows Server Backup was used to perform the
backup, the backup operation fails with one of the following errors:
Windows Backup failed to create the shadow copy on the storage location.
Or
The creation of the shadow copy on the backup storage destination failed.
Cause
This issue can occur if the ServiceDll registry value for Swprv is missing or incorrect.
Resolution
To resolve this issue, perform the following steps:
1. Click Start, type regedit in the Start Search box, and hit Enter.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\swprv\Parameters
7 Note
If the Parameters registry key is missing, perform the following steps: Right-
click the swprv registry key, select New, select Key, type Parameters and hit
Enter.
3. Once the Parameters registry key is selected, verify that the ServiceDll registry
value has the following value:
%Systemroot%\System32\swprv.dll
7 Note
This article resolves a problem that occurs when you use the vssadmin list writers
command on a Windows Server 2003-based computer. when the issue occurs, you may
receive an error message, an event, or the list may be blank.
Symptoms
When you run the vssadmin list writers command on a Windows Server 2003-based
computer, you may experience any of the following symptoms.
7 Note
The vssadmin list writers command lists the subscribed volume shadow copy
writers.
Error: 0x8000FFFF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem\{26c409cc-ae86-11d1-b616-
00805fc79216}\Subscriptions
Resolution
) Important
This article is not for use with Windows Vista, with Windows Server 2008, or with
later Windows operating systems. Starting with Windows Vista and with Windows
Server 2008, Windows component installation is manifest-based. Trying to manually
register specific components, as described in the following steps, can have
unexpected results that may require you to reinstall Windows to resolve.
1. Click Start > Run, type Regedit, and then click OK.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem\{26c409cc-ae86-11d1-b616-
00805fc79216}\Subscriptions
3. On the Edit menu, click Delete, and then click Yes to confirm that you want to
delete the subkey.
6. Right-click the following services one at a time. For each service, click Restart:
7. Click Start > Run, type cmd, and then click OK.
8. At the command prompt, type vssadmin list writers, and then press Enter.
9. If the VSS writers are now listed, close the Command Prompt window. You don't
have to complete the remaining steps.
If the VSS writers aren't listed, type the following commands at the command
prompt. Press Enter after each command.
cd /d %windir%\system32
regsvr32 ole32.dll
regsvr32 oleaut32.dll
regsvr32 /i eventcls.dll
regsvr32 vss_ps.dll
vssvc /register
regsvr32 /i swprv.dll
regsvr32 es.dll
regsvr32 stdprov.dll
regsvr32 vssui.dll
regsvr32 msxml.dll
regsvr32 msxml3.dll
regsvr32 msxml4.dll
7 Note
10. At the command prompt, type vssadmin list writers, and then press Enter.
Feedback
Was this page helpful? Yes No
Provide product feedback
Error message when you perform a
Volume Shadow Copy Service restore
operation: 0x80042409
Article • 12/26/2023
This article describes an issue that occurs when you restore a virtual machine while
another backup that uses the Hyper-V writer is in progress.
Symptoms
You perform a Volume Shadow Copy Service (VSS) backup or a VSS restore operation.
During the backup or restore operation, an event that resembles the following is written
to the Application log:
Volume Shadow Copy Service error: Unexpected error An older writer session state
is being removed. . hr = 0x80042409, Writer status is not available for one or more
writers. A writer may have reached the limit to the number of available backup-
restore session states.
Context:
Old snapshot set: {41379de8-f7e7-4c76-bb47-7f080443e189}
Old operation: 1019
Old state: 5
Old failure: 0x800423f4
Old extended failure hr: 0x1
Old extended failure message: 0
Execution Context: Writer
Writer Class Id: {66841cd4-6ded-4f4b-8f17-fd23f8ddc3de}
Writer Name: Microsoft Hyper-V VSS
Writer Writer Instance ID: {7eef8900-84b4-406e-a461-ce19e5e7ae7f}
Cause
This error occurs because a backup or restore session state in the VSS writer isn't
cleaned up correctly. The VSS writer infrastructure creates session-state objects for each
backup and restore session in which a VSS writer participates. Under typical
circumstances, the writer session-state objects are cleaned up when they're not being
used. Normal session state cleanup occurs under the following circumstances:
The backup application sends a BackupComplete response and then checks the
writer status by sending a GatherWriterStatus.
The backup application sends a PostRestore response and then checks the writer
status by sending a GatherWriterStatus query.
The writers receive the OnAbort event callback for the session. The OnAbort event
callback is invoked when the backup session is explicitly failed by the backup
application, by the writer or, by the VSS infrastructure.
The VSS writer infrastructure performs periodic garbage collection of the remaining
session states. The infrastructure then logs the previous event log for each session-state
object that is older than two days. The event log is intended to help identify abandoned
sessions in the writer that may indicate a misbehaving backup application. You can see
several similar events in rapid succession from multiple writers that indicate that there
was a series of incomplete backup or restore sessions. This behavior is most frequently
seen in test environments.
Workaround
Ignore intermittent occurrences of this error. The related event is logged in response to
garbage collection activities that are started by a backup or restore operation. However,
these errors aren't related to the active backup or restore session. If the error is
consistently reproducible, make sure that the backup application vendor is following all
the VSS backup session cleanup guidelines.
Feedback
Was this page helpful? Yes No
This article introduces a workaround for an issue in which shadow copy volume is
delayed in being brought online, and shadow copies are unexpectedly deleted. Event ID
32 is received when the issue occurs.
Symptom
On a server, shadow copies are stored on a different volume. After you restart the
server, you find shadow copies are deleted. Additionally, you receive the following event
log:
Output
You may notice delays in bringing the shadow copy volume online.
Cause
This issue occurs because there are multiple phantom shadow copy entries under
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\STORAGE\VolumeSnapshot . It increases
the time for the snapshots to be enumerated on the shadow storage volume when the
parent volume comes online.
If it takes a long time in the enumeration, volsnap will delete these snapshots.
Workaround
To work around this issue, use the devnodeClean.exe tool to clean up the large
buildup of phantom VolumeSnapshots in the registry key under
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\STORAGE\VolumeSnapshot .
7 Note
The devnodeclean.exe tool will only delete phantom shadow copies. Valid shadow
copies will remain intact.
Console
devnodeclean /n
Console
devnodeclean
Feedback
Was this page helpful? Yes No
This article provides a workaround to Event ID 513 when running VSS in Windows
Server.
Symptoms
In Windows Server, when an application calls the Volume Shadow Copy Service (VSS) to
run a backup, Event 513 may be generated:
Output
Description:
An error occurred in Cryptographic Services while processing the
OnIdentity() call in System Writer Object.
Details:
AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer
Discovery Protocol.
System Error:
Access is denied.
Cause
This problem occurs because VSS System Writer does not have permission to read the
NT AUTHORITY\SERVICE (service account). When System Writer runs as a cryptographic
service and tries to read the Mslldp.sys information from a Microsoft Link-Layer
Discovery Protocol driver, the "access denied" error is generated.
Workaround
This event log entry can be safely ignored. To prevent this entry from being logged,
grant the required permission to the Microsoft Link-Layer Discovery Protocol driver
(Mslldp.dll) to process System Writer.
1. Open an administrative Command Prompt window, and then run the following
command to check the current permissions:
Console
sc sdshow mslldp
2. Copy the output string from step 1, append it with (A;;CCLCSWLOCRRC;;;SU) , and
then run the following command to add the access permission to Mslldp.dll:
Console
Console
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that no VSS writers are listed when you
run vssadmin list writers.
Symptoms
When you run vssadmin list writers on Windows Server 2008, no VSS writers are listed.
In the Application event log, the following events are logged:
If you open the Windows Server Backup snap-in, the following error occurs:
Cause
This issue occurs because the registry path to Eventcls.dll is incorrect or because the
registry data type for the TypeLib setting is incorrect.
Resolution
To resolve this issue, perform the following steps.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
1. Click Start, type regedit in the Start Search box, and then press ENTER.
2. Locate and then click the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EventSystem\{26c409cc-ae86-11d1-b616-
00805fc79216}\EventClasses\{FAF53CC4-BD73-4E36-83F1-2B23F46E513E}-{00000000-
0000-0000-0000-000000000000}-{00000000-0000-0000-0000-000000000000}
7 Note
The registry type of TypeLib should be shown as REG_EXPAND_SZ. If that is not the
case, you have to delete the key, and then you have to recreate the key. To do this,
follow these two steps:
a. Select the TypeLib registry value, and then delete it.
4. Double-click the TypeLib registry value. In the Value Data box, type
%systemroot%\system32\EVENTCLS.DLL, and then click OK.
5. Close Regedit.
6. Click Start, type services.msc in the Start Search box, and hit Enter.
7. Right-click the following services one at a time and click Restart:
Feedback
Was this page helpful? Yes No
This article describes an issue in which shadow copies are deleted on Windows Server
when you try to run an FCI classification job. This occurs when there's insufficient space
on the volume for shadow copies.
Symptoms
On a Windows Server computer, you have a volume on which you have enabled shadow
copies through a Volume Shadow Copy (VSS) provider. On this volume, you run a File
Classification Infrastructure (FCI) classification job. However, the classification job
doesn't finish, and older shadow copies are deleted faster than expected from the
shadow copies storage area. This may result in all shadow copies being deleted from the
volume. Additionally, multiple entries that resemble the following may be logged in the
System log:
The oldest shadow copy of volume Volume_Letter : was deleted to keep disk space
usage for shadow copies of volume Volume_Letter : below the user defined limit.
Also, entries that resemble the following are logged in the FSRM log:
Additionally, if you run an FSRM storage report, you receive the following error
message:
After you receive this error message, you find that the following error message is logged
in the System log:
Cause
This issue occurs because the FCI classification process stores properties in each file that
is classified. This behavior changes the file on the volume that has shadow copies
enabled. These changes are tracked by the VSS provider and are then stored in the
shadow copies storage area. When a property is stored in a text file, only a few kilobytes
(KB) of data is written. However, when properties are stored in an Office file, the whole
Office file is rewritten. This behavior exhausts the VSS storage space much faster.
If the Maximum Shadow Copy Storage Space size allocation is insufficient to store all
these changes, VSS automatically deletes the oldest shadow copies first. If a large block
of files is classified, this process can fail and at the same time delete all the old shadow
copies from the storage area. This is especially true when you perform a full
classification on a volume for the first time. This action is very likely to generate lots of
changes on that volume.
Resolution
To resolve this issue, use one of the following methods:
3. At the command prompt, type the following command, and then press ENTER:
Console
5. At the command prompt, type the following command, and then press ENTER:
Console
Where the placeholder, Storage_Size, is a value that is at least double the value
that you noted in step 4.
Incremental classification
When you perform a classification for the first time, classify only one namespace at a
time. Don't classify all the namespaces in the same classification job.
1. Click Start, point to Administrative Tools, and then click Share and Storage
Management.
2. In the details pane, click the Volumes tab.
3. Right-click the volume for which you want to disable shadow copies, and then click
Properties.
4. In the Volume_Name Properties dialog box, click the Shadow Copies tab.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where you fail to perform a system state
backup by using Windows Server Backup.
Symptoms
When you perform a system state backup using Windows Server Backup on Windows
Server 2008, the backup fails with the following error:
Cause
The system writer fails because permissions to files in the %windir%\winsxs\filemaps\ or
%windir%\winsxs\temp\PendingRenames directories are incorrect.
Resolution
To resolve this issue, type the following commands from an elevated command prompt:
Console
Takeown /f %windir%\winsxs\temp\PendingRenames /a
icacls %windir%\winsxs\temp\PendingRenames /grant "NT AUTHORITY\SYSTEM:(RX)"
icacls %windir%\winsxs\temp\PendingRenames /grant "NT
Service\trustedinstaller:(F)"
icacls %windir%\winsxs\temp\PendingRenames /grant BUILTIN\Users:(RX)
Takeown /f %windir%\winsxs\filemaps\* /a
icacls %windir%\winsxs\filemaps\*.* /grant "NT AUTHORITY\SYSTEM:(RX)"
icacls %windir%\winsxs\filemaps\*.* /grant "NT Service\trustedinstaller:(F)"
icacls %windir%\winsxs\filemaps\*.* /grant BUILTIN\Users:(RX)
net stop cryptsvc
net start cryptsvc
Type the following command to verify that the system writer is now listed:
Console
If the system writer is missing, check the Application event log for the following event:
The Details section of the event (Binary Data\In Bytes) would show up as:
0000: 2D 20 43 6F 64 65 3A 20 - Code:
0008: 57 52 54 57 52 54 49 43 WRTWRTIC
0010: 30 30 30 30 30 37 32 39 00000729
0018: 2D 20 43 61 6C 6C 3A 20 - Call:
0020: 57 52 54 57 52 54 49 43 WRTWRTIC
0028: 30 30 30 30 30 36 34 39 00000649
0030: 2D 20 50 49 44 3A 20 20 - PID:
0038: 30 30 30 30 31 30 38 34 00001084
0040: 2D 20 54 49 44 3A 20 20 - TID:
0048: 30 30 30 31 38 39 37 36 00018976
0050: 2D 20 43 4D 44 3A 20 20 - CMD:
0058: 43 3A 5C 57 69 6E 64 6F C:\Windo
0060: 77 73 5C 73 79 73 74 65 ws\syste
0068: 6D 33 32 5C 73 76 63 68 m32\svch
0070: 6F 73 74 2E 65 78 65 20 ost.exe
0078: 2D 6B 20 4E 65 74 77 6F -k Netwo
0080: 72 6B 53 65 72 76 69 63 rkServic
0088: 65 20 20 20 20 20 20 20 e
0090: 2D 20 55 73 65 72 3A 20 - User:
0098: 4E 54 20 41 55 54 48 4F NT AUTHO
00a0: 52 49 54 59 5C 4E 45 54 RITY\NET
00a8: 57 4F 52 4B 20 53 45 52 WORK SER
00b0: 56 49 43 45 20 20 20 20 VICE
00b8: 2D 20 53 69 64 3A 20 20 - Sid:
00c0: 53 2D 31 2D 35 2D 32 30 S-1-5-20
Open Regedit and navigate to the following key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS\VssAccessControl .
You may also want to check the entry for other services (LOCAL SERVICE,
NetworkService) as indicated by event 8213.
The System Writer should now show up in the vssadmin list writers command:
Feedback
Was this page helpful? Yes No
This article provides a solution to the third-party backup warnings that occurs after you
install a servicing update in Windows Server 2016.
Symptom
Consider the following scenario:
In this scenario, when you examine the system writer metadata in output.txt, you find
the amd64_installed and x86_installed files are listed in the old version folder path that
no longer exists.
As a result, third-party backup applications may return warnings like the following:
7 Note
This issue does not affect System State backup with Windows Server backup.
Resolution
To fix the issue, create new placeholder files with the same name for the files that are
reported as not found.
C:\Windows\servicing\Version\10.0.14393.0\amd64_installed
C:\Windows\servicing\Version\10.0.14393.0\x86_installed
More information
The files are no longer needed. However, they are still listed as needing to be backed
up. The content of the file is irrelevant and can be empty.
Feedback
Was this page helpful? Yes No
This article describes a workaround for an issue in which disk volumes take more time to
go online after you enable the Volume Shadow Copy Service on the volumes.
) Important
This article contains information about how to modify the registry. Make sure that
you back up the registry before you modify it. Make sure that you know how to
restore the registry if a problem occurs. For more information about how to back
up, restore, and modify the registry, click the following article number to view the
article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
Symptoms
When you use the Volume Shadow Copy Service in Windows Server based computers
that run many I/O operations and that have lots of data, you experience the following
symptoms:
Cluster failover time is longer for the cluster groups that contain disk resources for
which you have enabled the Volume Shadow Copy Service. Also, the disk volumes
of the cluster nodes take longer to go online and offline during a cluster failover.
Taking a disk offline and then online on the same node also has the same delay.
Non-cluster servers take longer to start. When you disable the Volume Shadow
Copy Service on the server volumes, the servers start as expected.
Cause
This issue occurs because of the way the Volume Shadow Copy driver (Volsnap.sys)
manages the shadow copy files. If lots of shadow copy files are created on the disk
volumes, the Volume Shadow Copy driver takes more time to process those shadow
copy files when the system brings the disk volumes online.
Workaround
2 Warning
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall the operating system. Microsoft cannot guarantee that these problems can
be solved. Modify the registry at your own risk.
To work around this issue, create a new registry key to restrict the number of shadow
copy files that are created on each disk volume to 20.
7 Note
This value is only a suggested starting value. We recommend that you find a value
that is appropriate for your working environment.
1. Click Start, click Run, type regedit, and then press ENTER.
2. Locate and then right-click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VSS\Settings
Feedback
Was this page helpful? Yes No
This article describes issues in which Event ID 8019, 20, 8193, or 12302 is logged in the
Application log. You receive an Error 0x8004230F or 0x80004002 error message.
Symptoms
On a Microsoft Windows Server 2003-based computer that is running the Volume
Shadow Copy Service (VSS), you experience one of the following symptoms:
When you perform a backup operation by using the NTBackup tool, the following
event is logged in the Application log:
7 Note
If you view the backup log file, the following information is displayed:
If you access the properties of a volume and then click Shadow Copies, you receive
one of the following error messages:
Error 0x8004230F: The shadow copy provider had an unexpected error while
trying to process the specified operation.
Error 0x80004002: No such interface supported
Cause
This issue occurs because the VSS system files aren't registered.
Resolution
7 Note
This article isn't for use with Windows Vista, with Windows Server 2008, or with
later operating systems. Starting with Windows Vista and with Windows Server
2008, Windows component installation is manifest based. If you try to manually
register specific components, such as those that are described in this "Resolution"
section, in the operating systems that are mentioned in this note, unexpected
results may occur that may require reinstalling Windows to resolve.
1. Click Start, click Run, type cmd, and then click OK.
2. Type the following commands at a command prompt. Press ENTER after you type
each command.
cd /d %windir%\system32
regsvr32 ole32.dll
regsvr32 oleaut32.dll
regsvr32 vss_ps.dll
vssvc /register
regsvr32 /i swprv.dll
regsvr32 /i eventcls.dll
regsvr32 es.dll
regsvr32 stdprov.dll
regsvr32 vssui.dll
regsvr32 msxml.dll
regsvr32 msxml3.dll
regsvr32 msxml4.dll
7 Note
More information
Console
regsvr32 /u swprv.dll
Feedback
Was this page helpful? Yes No
This article describes an issue where you receive event ID 8193 when you restart the
Cryptographic Services service if the DHCP role has installed.
Applies to: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019
Original KB number: 2298620
Symptoms
You install the DHCP role on a computer. When you restart the Cryptographic Services
service, the following event is logged in the Application log:
Operation:
Initializing Writer
Context:
Writer Class Id: {e8132975-6f93-4464-a53e-1050253ae220}
Writer Name: System Writer
Writer Instance ID: {7bb41431-3960-44bc-a29c-3b42d2301fc3}
7 Note
Although this event is recorded, Volume Shadow Copy and DHCP Server continue
to function as expected. Although this event is logged as an error, the event should
not be considered a critical failure that affects the correct functioning of VSS. The
registry key is mentioned for diagnostic purposes.
Cause
When the DHCP server role is installed, the permissions of the following registry key
(and all subkeys) are overwritten when the DHCP Service account is added:
HKLM\CurrentControlSet\Services\VSS\Diag
Every time that the Cryptographic Services service is started, it initializes "System Writer"
under the Network Service account and verifies read/write permission for the following
registry key:
HKLM\CurrentControlSet\Services\VSS\Diag
Because the Network Service account is used to obtain access to this key, there's no
permission for the Network Service. Therefore, VSS logs an "Access denied" event.
Resolution
Volume shadow copy and DHCP server continue to function as expected, so you can
ignore the event.
2. Run the following command. Be careful not to include a new line in the middle of
PowerShell
$path = 'HKLM:\System\CurrentControlSet\Services\VSS\Diag\'
$sddl = 'D:PAI(A;;KA;;;BA)(A;;KA;;;SY)(A;;CCDCLCSWRPSDRC;;;BO)
(A;;CCDCLCSWRPSDRC;;;LS)(A;;CCDCLCSWRPSDRC;;;NS)(A;CIIO;RC;;;OW)
(A;;KR;;;BU)(A;CIIO;GR;;;BU)(A;CIIO;GA;;;BA)(A;CIIO;GA;;;BO)
(A;CIIO;GA;;;LS)(A;CIIO;GA;;;NS)(A;CIIO;GA;;;SY)(A;CI;CCDCLCSW;;;S-1-5-
80-3273805168-4048181553-3172130058-210131473-390205191)(A;ID;KR;;;AC)
(A;CIIOID;GR;;;AC)S:ARAI'
$acl.SetSecurityDescriptorSddlForm($sddl)
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where you get VSS warnings in the
Application Event log of Microsoft Windows Small Business Server 2011 Standard.
Symptoms
In Small Business Server 2011 Standard, you may see warnings in the application event
log that's similar to the following:
Cause
SBS 2011 Standard Edition installs SharePoint 2010 Foundation in SharePoint farm
mode. The accounts SharePoint farm and SharePoint search are used as service accounts
for some of the SharePoint services. In order to be able to utilize the VSS writers, the
accounts must be granted access to VSS. The accounts are added by SBS to the
VssAccessControl registry key but the VSS service fails to locate the accounts. You can
ignore the warnings. The warnings don't affect the operation of VSS. If you wish to
remove the warnings, you can use the steps in the resolution section.
Workaround
Use the following steps to work around the issue.
1. In Active Directory Users and Computers, create a Domain Local Security Group
named VSSRegistryGroup.
3. Run regedit.
) Important
This article contains information about how to modify the registry. Make sure
that you back up the registry before you modify it. Make sure that you know
how to restore the registry if a problem occurs. For more information about
how to back up, restore, and modify the registry, see How to back up and
restore the registry in Windows .
4. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VSS\VssAccessControl .
7. Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VSS\diag .
More information
If the VSSAccessControl registry key does not contain the exact right accounts, the
service Sharepoint 2011 VSS Writer will fail to start and the following error will be
logged in the application event log:
Context:
Writer Class Id: {da452614-4858-5e53-a512-38aab25c61ad}
Writer Name: SharePoint Services Writer
Feedback
Was this page helpful? Yes No
This article provides some information about VSS writers report as failed on a virtual
machine.
Symptoms
Consider the following scenario:
You have a Windows Server 2012 R2 -based computer with the Hyper-V role.
You run a Windows Server 2003-based or a Windows Server 2008-based virtual
machine.
You try to back up the virtual machine by using a backup application from the
Hyper-V Host.
In this scenario, the Volume Shadow Copy Service (VSS) writers on Windows Server 2003
or Windows Server 2008 report as failed. The output if you run the vssadmin list writers
command is as follows:
7 Note
The Hyper-V writer on the Window Server 2012 R2 host reports the backup as
succeeding.
The VSS infrastructure uses the Microsoft Hyper-V VSS requestor to create a
snapshot in the virtual machine.
The VSS infrastructure uses the Microsoft Hyper-V VSS writer to create a
snapshot on the Hyper-V host.
Cause
This behavior is expected. This behavior exists because of limitations in Windows Server
2003 and Windows Server 2008 that restrict the ability to expose a shadow disk to the
operating system as required for the VSS autorecovery phase to finish.
Because of these limitations, the Hyper-V requester that is running on Windows Server
2003 or Windows Server 2008 stops the VSS backup process following the OnThaw
phase in order to skip the autorecovery portion. This results in the guest writers
reporting failure. Before aborting the backup process the virtual machine's state is
preserved. This is then used to provide constant backup for the application.
More information
The VSS writers on the Windows Server 2003 or Windows Server 2008 guest report as
failed as long as the Hyper-V writer on the Windows Server 2012 R2 host reports that
the backup was successful.
Restore operations or later backup requests of the virtual machine though the
Hyper-V writer on the host
Back up requests from the virtual machine that use other backup techniques such
as a System State Backup together with Windows Backup
Feedback
Was this page helpful? Yes No
This article solves the issue where the issued certificate isn't published in Active
Directory when users from a child domain as a certification authority (CA) request a
certificate.
Symptoms
In the following scenarios, if a user from the same domain as a CA requests a certificate,
the issued certificate is published in Active Directory. If the user is from a child domain,
this process isn't successful. Also, when users from the same domain as a CA request a
certificate, the issued certificate may not be published in Active Directory.
Scenario 1
In this scenario, the CA doesn't publish issued certificates to the user's DS object in the
child domain when the following conditions are true:
The user is in a two-level domain hierarchy with a parent and a child domain.
The Enterprise CA is located on the parent domain and the user is in the child
domain.
The user in the child domain enrolls in the parent CA.
In a two-level domain hierarchy with a parent and a child domain, the Enterprise CA is
located in the parent domain. And the users are in the child domain. The users in the
child domain enroll in the parent CA, and the CA publishes issued certificates to the
user's DS object in the child domain.
Scenario 2
Consider the following scenario:
In this scenario, the certification authority doesn't publish the issued certificates to the
user's domain server object in the single-level domain or in the parent domain.
Cause
For Scenario 1: two-level domain hierarchy
Users from the child domain don't have appropriate permissions to enroll. Even
when they do, the CA doesn't have the access permissions to publish the certificate
to Active Directory.
By default, only domain users from the same domain as the CA have enroll
permissions.
By default, the CA has the following necessary permissions granted on users within
its domain:
Read userCertificate .
Write userCertificate .
By default in Windows, the AdminSDHolder object does not grant the Cert
Publishers group the necessary permissions for user accounts that are covered
under the AdminSDHolder process. The following list contains the protected user
account groups in Windows:
Enterprise Admins
Schema Admins
Domain Admins
Administrators
After you apply the hotfix KB327825 , the following list of user account groups
in Windows are now protected user account groups:
Administrators
Account Operators
Server Operators
Print Operators
Backup Operators
Domain Admins
Schema Admins
Enterprise Admins
Cert Publishers
Resolution
Try the following resolution according to your scenario.
1. Set the permissions on the CA's template to allow enrollment requests. Set the
user object permissions to allow the CA to publish the certificate. Alter
AdminSDHolder to push the user object permissions to users who are
administrators.
2. Set the user object permissions to allow the CA to publish the certificate. Alter
AdminSDHolder to push the user object permissions to users who are
administrators.
3. Alter AdminSDHolder to push the user object permissions to users who are
administrators.
7 Note
You must first install Support Tools from the Windows Professional, or Windows
Server CD-ROM.
Enable the child domain users to obtain certificates and have them
published to Active Directory
1. Set permissions on the CA to allow users in the child domain to request a
certificate. By default, it should be in place.
a. Open the Certification Authority snap-in, right-click the CA, and then select
Properties.
b. On the Security tab, make sure that the Authenticated Users group is allowed to
request certificates.
2. Set permissions on the applicable certificate templates to allow users in the child
domain to enroll.
7 Note
You must be logged on to the root domain with domain administrator rights.
7 Note
You can enable the child domain users to obtain certificates and to have them
published in Windows Server domains. To do so, change the group type to
Domain Local, and include the CA server from the parent domain. This procedure
creates the same configuration that is present in a freshly installed Windows Server
domain. The user interface (UI) does not let you change the group type. However,
you can use the dsmod command to change the Cert Publishers group from a
Domain Global group to a Domain Local group:
Console
In some cases, you cannot change groupType directly from global to domain local
group. In this case, you have to change the global group into a universal group
and change the universal group into a domain local group. To do so, follow these
steps:
Console
Console
This command changes the universal group into a domain local group.
Console
Status
Microsoft has confirmed that it's a problem in Windows Server.
More information
When a user from a child domain doesn't succeed in enrolling, the following error is
generated in the CA application event log:
If the ACLs are set so that the user can enroll, but the CA doesn't have permissions to
publish to the user's Active Directory, the following error is generated in the CA
application event log:
Feedback
Was this page helpful? Yes No
Summary
When you uninstall a certification authority (CA), the certificates that were issued by the
CA are typically still outstanding. If the outstanding certificates are processed by the
various Public Key Infrastructure client computers, validation will fail, and those
certificates will not be used.
This article describes how to revoke outstanding certificates and how to complete
various other tasks that are required to successfully uninstall a CA. Additionally, this
article describes several utilities that you can use to help you remove CA objects from
your domain.
7 Note
The lifetime of the Certificate Revocation List (CRL) should be longer than the
lifetime that remains for certificates that have been revoked.
1. In the Certification Authority MMC snap-in, select the Pending Requests folder.
2. In the right pane, select one of the pending requests, and then press CTRL+A to
select all pending certificates.
3. Right-click the selected requests, select All Tasks, and then select Deny Request.
2. At the command prompt, type certutil -shutdown, and then press Enter.
3. At the command prompt, type certutil -getreg CA\CSP\Provider, and then press
Enter. Note the Provider value in the output. For example:
Output
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configurat
ion\Fabrikam Root CA1 G2\csp:
Provider REG_SZ = Microsoft Software Key Storage Provider
CertUtil: -getreg command completed successfully.
This command will display the names of all the installed cryptographic service
providers (CSP) and the key stores that are associated with each provider. Listed
among the listed key stores will be the name of your CA. The name will be listed
several times, as shown in the following example:
afd1bc0a-a93c-4a31-8056-c0b9ca632896
Microsoft Internet Information Server
NetMon
MS IIS DCOM ClientAdministratorS-1-5-21-842925246-1715567821-
839522115-500
afd1bc0a-a93c-4a31-8056-c0b9ca632896
Microsoft Internet Information Server
NetMon
MS IIS DCOM ClientAdministratorS-1-5-21-842925246-1715567821-
839522115-500
4. Delete the private key that is associated with the CA. To do this, at a command
prompt, type the following command, and then press Enter:
Console
7 Note
Console
5. List the key stores again to verify that the private key for your CA was deleted.
6. After you delete the private key for your CA, uninstall Certificate Services. To do
this, follow these steps, depending on the version of Windows Server that you are
running.
7 Note
You must log on with the same permissions as the user who installed the CA
to complete this procedure. If you are uninstalling an enterprise CA,
membership in Enterprise Admins, or the equivalent, is the minimum that is
required to complete this procedure. For more information, see Implement
Role-Based Administration.
a. Select Start, point to Administrative Tools, and then select Server Manager.
b. Under Roles Summary, select Active Directory Certificate Services.
c. Under Roles Services, select Remove Role Services.
d. Select to clear the Certification Authority check box, and then select Next.
e. On the Confirm Removal Options page, review the information, and then select
Remove.
f. If IIS is running and you are prompted to stop the service before you continue
with the uninstall process, select OK.
g. After the Remove Roles Wizard is finished, you must restart the server. This
completes the uninstall process.
If the remaining role services, such as the Online Responder service, were
configured to use data from the uninstalled CA, you must reconfigure these
services to support a different CA. After a CA is uninstalled, the following
information is left on the server:
The CA database.
The CA public and private keys.
The CA's certificates in the Personal store.
The CA's certificates in the shared folder, if a shared folder was specified
during AD CS setup.
The CA chain's root certificate in the Trusted Root Certification Authorities
store.
The CA chain's intermediate certificates in the Intermediate Certification
Authorities store.
The CA's CRL.
By default, this information is kept on the server in case you are uninstalling and
then reinstalling the CA. For example, you might uninstall and reinstall the CA if
you want to change a stand-alone CA to an enterprise CA.
Step 6 - Remove CA objects from Active
Directory
When Microsoft Certificate Services is installed on a server that is a member of a
domain, several objects are created in the configuration container in Active Directory.
certificateAuthority object
Located in CN=AIA,CN=Public Key
Services,CN=Services,CN=Configuration,DC=ForestRootDomain.
Contains the CA certificate for the CA.
Published Authority Information Access (AIA) location.
crlDistributionPoint object
Located in CN=ServerName,CN=CDP,CN=Public Key
Service,CN=Services,CN=Configuration,DC=ForestRoot,DC=com.
Contains the CRL periodically published by the CA.
Published CRL Distribution Point (CDP) location.
certificationAuthority object
Located in CN=Certification Authorities,CN=Public Key
Services,CN=Services,CN=Configuration,DC=ForestRoot,DC=com.
Contains the CA certificate for the CA.
pKIEnrollmentService object
Located in CN=Enrollment Services,CN=Public Key
Services,CN=Services,CN=Configuration,DC=ForestRoot,DC=com.
Created by the enterprise CA.
Contains information about the types of certificates the CA has been configured
to issue. Permissions on this object can control which security principals can
enroll against this CA.
For Public Key Infrastructure (PKI) client computers to successfully process these
outstanding certificates, the computers must locate the Authority Information Access
(AIA) and CRL distribution point paths in Active Directory. It is a good idea to revoke all
outstanding certificates, extend the lifetime of the CRL, and publish the CRL in Active
Directory. If the outstanding certificates are processed by the various PKI clients,
validation will fail, and those certificates will not be used.
If it is not a priority to maintain the CRL distribution point and AIA in Active Directory,
you can remove these objects. Do not remove these objects if you expect to process
one or more of the formerly active digital certificates.
7 Note
You should not remove certificate templates from Active Directory until after you
remove all CA objects in the Active Directory forest.
To remove all Certification Services objects from Active Directory, follow these steps:
2. Select Start, point to Administrative Tools, and then select Active Directory Sites
and Services.
4. Expand Services, expand Public Key Services, and then select the AIA folder.
5. In the right pane, right-click the CertificationAuthority object for your CA, select
Delete, and then select Yes.
6. In the left pane of the Active Directory Sites and Services MMC snap-in, select the
CDP folder.
7. In the right pane, locate the container object for the server where Certificate
Services is installed. Right-click the container, select Delete, and then select Yes
two times.
8. In the left pane of the Active Directory Sites and Services MMC snap-in, select the
Certification Authorities node.
9. In the right pane, right-click the CertificationAuthority object for your CA, select
Delete, and then select Yes.
10. In the left pane of the Active Directory Sites and Services MMC snap-in, select the
Enrollment Services node.
11. In the right pane, verify that the pKIEnrollmentService object for your CA was
removed when Certificate Services was uninstalled. If the object is not deleted,
right-click the object, select Delete, and then select Yes.
12. If you did not locate all the objects, some objects may be left in the Active
Directory after you perform these steps. To clean up after a CA that may have left
objects in Active Directory, follow these steps to determine whether any AD
objects remain:
a. Type the following command at a command line, and then press ENTER:
Console
Console
c. At a command prompt, type the following command, and then press ENTER to
delete the remaining CA objects from Active Directory:
Console
ldifde -i -f remainingCAobjects.ldf
13. Delete the certificate templates if you are sure that all of the certificate authorities
have been deleted. Repeat step 12 to determine whether any AD objects remain.
) Important
You must not delete the certificate templates unless all the certificate
authorities have been deleted. If the templates are accidentally deleted, follow
these steps:
a. Make sure that you are logged on to a server that is running Certificate Services
as Enterprise administrator.
b. At a command prompt, type the following command, and then press ENTER:
Console
cd %windir%\system32
Console
Console
certutil -viewdelstore " ldap:///CN=NtAuthCertificates,CN=Public Key
Services,...,DC=ForestRoot,DC=com?cACertificate?base?
objectclass=certificationAuthority"
Console
7 Note
The -viewdelstore action invokes the certificate selection UI on the set of certificates in
the specified attribute. You can view the certificate details. You can cancel out of the
selection dialog to make no changes. If you select a certificate, that certificate is deleted
when the UI closes and the command is fully executed.
Use the following command to see the full LDAP path to the NtAuthCertificates object in
your Active Directory:
Console
To remove certificates that were issued to the Windows Server 2000 domain controllers,
use the Dsstore.exe utility from the Microsoft Windows 2000 Resource Kit.
To remove certificates that have been issued to the Windows Server 2000 domain
controllers, follow these steps:
1. Select Start, select Run, type cmd, and then press ENTER.
2. On a domain controller, type dsstore -dcmon at the command prompt, and then
press ENTER.
3. Type 3, and then press ENTER. This action deletes all certificates on all domain
controllers.
7 Note
The Dsstore.exe utility will try to validate domain controller certificates that
are issued to each domain controller. Certificates that do not validate are
removed from their respective domain controller.
To remove certificates that were issued to the Windows Server 2003 domain controllers,
follow these steps.
) Important
Do not use this procedure if you are using certificates that are based on version 1
domain controller templates.
1. Select Start, select Run, type cmd, and then press ENTER.
Certutil.exe tries to validate all the DC certificates that are issued to the domain
controllers. Certificates that do not validate are removed.
1. Select Start, select Run, type cmd in the Open box, and then press ENTER.
2. At a command prompt, type the appropriate command for the corresponding
version of the operating system, and then press ENTER:
Console
Console
gpupdate /force
Feedback
Was this page helpful? Yes No
This article helps to resolve the issue in which Active Directory Certificate Services (AD
CS) gives an error when attempting to issue certificates with more than 4 kilobytes (KB)
size extensions.
You may also see this error message in the certsrv logging:
Output
7 Note
Certsrv logging helps to determine the cause of the error. For more information on
enabling the certsrv logging, see Certificate Enrollment Web Services in Active
Directory Certificate Services .
Console
Output
The limit can be expanded to 16 KB after installing one of the following or subsequent
updates:
Windows Server 2019 - July 21, 2022—KB5015880 (OS Build 17763.3232) Preview
Windows Server 20H2 - July 26, 2022—KB5015878 (OS Builds 19042.1865,
19043.1865, and 19044.1865) Preview
Windows Server 2022 - July 19, 2022—KB5015879 (OS Build 20348.859) Preview
) Important
The next two sections contain instructions to modify the registry. Serious problems
might occur if the registry is modified incorrectly. As a precaution, back up the
registry before you modify it. For more information about how to back up, restore,
and modify the registry, see How to back up and restore the registry in
Windows .
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\DBFlags
7 Note
Console
7 Note
After the expansion is complete and new backups are captured, you may consider
destroying the old backups to prevent an accidental rollback.
Output
Schema:
Column Name Localized Name Type
MaxLength
---------------------------- ---------------------------- ------ ------
---
ExtensionRequestId Extension Request ID Long 4 --
Indexed
ExtensionName Extension Name String 254
ExtensionFlags Extension Flags Long 4
ExtensionRawValue Extension Raw Value Binary 16384
Feedback
Was this page helpful? Yes No
There are two methods you can use to import the certificates of third-party CAs into the
Enterprise NTAuth store. This process is required if you're using a third-party CA to issue
smart card logon or domain controller certificates. By publishing the CA certificate to
the Enterprise NTAuth store, the Administrator indicates that the CA is trusted to issue
certificates of these types. Windows CAs automatically publish their CA certificates to
this store.
More information
The NTAuth store is an Active Directory directory service object that is located in the
Configuration container of the forest. The Lightweight Directory Access Protocol (LDAP)
distinguished name is similar to the following example:
CN=NTAuthCertificates,CN=Public Key
Services,CN=Services,CN=Configuration,DC=MyDomain,DC=com
Certificates that are published to the NTAuth store are written to the cACertificate
multiple-valued attribute. There are two supported methods to append a certificate to
this attribute.
PKIView gathers information about the CA certificates and certificate revocation lists
(CRLs) from each CA in the enterprise. Then it validates the certificates and CRLs to
ensure that they're working correctly. If they aren't working correctly, or they're about to
fail, PKIView provides a detailed warning or some error information.
PKIView displays the status of Windows Server 2003 CAs that are installed in an Active
Directory forest. You can use PKIView to discover all PKI components, including
subordinate and root CAs that are associated with an enterprise CA. The tool can also
manage important PKI containers, such as root CA trust and NTAuth stores, that are also
contained in the configuration partition of an Active Directory forest. This article
discusses this latter functionality. For more information about PKIView, see the Microsoft
Windows Server 2003 Resource Kit Tools documentation.
7 Note
You can use PKIView to manage both Windows 2000 CAs and Windows Server 2003
CAs. To install the Windows Server 2003 Resource Kit Tools, your computer must be
running Windows XP or later.
To import a CA certificate into the Enterprise NTAuth store, follow these steps:
1. Export the certificate of the CA to a .cer file. The following file formats are
supported:
2. Install the Windows Server 2003 Resource Kit Tools. The tools package requires
Windows XP or later.
3. Start Microsoft Management Console (Mmc.exe), and then add the PKI Health
snap-in:
a. On the Console menu, select Add/Remove Snap-in.
b. Select the Standalone tab, and then select the Add button.
c. In the list of snap-ins, select Enterprise PKI.
d. Select Add, and then select Close.
e. Select OK.
7. Locate and then select the CA certificate, and then select OK to complete the
import.
Method 2 - Import a certificate by using
Certutil.exe
Certutil.exe is a command-line utility for managing a Windows CA. In Windows Server
2003, you can use Certutil.exe to publish certificates to Active Directory. Certutil.exe is
installed with Windows Server 2003. It is also available as part of the Microsoft Windows
Server 2003 Administration Tools Pack.
To import a CA certificate into the Enterprise NTAuth store, follow these steps:
1. Export the certificate of the CA to a .cer file. The following file formats are
supported:
2. At a command prompt, type the following command, and then press ENTER:
Console
The contents of the NTAuth store are cached in the following registry location:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\NTAuth\Certificates
This registry key should be automatically updated to reflect the certificates that are
published to the NTAuth store in the Active Directory configuration container. This
behavior occurs when Group Policy settings are updated and when the client-side
extension that's responsible for autoenrollment executes. In certain scenarios, such as
Active Directory replication latency or when the Do not enroll certificates automatically
policy setting is enabled, the registry isn't updated. In such scenarios, run the following
command manually to insert the certificate into the registry location:
Console
Feedback
Was this page helpful? Yes No
Provide product feedback
Superseded Certificate Templates and
impact on user's AD store
Article • 02/26/2024
This article provides a resolution for the issue superseded Certificate Templates and
impact on user's AD store.
Symptoms
The deletion of certificates, based on the certificate templates being superseded by
other certificate templates, from user's AD store worked in XP/W2k3 as part of the
autoenrollment.
Repro Steps (Vista and later):
1. Configure user autoenrollment policy (make sure that policy is enabled and both
check boxes are check in the autoenrollement configuration window.
2. Duplicate User certificate template (name it for example TestTemplate1), make sure
that the certificate publishing in AD is activated and assign to the test user read,
enroll, and autoenroll permissions on the template.
3. Publish the TestTemplate1 template on the CA.
4. Log on as test user and make sure that the user gets the certificate based on the
template TestTemplate1 over autoenrollment.
5. Configure new certificate template by duplicating TestTemplate1 (name it for
example TestTemplate2), set in the superseeded tab that TestTemplate2 superseeds
the TestTemplate1, make sure that the certificate publishing in AD is activated and
double check that test user has Read, Enroll, and Autoenroll permissions set for
TestTemplate2.
6. Publish the TestTemplate2 template on the CA.
7. Log on as test user and check that the user gets certificate based on the new
template TestTemplate2 over autoenrollment.
8. On the DC, open dsa.msc, find the test user, open the properties and there will be
two certificates published in AD, one based on TestTemplate1 and the other based
on TestTemplate2 (on XP/W2k3 there would be only one, since the certificate
based on the template being superseded, TestTemplate1, would have been
deleted).
Cause
This feature has been removed in Vista and subsequent Windows versions.
Resolution
Workaround is to delete all certs issued by a specific template: For a V1 template:
certutil -delstore -user ldap: InternalTemplateName For a V2 or later template: certutil -
delstore -user ldap: TemplateOID InternalTemplateName is the non-localized template
name (the CN of the template object in AD). Above command will delete all certs from
DS store, issued using a specific template.
More information
The code change was made during Windows Vista/2008 time frame in order to address
issues raised after certificate roaming feature has been introduced (for example, an end
certificate can be created with an unknown CSP on a different machine and roam using
credential roaming, or the issuing CA of a RSA-based certificate that roamed has an
unknown signature algorithm -> both scenarios will result by the end certificate being
removed from AD, even if it is valid).
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that certificate used by Wired or Wireless
Network policies is missing in GPO settings report.
Applies to: Windows 10 - all editions, Windows Server 2016, Windows Server 2019,
Windows Server 2012 R2
Original KB number: 4047738
Symptoms
Consider the following scenario:
You configure one of the following policies of a group policy object (GPO) to use
the Microsoft: Smart Card or other certificate authentication method:
Wired Network (IEEE 802.3)
Wireless Network (IEEE 802.11)
Cause
The issue occurs because of a code defect in Windows.
Status
This issue affects only the GPO settings report. The certificate is successfully used by the
authentication.
Feedback
Was this page helpful? Yes No
This article provides workarounds for an issue where security certificate that's presented
by a website isn't issued when it has multiple trusted certification paths to root CAs.
Symptoms
When a user tries to access a secured website, the user receives the following warning
message in the web browser:
The security certificate presented by this website was not issued by a trusted
certificate authority.
After the user clicks Continue to this website (not recommended), the user can access
the secured website.
Cause
This issue occurs because the website certificate has multiple trusted certification paths
on the web server.
For example, assume that the client computer that you're using trusts Root certification
authority (CA) certificate (2). And the web server trusts Root CA certificate (1) and Root
CA certificate (2). Additionally, the certificate has the following two certification paths to
the trusted root CAs on the web server:
When Certification path 1 and Certification path 2 have the same quality score,
CryptoAPI selects the shorter path (Certification path 1) and sends the path to the client.
However, the client computer can verify the certificate only by using the longer
certification path that links to Root CA certificate (2). So the certificate validation fails.
Workaround
To work around this issue, delete or disable the certificate from the certification path
that you don't want to use by following these steps:
3. Expand Certificates (Local Computer) in the management console, and then locate
the certificate on the certificate path that you don't want to use.
7 Note
Additionally, if the Turn off Automatic Root Certificates Update Group Policy setting is
disabled or not configured on the server, the certificate from the certification path that
you don't want to use may be enabled or installed when the next chain building occurs.
To change the Group Policy setting, follow these steps:
1. Click Start > Run, type gpedit.msc, and then press Enter.
2. Expand Computer Configuration > Administrative Templates > System > Internet
Communication Management, and then click Internet Communication settings.
3. Double-click Turn off Automatic Root Certificates Update, select Enabled, and
then click OK.
Status
This behavior is by design.
Feedback
Was this page helpful? Yes No
This article provides information about when to use specific flags when you call
CryptAcquireContext and the reasons for using these flags.
Summary
Calls to the CryptAcquireContext function can include various flags. It is important to
know when to use these flags. This article provides information on when to use specific
flags when you call CryptAcquireContext and the reasons for using these flags.
More information
You are deriving a symmetric key from a hash to encrypt or decrypt data.
You plan to export a symmetric key, but not import it within the crypto context's
lifetime.
7 Note
You are performing private key operations, but you are not using a persisted
private key that is stored in a key container.
The best way to acquire a context is to try to open the container. If this attempt fails
with "NTE_BAD_KEYSET", then create the container by using the CRYPT_NEWKEYSET flag.
7 Note
Applications must not use the default key container by passing NULL for the
container name to store private keys. When multiple applications use the same
container, one application can change or destroy the keys that another application
needs to have available. If applications use key containers with a unique name, the
risk is reduced of other applications tampering with keys that are necessary for
proper function.
C++
To set the security on the container, call the CryptSetProvParam function with the
PP_KEYSET_SEC_DESCR flag after the container is created. This method allows you to set
the security descriptor on the container.
C++
// Acquire Context
if (!CryptAcquireContext(&hProv,
"Container",
NULL,
PROV_RSA_FULL,
0))
{
if (GetLastError() == NTE_BAD_KEYSET)
{
if (!CryptAcquireContext(&hProv,
"Container",
NULL,
PROV_RSA_FULL,
CRYPT_NEWKEYSET))
{
// Error ...
}
CryptAcquireContext errors
The following are the most common error codes and possible reasons for the error.
NTE_BAD_KEYSET (0x80090016)
Key container does not exist.
You do not have access to the key container.
The Protected Storage Service is not running.
NTE_EXISTS (0x8009000F)
The key container already exists, but you are attempting to create it. If a
previous attempt to open the key failed with NTE_BAD_KEYSET, it implies that
access to the key container is denied.
NTE_KEYSET_NOT_DEF (0x80090019)
The Crypto Service Provider (CSP) may not be set up correctly. Use of
Regsvr32.exe on CSP DLLs (Rsabase.dll or Rsaenh.dll) may fix the problem,
depending on the provider being used.
Feedback
Was this page helpful? Yes No
This article describes how to add a subject alternative name (SAN) to a secure
Lightweight Directory Access Protocol (LDAP) certificate.
Summary
The LDAP certificate is submitted to a certification authority (CA) that is configured on a
Windows Server 2003-based computer. The SAN lets you connect to a domain
controller by using a Domain Name System (DNS) name other than the computer name.
This article includes information about how to add SAN attributes to a certification
request that's submitted to an enterprise CA, a stand-alone CA, or a third-party CA.
When you submit a request to a stand-alone CA, certificate templates aren't used.
Therefore, the SAN must always be included in the certificate request. SAN attributes
can be added to a request that is created by using the Certreq.exe program. Or, SAN
attributes can be included in requests that are submitted by using the web enrollment
pages.
7 Note
The placeholder <servername> represents the name of the web server that is
running Windows Server 2003 and that has the CA that you want to access.
7 Note
The CA must be configured to issue web server certificates. You may have to
add the Web Server template to the Certificate Templates folder in the
Certification Authority snap-in if the CA is not already configured to issue web
server certificates.
8. In the Name box, type the fully qualified domain name of the domain controller.
11. In the Attributes box, type the desired SAN attributes. SAN attributes take the
following form:
san:dns=dns.name[&dns=dns.name]
Multiple DNS names are separated by an ampersand (&). For example, if the name
of the domain controller is corpdc1.fabrikam.com and the alias is
ldap.fabrikam.com , both names must be included in the SAN attributes. The
san:dns=corpdc1.fabrikam.com&dns=ldap.fabrikam.com
13. If you see the Certificate Issued webpage, click Install this Certificate.
7 Note
The placeholder <servername> represents the name of the web server that is
running Windows Server 2012 R2 and that has the CA that you want to access.
11. In the Attributes box, type the desired SAN attributes. SAN attributes take the
following form:
san:dns=dns.name[&dns=dns.name]
Multiple DNS names are separated by an ampersand (&). For example, if the name
of the domain controller is corpdc1.fabrikam.com and the alias is
ldap.fabrikam.com, both names must be included in the SAN attributes. The
resulting attribute string is displayed as follows:
san:dns=corpdc1.fabrikam.com&dns=ldap.fabrikam.com
If the certificate was issued, the Certificate Issued webpage is displayed. Click
Install this Certificate to install the certificate.
1. Create an .inf file that specifies the settings for the certificate request. To create an
.inf file, you can use the sample code in the Creating a RequestPolicy.inf file
section in How to Request a Certificate With a Custom Subject Alternative Name.
SANs can be included in the [Extensions] section. For examples, see the sample .inf
file.
4. At the command prompt, type the following command, and then press ENTER:
Console
This command uses the information in the Request.inf file to create a request in
the format that is specified by the RequestType value in the .inf file. When the
request is created, the public and private key pair is automatically generated and
then put in a request object in the enrollment requests store on the local
computer.
5. At the command prompt, type the following command, and then press ENTER:
Console
This command submits the certificate request to the CA. If there's more than one
CA in the environment, the -config switch can be used in the command line to
direct the request to a specific CA. If you don't use the -config switch, you're
prompted to select the CA to which the request should be submitted.
The -config switch uses the following format to refer to a specific CA:
For example, assume that the CA name is Corporate Policy CA1 and that the
domain name is corpca1.fabrikam.com . To use the certreq command together with
the -config switch to specify this CA, type the following command:
Console
If this CA is an enterprise CA and if the user who submits the certificate request has
Read and Enroll permissions for the template, the request is submitted. The issued
certificate is saved in the Certnew.cer file. If the CA is a stand-alone CA, the
certificate request will be in a pending state until it's approved by the CA
administrator. The output from the certreq -submit command contains the
Request ID number of the submitted request. As soon as the certificate is
approved, it can be retrieved by using the Request ID number.
6. Use the Request ID number to retrieve the certificate by running the following
command:
Console
You can also use the -config switch here to retrieve the certificate request from a
specific CA. If the -config switch isn't used, you're prompted to select the CA from
which to retrieve the certificate.
7. At the command prompt, type the following command, and then press ENTER:
Console
After you retrieve the certificate, you must install it. This command imports the
certificate into the appropriate store and then links the certificate to the private
key that is created in step 4.
7 Note
Most vendors refer to the certificate request as a Certificate Signing Request (CSR).
References
For more information about how to enable LDAP over SSL together with a third-party
certification authority, see How to enable LDAP over SSL with a third-party certification
authority .
For more information about how to request a certificate that has a custom subject
alternative name, see How to Request a Certificate With a Custom Subject Alternative
Name.
For more information about how to use certutil tasks to manage a certification authority
(CA), go to the following Microsoft Developer Network (MSDN) website: Certutil tasks
for managing a Certification Authority (CA)
Feedback
Was this page helpful? Yes No
Assume that you're configuring a certificate autoenrollment that has the CA certificate
manager approval and Valid existing certificate options enabled. When setting a
validity period and renewal period for the autoenrollment, the Certificate Authority (CA)
certificate manager approval is required only for the initial certificate autoenrollment.
However, in this scenario, the consequent certificate renewals also require CA certificate
manager approval.
7 Note
To identify the validity period and renewal period, use the certutil -dstemplate
<CertificateTemplateName> cmdlet, and search for pKIExpirationPeriod (the validity
Certificate autoenrollment runs every eight hours. When unsupported values of validity
and renewal period are configured in a certificate template, the certificate renewal is
skipped and the client triggers new enrollment requests instead of renewals, then
prompting CA certificate manager approval.
Recommended values of validity period and
renewal period
To be renewed, a certificate should have completed 80% of its validity period and be
within the renewal period. For example, a certificate valid for one year reaches the 80%
mark at around 41.5 weeks. If the certificate has a renewal period of six weeks, it will be
renewed during the 46th week period.
For normal renewal behaviors, set the renewal period to more than 8 hours and less
than 20% of the validity period.
7 Note
The execution of the certificate renewal will be skipped during the first 80% of the
certificate validity period and triggered in the last 20%.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue in which you can't import a certificate
that uses AES256-SHA256 encryption into certain versions of Windows or Windows
Server.
Applies to: Windows Server 2016, Windows Server 2012 R2, and earlier versions;
Windows 10 and earlier versions
Symptoms
On a computer that runs one of the operating systems that's listed in the "Applies to"
section, you use the Certificate Import Wizard to import a PFX file that uses AES256-
SHA256 encryption. The operation fails and generates a message that resembles the
following text:
Cause
The affected versions of Windows and Windows Server don't support AES256-SHA256
encryption for imported PFX files.
Workaround
Use TripleDES-SHA1 encryption for PFX files that you want to import into the affected
versions of Windows or Windows Server. Newer versions of Windows and Windows
Server support both TripleDES-SHA1 and AES256-SHA256 encryption for PFX files.
Feedback
Was this page helpful? Yes No
This article provides help to fix an issue where the Certutil -view command doesn't
return issued certificates correctly.
Symptoms
The Certutil command-line tool can be used to display the certificates that have been
issued by a certification authority using the -view parameter. Under some circumstances,
Certutil may not display all the expected certificates.
For example, the following command would not return the expected number of
certificates:
Console
Cause
This issue is a result of how Certutil handles parsing for the -view parameter. Specifically,
there is an issue with how it parses the following escape characters: \n, \r, and \t.
Resolution
The workaround is to uppercase all requester name strings passed as restrictions on the
Certutil command line.
Console
Console
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where clients can't authenticate with a server
after you obtain a new certificate to replace an expired certificate on the server.
Symptoms
After you replace an expired certificate with a new certificate on a server that is running
Microsoft Internet Authentication Service (IAS) or Routing and Remote Access, clients
that have Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
configured to verify the server's certificate can no longer authenticate with the server.
When you view the System log in Event Viewer on the client computer, the following
event is displayed.
If you enable verbose logging on the server that is running IAS or Routing and Remote
Access (for example, by running the netsh ras set tracing * enable command),
information similar to the following one is displayed in the Rastls.log file that is
generated when a client tries to authenticate.
7 Note
If you're using IAS as your Radius server for authentication, you see this behavior
on the IAS server. If you're using Routing and Remote Access, and Routing and
Remote Access is configured for Windows Authentication (not Radius
authentication), you see this behavior on the Routing and Remote Access server.
[1072] 15:47:57:280: The root cert will not be checked for revocation
[1072] 15:47:57:280: The cert will be checked for revocation
[1072] 15:47:57:280:
[1072] 15:47:57:280: >> Received Response (Code: 2) packet: Id: 11, Length: 25,
Type: 0, TLS blob length: 0. Flags:
[1072] 15:47:57:312: << Sending Request (Code: 1) packet: Id: 12, Length: 6, Type:
13, TLS blob length: 0. Flags: S
[1072] 15:47:57:312:
[1072] 15:47:57:312:
[1072] 15:47:57:452:
[1072] 15:47:57:452: >> Received Response (Code: 2) packet: Id: 12, Length: 80,
Type: 13, TLS blob length: 70. Flags: L
[1072] 15:47:57:671: << Sending Request (Code: 1) packet: Id: 13, Length: 1498,
Type: 13, TLS blob length: 3874. Flags: LM
[1072] 15:47:57:702:
[1072] 15:47:57:702: >> Received Response (Code: 2) packet: Id: 13, Length: 6, Type:
13, TLS blob length: 0. Flags:
[1072] 15:47:57:702: << Sending Request (Code: 1) packet: Id: 14, Length: 1498,
Type: 13, TLS blob length: 0. Flags: M
[1072] 15:47:57:718:
[1072] 15:47:57:718: >> Received Response (Code: 2) packet: Id: 14, Length: 6, Type:
13, TLS blob length: 0. Flags:
[1072] 15:47:57:718: << Sending Request (Code: 1) packet: Id: 15, Length: 900, Type:
13, TLS blob length: 0. Flags:
[1072] 15:48:12:905:
[1072] 15:48:12:905: >> Received Response (Code: 2) packet: Id: 15, Length: 6, Type:
13, TLS blob length: 0. Flags:
[1072] 15:48:12:905: << Sending Failure (Code: 4) packet: Id: 15, Length: 4, Type: 0,
TLS blob le
Cause
This issue may occur if all the following conditions are true:
The IAS or Routing and Remote Access server is a domain member, but automatic
certificate requests functionality (autoenrollment) isn't configured in the domain.
Or, the IAS or Routing and Remote Access server isn't a domain member.
You manually request and receive a new certificate for the IAS or Routing and
Remote Access server.
You don't remove the expired certificate from the IAS or Routing and Remote
Access server. If an expired certificate is present on the IAS or Routing and Remote
Access server together with a new valid certificate, client authentication doesn't
succeed. The "Error 0x80090328" result that is displayed in the Event Log on the
client computer corresponds to "Expired Certificate."
Workaround
To work around this issue, remove the expired (archived) certificate. To do it, follow
these steps:
1. Open the Microsoft Management Console (MMC) snap-in where you manage the
certificate store on the IAS server. If you don't already have an MMC snap-in to
view the certificate store from, create one. To do so:
a. Select Start, select Run, type mmc in the Open box, and then select OK.
b. On the Console menu (the File menu in Windows Server 2003), select
Add/Remove Snap-in, and then select Add.
c. In the Available Standalone Snap-ins list, select Certificates, select Add, select
Computer account, select Next, and then select Finish.
7 Note
You can also add the Certificates snap-in for the user account and for the
service account to this MMC snap-in.
More information
Microsoft recommends that you configure automatic certificate requests to renew
digital certificates in your organization. For more information, see Certificate
Autoenrollment in Windows XP
Feedback
Was this page helpful? Yes No
This article describes how to import a Web site certificate into the certificate store of the
local computer and assign the certificate to the Web site.
You can use one of the following methods to install a certificate in IIS:
Make an online request by using the IIS Web Server Certificate Wizard and install
the certificate at the time of the request.
Make an offline request by using the IIS Web Server Certificate Wizard and obtain
and install the certificate later.
Request a certificate without using the IIS Web Server Certificate Wizard.
7 Note
If you use the second or third method, you must install the certificate manually.
To install the Web site certificate, you must complete the following tasks:
You can now configure Web site elements to use secure communications.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the Remote Desktop server certificates
are renewed two times a day despite being valid for one year.
Symptoms
Consider the following scenario:
You configure a certificate template for Remote Desktop servers. To do this, you
follow the settings that are described in the following link:
In this scenario, you find that the servers are re-requesting and re-enrolling the
certificates two times daily. This occurs even though the certificate template is valid for
one year. Additionally, when the re-enrollment of the certificate occurs, some events are
logged in the System log.
Cause
The underlying cause of this behavior is related to the RDS component and to a
mismatch within the certificate template. Specifically, if the template name and template
display name are different, the RDS service does not match the existing certificate to the
template, and the RDS service periodically enrolls a new certificate.
Resolution
To resolve this problem, you must set the certificate template's attribute's template
display name and template name to the same value, such as RemoteDesktopComputer.
This procedure is suggested in Security.
) Important
You must set the certificate template's attributes Template Display Name and
Template Name to the same value.
Feedback
Was this page helpful? Yes No
This article provides help to solve an issue where Crypt32 event 8 is continuously
reported in the Application log.
Symptoms
The following event is recorded in the Application log:
uthrootseq.txt with error: The server name or address could not be resolved.
These events may be recorded at continuously, at regular intervals (for example, every
10 minutes) or they may only be recorded when you start a particular application.
Also, the computer on which the events are recorded doesn't have connectivity to the
Windows Update web site because of router or proxy configuration.
These events are recorded despite the fact that no applications or services installed on
the computer fail to start, or encounter any operational errors.
Cause
This behavior is expected under the following conditions:
The computer is unable to access the Windows Update web site due to router or
proxy configuration.
An application has been installed that has been designed to interact with the
Windows Security app on Windows Vista or higher. Example applications include
third-party virus software, malware scanners, or firewall products.
Resolution
There are three options for handling these events.
1. Disregard these events. They are benign and can be safely ignored.
2. Modify router or proxy configuration to allow computers recording these events to
connect to Windows Update.
3. Disable Automatic Root Updates on computers recording these events.
a. In Control Panel, double-click Add/Remove Programs.
b. Click Add/Remove Windows Components.
c. Click to clear the Update Root Certificates check box, and then continue with
the Windows Components Wizard.
More information
Microsoft requires that any software registers and interacts with the Windows Security
app that's signed with a digital certificate that chains up to an internal Microsoft code
signing root certification authority (CA). This CA is called the Microsoft Code Verification
Root CA (MSCV). Microsoft has cross-certified the MSCV with multiple third-party code-
signing CAs allowing these vendors to continue issuing valid code-signing certificates to
their customers.
The MSCV certificate is embedded in the kernel, but it is not available as part of the
Automatic Trusted Root Update service. Whenever the digital signature on one of these
applications is checked, the chain of the vendor's code signing certificate is built up to
both the root CA of the third-party that issued the code signing certificate and, by virtue
of the cross-CA certificate issued by Microsoft, also to the MSCV. In short, two chains
are built and the validity of both are verified.
The MSCV certificate is not embedded in the kernel so Windows determines that that
CA is not trusted. If Automatic Trusted Root Updates are enabled, then Windows will
attempt to contact Windows Update to determine if the MSCV certificate is published
by Microsoft as part of the Trusted Root Program. The MSCV is not available through
that program, so this lookup fails.
Windows quickly determines that the MSCV isn't trusted and that chain is eliminated.
This leaves the other chain that leads to a third-party root CA, which is probably valid,
allowing the application's signature to be successfully validated. Thus, there are no
errors or failures associated with the application.
If Windows can successfully contact Windows Update, then no events are recorded in
the Application log. Failure to locate an arbitrary untrusted root CA certificate on
Windows Update is a handled failure and requires no special reporting. If Automatic
Trusted Root Updates are enabled, but Windows is unable to contact the Windows
Update site, then that is an error that requires reporting through the events and errors
documented above.
These events aren't recorded on Windows Vista or higher because the MSCV certificate
is embedded in the Windows kernel. The MSCV is therefore inherently trusted and
there's no need to look for the certificate on Windows Update.
Feedback
Was this page helpful? Yes No
This article provides steps to solve the event 4107 and event 11 that are logged in the
Application log.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1, Windows
7 Service Pack 1
Original KB number: 2328240
Symptoms
The following error messages are logged in the Application log:
Output
Output
Cause
This error occurs because the Microsoft Certificate Trust List Publisher certificate expired.
A copy of the CTL with an expired signing certificate exists in the CryptnetUrlCache
folder.
Resolution
To resolve the problem, follow these steps:
1. Open a command prompt. Select Start, select All Programs, select Accessories,
and then select Command Prompt.
2. At the command prompt, type the following command, and then press ENTER:
Console
7 Note
The certutil command must be run for every user on the workstation. Each
user must log in and follow steps 1 and 2 above.
3. If the expired certificate is cached in one of the local system profiles, you must
delete the contents of some directories by using Windows Explorer. To do it, follow
these steps:
a. Start Windows Explorer. Select Start, select All Programs, select Accessories,
and then select Windows Explorer.
7 Note
You must enable hidden folders to view the directories whose contents you
must delete. To enable hidden files and folders, follow these steps:
i. Select Organize, and then select Folder and search options.
ii. Select the View tab.
iii. Select the Show hidden files and folders check box.
iv. Clear the Hide extensions for known file types check box.
v. Clear the Hide protected operating system files check box.
vi. Select Yes to dismiss the warning, and then select OK to apply the
changes and to close the dialog box.
b. Delete the contents of the directories that are listed here. (%windir% is the
Windows directory.)
7 Note
You may receive a message that states that you do not have permission to
access the folder. If you receive this message, select Continue.
LocalService :
%windir%\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUr
lCache\Content
%windir%\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUr
lCache\MetaData
NetworkService :
%windir%\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\Cryptn
etUrlCache\Content
%windir%\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\Cryptn
etUrlCache\MetaData
LocalSystem :
%windir%\System32\config\systemprofile\AppData\LocalLow\Microsoft\Cryptn
etUrlCache\Content
%windir%\System32\config\systemprofile\AppData\LocalLow\Microsoft\Cryptn
etUrlCache\MetaData
More information
Event ID 4107 can also be logged with The data is invalid error instead of the following
error:
A required certificate is not within its validity period when verifying against the
current system clock or the timestamp in the signed file
This error Data is invalid indicates the object returned from the network wasn't a valid
cab file. So Windows couldn't parse it correctly. Instances of such an error can occur
when the network retrieval attempt for the cab file fails to go through a proxy. If the
proxy returns some data or message instead of a standard HTTP error code, Windows
will try to parse the message received from the proxy, expecting it to be the cab. This
situation will fail with the data is invalid error.
To address this error, you need to remove the invalid entry in the cache by clearing the
cache following the steps in the Resolution section.
Feedback
Was this page helpful? Yes No
This article discusses the removal of the U.S. Federal Common Policy CA root certificate
in the May 24, 2022 Microsoft Root certificate update. This article also provides solutions
to avoid or resolve issues that will occur if enterprises haven't transitioned to the Federal
Common Policy CA G2 root certificate before the removal of the Federal Common Policy
CA root certificate from the Microsoft Certificate Trust List (CTL) by May 24, 2022.
7 Note
The root certificate that's being removed by the Microsoft Root Certificate Update
is named "Federal Common Policy CA" and is commonly referred to as the "G1"
root certificate even though "G1" does not appear in the certificate name.
The root certificate that replaces the "G1" root certificate is named "Federal
Common Policy CA G2" and is commonly referred to as the "G2" root certificate.
Introduction
The United States Federal PKI (FPKI) team that governs the U.S. Federal Common
Policy CA formally requested the removal of the "G1" root certificate listed below from
the Microsoft Trusted Root Program.
ノ Expand table
Applications and operations that depend on the "G1" root certificate will fail one to
seven days after they receive the root certificate update. Administrators should migrate
from the existing "G1" root certificate to the replacement "G2" root certificate listed
below as your agency's federal trust anchor.
ノ Expand table
7 Note
The "G2" root certificate can be downloaded directly from "G2" root certificate crt
file download .
Potential issues
After the "G1" root certificate is removed, users in environments that have not
transitioned to the "G2" root certificate may experience issues that affect the following
scenarios:
The following error messages may be displayed in pop-up windows and dialog boxes:
The security certificate presented by this website was not issued by a trusted
CA.
7 Note
Application-as-service scenarios such as Azure SQL or Azure App Service that chain
to the "G1" root certificate will fail after the "G1" root certificate is removed.
7 Note
The preview of the May release which includes the removal of the "G1" root
certificate is staged on May 11, 2022.
Set RootDirUrl to
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/t
est .
Set SyncFromDirUrl to
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/t
est .
EncodedCtl
LastSyncTime
4. Delete the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificate
7 Note
5. Verify all scenarios that chain to the "G1" root certificate, including those that are
listed in Potential issues.
7 Note
The link to the test site never changes. However, the changes that are staged on
the test site change from month to month.
Set RootDirUrl to
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en .
Set SyncFromDirUrl to
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en .
EncodedCtl
LastSyncTime
4. Delete the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificate
1. Follow the guidance in Obtain and verify the FCPCA root certificate to download
and install the "G2" root certificate on all Windows workgroup, member, and
domain controller computers.
2. There are multiple ways to deploy the root store to enterprise devices. See the
"Microsoft Solutions" section in Distribute to operating systems .
7 Note
Many federal enterprises must have either the U.S. Treasury CA certificates or the
Entrust Managed Services CA certificates. Both CA certificates are documented in
the "Distribute the CA certificates" article, as follows:
c. When you select disallowedcert.sst, this should open the Certificate Manager
snap-in to display all roots in the Disallowed list.
3. To evaluate settings that are not shown in the UI, convert the SST file to a text file.
To do this, run certutil -dump -gmt -v c:\roots\trustedcerts.sst >
c:\roots\trustedcerts.txt .
4. Download the "G2" root certificate from Obtain and verify the FCPCA root
certificate and add it to your personal CTL.
1. Enable CAPI2 logging. See Windows PKI Troubleshooting and CAPI2 Diagnostics .
2. Create filters in Event Viewer on the following event logs, event sources, and event
IDs.
Error 19: This event indicates that an attempt was made to use a smart card
logon, but the KDC cannot use the PKINIT protocol because a suitable
certificate is missing.
Event 21: A certificate chain could not be built to a trusted root authority.
Event 29: The Key Distribution Center (KDC) cannot find a suitable certificate
to use for smart card logons, or the KDC certificate could not be verified.
Smart card logon may not function correctly if this problem is not resolved.
To correct this problem, either verify the existing KDC certificate by using
Certutil.exe or enroll for a new KDC certificate.
Feedback
Was this page helpful? Yes No
This article provides help to solve an error "No certificate templates could be found"
that occurs when you request certificates from CA web enrollment pages.
Symptoms
When a user tries to request a certificate from the certification authority (CA) web
enrollment pages, the user may receive the following error message:
This behavior occurs if the Web enrollment pages are in an Active Directory domain on
an Enterprise CA server. It occurs whether the web enrollment pages are on the same
server or on a different member server.
Cause
The CA Web enrollment pages perform a case-sensitive string comparison of two values.
One value is the sServerConfig value in the Certdat.inc file in the
%systemroot%\System32\Certsrv folder on the certificate server, and the other value is
Resolution
To correct this behavior, follow these steps:
2. Edit the Certdat.inc file so that the value for sServerConfig is the same as the value
for the dNSHostName attribute followed by the Certificate Authority Name.
7 Note
The sServerConfig value must be in the same exact case as the dNSHostName
attribute. If this is not true, you will continue to get the same error.
to server1.domain.local\MYCA.
4. Have the user who wants to request the certificate restart Internet Explorer. This
permits the new credentials to pass to the CA.
7 Note
Also make sure that the user is granted Read and Enroll permissions on the
certificate template which that user is requesting. You can grant these
permissions either by using the ADSIEdit snap-in or the Certificate Templates
snap-in.
Feedback
Was this page helpful? Yes No
This article provides solutions to an issue where you fail to request a certificate by using
web enrollment.
Symptoms
When you browse the CA website to request a certificate, and click on "Request a
certificate" and then click on "Create and submit a request to this CA", you get the
following message:
In order to complete certificate enrollment, the web site for the CA must be
configured to use HTTPS authentication
You may also see the following message next to address bar:
Internet explorer has blocked this site from using an activeX control in an unsafe
manner. As a result, this page might not display correctly.
To resolve the above errors, if you add the website URL in the trusted site zone and
enable the setting "Initialize and script ActiveX controls not marked as safe for scripting"
and then try to browse the website for certificate request, you'll get the following
message:
This web site is attempting to perform a digital certificate operation on your behalf:
https://CAWebsiteURL
You should only allow known web sites to perform digital certificate operations on
your behalf. Do you want to allow this operation?
If you hit "OK" on the above message, you get a pop-up window with the following
message:
You can use mmc, auto enrollment, and certreq.exe to request a V3 template.
Resolution
Here are some possible solutions of this issue:
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when client computers encrypt a
file in a Microsoft Windows Server 2003 domain.
Symptoms
When a client computer uses the Encrypting File System (EFS) to encrypt a file that is
stored on a remote computer in a Microsoft Windows Server 2003 domain, you may
receive an error message on the computer that resembles the following:
Recovery policy configured for this system contains invalid recovery certificate.
Cause
This problem occurs if the EFS recovery policy that is implemented on the client
computer contains one or more EFS recovery agent certificates that have expired. Client
computers cannot encrypt any new documents until a valid recovery agent certificate is
available.
Resolution
To resolve this problem, follow these steps:
1. Log on to a domain controller by using the user account under which you want the
EFS recovery agent to run.
2. Use the Windows Server 2003 version of the Cipher tool together with the /r
switch to create a new self-signed file recovery certificate and a private key. The
Cipher tool generates a new public file recovery certificate (a .cer file) and a .pfx
file. Make copies of these files, and then save them to a safe location. To generate
the new file recovery certificate, follow these steps:
a. Click Start, click Run, type cmd, and then click OK.
b. At the command prompt, type cipher /r: file_name , and then press ENTER.
7 Note
file_name represents the file name that you want to use. Use a file name
that is meaningful to you. Do not add an extension to the file name. Make
sure that the new .cer and .pfx files are created in the same folder.
c. When you are prompted for a password to protect the .pfx file, type a password
that you will easily remember.
3. Export the old EFS recovery agent certificate. To do this, follow these steps:
c. Click the Group Policy tab, click the Default Domain Policy Group Policy object
(GPO), and then click Edit.
e. Right-click the current EFS recovery agent certificate, point to All Tasks, and
then click Export.
f. Follow the instructions in the Certificate Export Wizard to export the old EFS
recovery agent certificate.
7 Note
Make sure that you export the old EFS recovery agent certificate together
with the private key to a .cer file. Keep the new EFS recovery agent .pfx file
and the old EFS recovery agent .pfx file in a safe location.
4. Right-click the old EFS recovery agent certificate, click Delete, and then click Yes.
7 Note
When you open the .cer file, you see USER_UNKNOWN in the Recovery
Agents field. This message is expected. Also, you receive a warning message
from the Add Recovery Agent Wizard that the certificate is not trusted.
6. Import the new .cer file that you created in step 2b to the folder: Computer
Configuration\Windows Settings\Security Settings\Public Key Policies\Trusted
Feedback
Was this page helpful? Yes No
This article describes how to use Cipher.exe to overwrite deleted data in Windows Server
2003.
Summary
Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the
NTFS file system. They can also use it to view the encryption status of files and folders
from a command prompt. The version of Cipher.exe that's included with Windows
Server 2003 includes the ability to overwrite data that has been deleted so that it can't
be recovered or accessed.
When you delete files or folders, the data isn't initially removed from the hard disk.
Instead, the space on the disk that was occupied by the deleted data is deallocated.
After it's deallocated, the space is available to use when new data is written to the disk.
Until the space is overwritten, you can recover the deleted data by using a low-level disk
editor or data-recovery software.
When you encrypt plain text files, Encrypting File System (EFS) makes a backup copy of
the file. So the data isn't lost if an error occurs during the encryption process. After the
encryption is complete, the backup copy is deleted. As with other deleted files, the data
isn't removed until it has been overwritten. The Windows Server 2003 version of the
Cipher utility is designed to prevent unauthorized recovery of such data.
7 Note
The cipher /w command does not work for files that are smaller than 1 KB.
Therefore, make sure that you check the file size to confirm whether is smaller than
1 KB. This issue is scheduled to be fixed in longhorn.
To overwrite deleted data on a volume by using Cipher.exe, use the /w switch with the
cipher command:
Data that isn't allocated to files or folders is overwritten. The data is permanently
removed. It can take a long time if you overwrite a large amount of space.
References
For more information about related topics, see Cipher.exe Security Tool for the
Encrypting File System .
Feedback
Was this page helpful? Yes No
This article provides help to solve an issue where S4U2Self requests fail with the error
KDC_ERR_C_PRINCIPAL_UNKNOWN.
Symptoms
You are running an application server that needs to authorize users that do not have a
logon with the server, for role-based checks using Active Directory security group
memberships. You are using the AuthZ API to do this work. Another scenario where this
problem can happen is a server that accepts user certificates for logon, for example a
web server such as Internet Information Server (IIS). To retrieve information needed for
access checks on local resources, LSASS performs a S4U2Self Kerberos transaction. But
that fails and the user cannot logon or you cannot verify the user's role.
In a network trace, you may see multiple requests with PaData Type PA-PAC-REQUEST
(type 128) which fail with errors KDC_ERR_C_PRINCIPAL_UNKNOWN (error code 6) or
KDC_ERR_PREAUTH_REQUIRED (25). But these are not fatal. Error code 6 for these
means that the domain controller to which the request was made does not host the
account and the client should choose a different domain controller. Error code 25 means
that the client cannot retrieve the user's privilege attribute certificate (PAC) without
proper validation. The client then gets a proper ticket for the user's domain key
distribution center (KDC).
Next, the last request is sent with the PaData type PA-FOR-USER (type 129) with the
application server host service principal name (SPN) as the SName and the user's user
principal name (UPN) in the PaForUser branch of the frame. The client on the request is
the application server.
This request now also fails with error KDC_ERR_C_PRINCIPAL_UNKNOWN (error code
6). This is a fatal error.
7 Note
It will be helpful to run the network trace through frame reassembly in Network
Monitor 3.x.
Cause
The Kerberos error is actually an Access is Denied error for reading this attribute. The
S4U2Self request is accessing the TokenGroupsGlobalAndUniversal user-constructed
attribute and requires permissions to do so. By default, authenticated users have these
permissions.
Resolution
If these permissions have been changed or otherwise revoked, you need to add the
requesting accounts to the Windows Authorization Access Group. By default, this
group has the required access on all user and computer accounts. If you have also
changed the permissions of Windows Authorization Access Group, you need to
construct the permissions or use a custom group to grant the permissions.
More information
This behavior is independent of how the public key infrastructure (PKI) is set up for the
certificate logon case. It is also independent of whether both the server and user are in
the same forest or in different forests. If they are in different forests, it would work with
or without selective authentication enabled. The user needs "allowed to authenticate"
access for the server if selective authentication is enabled.
In the certificate logon case, the server application would get a handle to an access
token when the Kerberos transaction is successful. This access token is not good for
Kerberos delegation.
You can get KDC warning Event ID 25 when the S4U2Self request fails. You need to set
KdcExtraLogLevel to 0x08. For more information about this registry entry, click the
following article number to view the article in the Microsoft Knowledge Base:
837361 Kerberos protocol registry entries and KDC configuration keys in Windows
Server 2003
Feedback
Was this page helpful? Yes No
This article helps resolve the issue in which Certificate Enrollment Policy Web Service
(CEP) and Certificate Enrollment Web Service (CES) autoenrollment using key-based
renewal (KBR) fails on non-domain-joined clients, and you receive error "0x80090022
NTE_SILENT_CONTEXT."
You configure the CEP/CES on non-domain-joined clients for Username Password initial
enrollment, and certificate KBR. For more information about the configuration, see
Configuring Certificate Enrollment Web Service for certificate key-based renewal on a
custom port.
Initial certificate enrollment using certlm.msc and authenticating with the username and
password of the AD account works, but the KBR renewal fails. The renewal fails when it's
triggered using autoenrollment and when it's executed manually using the certreq -
machine -q -enroll -cert <thumbprint> renew cmdlet.
During the KBR certificate renewal, you received error "0x80090022 (-2146893790
NTE_SILENT_CONTEXT)" from the CertEnroll.log file:
Output
The confusion is caused by the higher priority of the certificate_CES endpoint. The
certificate_CES endpoint executes first (the certificate_CES endpoint must work in KBR
renewal scenario) and after that the initial username_password_CES takes place as a
fallback. The username_password_CES endpoint requires the user input, which isn't
expected to work. Then the error "0x80090022 NTE_SILENT_CONTEXT" occurs.
Ports for Remote Procedure Call (RPC) or Distributed Component Object Model
(DCOM) connectivity are blocked between CES and the certification authority (CA)
server.
Ports for RPC or DCOM connectivity are blocked between the CA server and
domain controllers.
There are configuration issues with CEP/CES applications that are hosted by
Internet Information Services (IIS).
Web.config file.
Feedback
Was this page helpful? Yes No
This article helps work around an error that occurs when trying to get the NDES
enrollment challenge password.
Symptoms
Assume that you install the Network Device Enrollment Service (NDES) role service on a
server that is running Windows Server 2012. In this scenario, you receive the following
error when trying to get the NDES enrollment challenge password:
Additionally, an event that resembles the following is logged on the server on which the
NDES role service is installed:
Feedback
Was this page helpful? Yes No
This article provides a solution to fix an issue where renewing Exchange Enrollment
Agent (Offline request) certificate by using NDES fails.
Symptoms
You get the error "Status: unavailable" when trying to renew "Exchange Enrollment
Agent (Offline request)" certificate used by NDES, from the computer certificate store
console in MMC.
Cause
Network Device Enrollment Service (NDES) requests two certificates according to the
following two certificate templates configured with the "Intended purpose" (Enhanced
Key Usages) set to "Certificate Request Agent":
CEP Encryption.
Exchange Enrollment Agent (Offline request).
When you install the NDES service on a Windows Server 2008 server, it requires you to
provide a domain user that the NDES will use to authorize certificate requests. So, there
are different security contexts to consider: the installer context (who installs the NDES)
and the service context (the domain user that is provided during installation, and under
which the NDES runs later). The Enrollment Agent certificate is enrolled during the
installation and under the installer context, but will be loaded by the NDES later under
the service context. For the above reason, the Enrollment Agent certificate (and the CEP
Encryption certificate) must be stored in the common store that those context can
access, and the computer certificate store is chosen.
However, since the "Subject Type" of the certificate template "Exchange Enrollment
Agent (Offline request)" is set to "User", we won't be able to renew the certificate
template "Exchange Enrollment Agent (Offline request)" in MMC console (computer
certificate store) due to mismatched type of subject. The error "Status: unavailable"
would be returned in this situation.
Note: This issue doesn't happen when trying to renew "CEP Encryption" certificate
template, because its subject type is set to "Computer or other Device". Therefore,
renewal of this certificate can succeed as long as you have sufficient permission on the
system and certificate template.
Resolution
Use the certreq.exe tool to renew the Exchange Enrollment Agent (Offline request)
certificate with the following steps:
[Version]
Signature="$Windows NT$"
[NewRequest]
RenewalCert="<Certificate Hash>"
MachineKeySet=TRUE
7 Note
The INF file contains input options that define the certificate request
parameters. In the above INF file, it tells the command-line tool certreq.exe to
renew the certificate with the specified Certificate Hash. You can get the
Exchange Enrollment Agent (Offline request) certificate's certificate hash by
copying the value of the certificate's "t h umbprint " extension retrieved from
certificate's "Details tab". For example, if the certificate's Thumbprint is "5 3 60
8f 10 49 1d 50 bf a2 9f 06 17 96 8a 93 05 13 cc b9 55", we will need to edit the
contents to the lines below:
[Version]
Signature="$Windows NT$"
[NewRequest]
RenewalCert="53 60 8f 10 49 1d 50 bf a2 9f 06 17 96 8a 93 05 13 cc b9 55"
MachineKeySet=TRUE
7 Note
MachineKeySet set to "True" so the certificate and its private key will be stored
in computer certificate store.
7 Note
To open the computer certificate store, please refer to the following technet
article: Add the Certificates Snap-in to an MMC Add the Certificates Snap-in
to an MMC
2. Run the following three commands to renew that old Enrollment Agent certificate:
Console
7 Note
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where a certificate template is unable to load
and certificate requests are unsuccessful using the same template.
Summary
When Certificate Services starts on a Certification Authority (CA), a certificate template is
unable to load and certificate requests are unsuccessful using the same template.
More information
The behavior occurs because the Authenticated Users group is removed from the
template's access control list (ACL). The Authenticated Users group is on a template ACL,
by default. (The CA itself is included in this group.) If the Authenticated Users group is
removed, the (enterprise) CA itself can no longer read the template in the Active
Directory, and that's why certificate requests can be unsuccessful.
If an administrator wants to remove the Authenticated Users group, each and every CA's
computer account must be added to the template ACLs and set to Read.
If authenticated users have been removed from the ACLs of a template, the following
errors may be observed when the CA starts and when a certificate is requested against
the template.
Event Type:Warning
Event Source:CertSvc
Event Category:None
Event ID: 53
Date: <DateTime>
Time: <DateTime>
User:N/A
Computer: MUSGRAVE
Description:
Certificate Services denied request 9 because the requested certificate
template is not supported by this CA. 0x80094800 (-2146875392). The request
was for TED\administrator. Additional information: Denied by Policy Module.
The request was for certificate template (<template name>) that is not
supported by the Certificate Services policy.
Feedback
Was this page helpful? Yes No
Provide product feedback
Back up the recovery agent Encrypting
File System (EFS) private key in Windows
Article • 02/26/2024
This article describes how to back up the recovery agent Encrypting File System (EFS)
private key on a computer.
Summary
Use the recovery agent's private key to recover data in situations when the copy of the
EFS private key that is located on the local computer is lost. This article contains
information about how to use the Certificate Export Wizard to export the recover
agent's private key from a computer that is a member of a workgroup, and from a
Windows Server 2003-based, Windows 2000-based, Windows Server 2008-based or
Windows Server 2008 R2-based domain controller.
Introduction
This article describes how to back up the recovery agent Encrypting File System (EFS)
private key in Windows Server 2003, in Windows 2000, in Windows XP, in Windows
Vista, in Windows 7, in Windows Server 2008, and in Windows Server 2008 R2. You can
use the recovery agent's private key to recover data in situations when the copy of the
EFS private key that is located on the local computer is lost.
You can use EFS to encrypt data files to prevent unauthorized access. EFS uses an
encryption key that is dynamically generated to encrypt the file. The File Encryption Key
(FEK) is encrypted with the EFS public key and is added to the file as an EFS attribute
that is named Data Decryption Field (DDF). To decrypt the FEK, you must have the
corresponding EFS private key from the public-private key pair. After you decrypt the
FEK, you can use the FEK to decrypt the file.
If your EFS private key is lost, you can use a recovery agent to recover encrypted files.
Every time that a file is encrypted, the FEK is also encrypted with the Recovery Agent's
public key. The encrypted FEK is attached to the file with the copy that is encrypted with
your EFS public key in the Data Recovery Field (DRF). If you use the recovery agent's
private key, you can decrypt the FEK, and then decrypt the file.
By default, if a computer that is running Microsoft Windows 2000 Professional is a
member of a workgroup or is a member of a Microsoft Windows NT 4.0 domain, the
local administrator who first logs on to the computer is designated as the default
recovery agent. By default, if a computer that is running Windows XP or Windows 2000
is a member of a Windows Server 2003 domain or a Windows 2000 domain, the built-in
Administrator account on the first domain controller in the domain is designated as the
default recovery agent.
A computer that is running Windows XP and that is a member of a workgroup does not
have a default recovery agent. You have to manually create a local recovery agent.
) Important
After you export the private key to a floppy disk or other removable media , store
the floppy disk or media in a secure location. If someone gains access to your EFS
private key, that person can gain access to your encrypted data.
1. Log on to the computer by using the recovery agent's local user account.
2. Click Start, click Run, type mmc, and then click OK.
3. On the File menu, click Add/Remove Snap-in. Then click Add in Windows Server
2003, in Windows XP or in Windows 2000. Or click OK in Windows Vista, in
Windows 7, in Windows Server 2008 or in Windows Server 2008 R2.
4. Under Available Standalone Snap-ins, click Certificates, and then click Add.
9. Right-click the certificate that you located in step 8, point to All Tasks, and then
click Export. The Certificate Export Wizard starts.
11. Click Yes, export the private key, and then click Next.
7 Note
We strongly recommend that you also click to select the Enable strong
protection (requires IE 5.0, NT 4.0 SP4 or above check box to protect your
private key from unauthorized access.
If you click to select the Delete the private key if the export is successful check
box, the private key is removed from the computer and you will not be able to
decrypt any encrypted files.
15. Specify a file name and location where you want to export the certificate and the
private key, and then click Next.
7 Note
16. Verify the settings that are displayed on the Completing the Certificate Export
Wizard page, and then click Finish.
To locate the Encrypted Data Recovery policy, open the Default Domain Policy in the
Group Policy Object Editor snap-in, expand Computer Configuration, expand Windows
Settings, expand Security Settings, and then expand Public Key Policies.
To export the domain recovery agent's private key, follow these steps:
1. Locate the first domain controller that was promoted in the domain.
3. Click Start, click Run, type mmc, and then click OK.
4. On the File menu, click Add/Remove Snap-in. Then click Add in Windows Server
2003 or in Windows 2000. Or click OK in Windows Server 2008 or in Windows
Server 2008 R2.
5. Under Available Standalone Snap-ins, click Certificates, and then click Add.
7. Click Close, and then click OK in Windows Server 2003 or in Windows 2000. Or
click OK in Windows Server 2008 or in Windows Server 2008 R2.
9. Locate the certificate that displays the words "File Recovery" (without the
quotation marks) in the Intended Purposes column.
10. Right-click the certificate that you located in step 9, point to All Tasks, and then
click Export. The Certificate Export Wizard starts.
12. Click Yes, export the private key, and then click Next.
7 Note
We strongly recommend that you click to select the Enable strong protection
(requires IE 5.0, NT 4.0 SP4 or above check box to protect your private key
from unauthorized access.
If you click to select the Delete the private key if the export is successful check
box, the private key is removed from the domain controller. As a best practice, we
recommend that you use this option. Install the recovery agent's private key only
in situations when you need it to recover files. At all other times, export, and then
store the recovery agent's private key offline to help maintain its security.
16. Specify a file name and location where you want to export the certificate and the
private key, and then click Next.
7 Note
17. Verify the settings that are displayed on the Completing the Certificate Export
Wizard page, and then click Finish.
Feedback
Was this page helpful? Yes No
This article provides a workaround for the issue Windows Server 2016 CA-compatible
certificate templates cannot be selected from Windows Server 2016 or later-based CAs
or CEP servers.
Symptoms
Consider either of the following scenarios:
Cause
This is a known issue in Windows Server 2016 and later versions. The CEP or CES server
provides certificate templates only to clients that have the following compatibility
settings:
Workaround
To work around this issue, follow these steps:
2. Wait 30 minutes for the CEP server to receive the updated template information (or
use the IISReset tool to restart the server).
3. On the client computer, clear the client-side Enrollment Policy Cache by using the
following command in a Command Prompt window:
Console
4. On the client computer, try to enroll the certificate again. The template should now
be available.
Feedback
Was this page helpful? Yes No
This article describes an issue where you can't share files that are encrypted by using
multiple EFS certificates.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows 10 - all editions
Original KB number: 3118620
Symptoms
Consider the following scenario:
You would like users to share files that were encrypted by using multiple
Encrypting File System (EFS) certificates.
File F1 exists on a computer on which EFS is enabled, and users U1 and U2 have
read and write permissions on the file.
User U1 creates file sharing for file F1 by adding the appropriate EFS certificate for
user U2 to file F1.
In this scenario, EFS metadata is not maintained, and only the current user can decrypt
the file. However, you expect that EFS metadata will be maintained and that the user
whom you added in step 7 is still there.
Cause
If an application opens and saves a file by using the replacefile() API, and if that file
was encrypted by using EFS when more than one certificate was present, the resulting
file will contain only the certificate of the user who saved the file. This behavior is by
design.
Status
This method of sharing encrypted files is unsupported at this time.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Certificate Services (certsvc) doesn't
start after upgrade to Microsoft Windows Server 2016.
Symptoms
After you perform an in-place upgrade of Windows Server 2012 or Windows Server
2012 R2 to Windows Server 2016, Active Directory Certificate Services (certsvc) may not
start. If you try to manually start the service from Services Management Console
(services.msc), the attempt may fail with the following error message:
Windows could not start the Active Directory Certificate Services service on Local
Computer. Error 1058: The service cannot be started, either because it is disabled or
because it has not enabled devices associated with it.
Additionally, when you try to start Active Directory Certificate Services from the
Certificate Services snap-in, it may fail, and then you receive the following error
message:
7 Note
No event is recorded in the System or Application logs when the service fails
to start.
This issue may occur on different configurations. For example: Domain joined,
Non-Domain joined, Enterprise Certificate Authority, and Standalone
Certificate Authority
Workaround
To recover from this issue, restart the computer. Active Directory Certificate Services is
automatically started after the computer reboots.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Certificate Services(CS) may not start
on a computer that is running Windows Server 2003 or Windows 2000.
Symptoms
On a computer that is running Microsoft Windows Server 2003 or Microsoft Windows
2000 Server, Certificate Services may not start.
Additionally, the following error message may be logged in the Application log in Event
Viewer.
Cause
Before Certificate Services starts, it enumerates all the keys and certificates that have
been issued to the certification authority (CA), even if the keys and the certificates have
expired. Certificate Services won't start if any one of these certificates has been removed
from the local computer Personal certificate store.
Resolution
To resolve this issue, verify that the number of certificate thumbprints in the registry is
equal to the number of certificates that have been issued to the CA. If any certificates
are missing, import the missing certificates into the local computer Personal certificate
store. After you've imported the missing certificates, use the certutil -repairstore
command to repair the link between the imported certificates and the associated private
key store.
To do it, use one of the following methods, depending on which version of the
operating system your computer is running.
Method 1: Windows Server 2003
To resolve this issue on a Windows Server 2003-based computer, follow these steps.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows .
The certificate thumbprints indicate all the certificates that have been issued to this CA.
Every time that a certificate is renewed, a new certificate thumbprint is added to the
CaCertHash list in the registry. The number of entries in this list must equal the number
of certificates that are issued to the CA and that are listed in the local computer Personal
certificate store.
1. Select Start, select Run, type regedit, and then select OK.
4. Make a note of the number of certificate thumbprints that the Value data list
contains.
6. Type the following command, and then press ENTER: certutil -store
Compare the number of certificates that are listed in the local computer Personal
certificate store to the number of certificate thumbprints that are listed in the
CaCertHash registry entry. If the numbers are different, go to Step 2: Import the
missing certificates. If the numbers are the same, go to Step 3: Install the Windows
Server 2003 Administration Tools Pack.
a. Select Start, select Run, type mmc, and then select OK.
c. Select Add.
If the Certificates snap-in dialog box appears, select My user account, and then
select Finish.
f. On the File menu, select Save as, type Certificates in the File name box, and
then select Save.
To open Certificates in the future, select Start, point to All Programs, point to
Administrative Tools, and then select Certificates.
4. On the File to Import page, type the full path of the certificate file that you want to
import in the File name box, and then select Next. Instead, select Browse, search
for the file, and then select Next.
5. If the file that you want to import is a Personal Information Exchange - PKCS #12
(*.PFX) file, you'll be prompted for the password. Type the password, and then
select Next.
7 Note
3. Make a note of the certificate in the Certenroll folder that looks similar to the
following: Your_Server. Your_Domain.com_rootca.crt
4. Type the following commands, and then press ENTER after each command:
%systemroot%\system32\certutil -addstore my
%systemroot%\system32\certsrv\certenroll\Your_Server.Your_Domain.com_rootca.cr
t %systemroot%\System32\certutil -dump
%systemroot%\system32\certsrv\certenroll\Your_Server.Your_Domain.com_rootca.cr
5. In the output from the last command, near the end, you'll see a line that is similar
to the following:
Key Id Hash(sha1): ea c7 7d 7e e8 cd 84 9b e8 aa 71 6d f4 b7 e5 09 d9 b6 32 1b
The Key Id Hash data is specific to your computer. Make a note of this line.
6. Type the following command including the quotation marks, and then press
ENTER:
%systemroot%\system32\certutil -repairstore my "Key_Id_Hash_Data"
In this command, Key_Id_Hash_Data is the line that you noted in step 4. For
example, type the following:
%systemroot%\system32\certutil -repairstore my "ea c7 7d 7e e8 cd 84 9b e8 aa
71 6d f4 b7 e5 09 d9 b6 32 1b"
7. To verify the certificates, type the following, and then press ENTER:
%systemroot%\system32\certutil -verifykeys After this command runs, you'll
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows .
The certificate thumbprints indicate all the certificates that have been issued to this CA.
Every time that a certificate is renewed, a new certificate thumbprint is added to the
CaCertHash list in the registry. The number of entries in this list must equal the number
of certificates that are issued to the CA and that are listed in the local computer Personal
certificate store.
1. Select Start, select Run, type regedit, and then select OK.
our_Certificate_Authority_Name *
4. Make a note of the number of certificate thumbprints that the Value data list
contains.
Compare the number of certificates that are listed in the local computer Personal
certificate store to the number of certificate thumbprints that are listed in the
CaCertHash registry entry. If the numbers are different, go to Step 2: Import the missing
certificates. If the numbers are the same, go to Step 3: Install the Windows Server 2003
Administration Tools Pack.
If the Certificates snap-in dialog box appears, select My user account, and then
select Finish. 5. Select Close. 6. Select OK. 7. The Certificates directory is now
added to Microsoft Management Console (MMC). 8. On the Console menu, select
Save as, type Certificates as the file name, and then select Save.
To open Certificates in the future, select Start, point to Programs, point to
Administrative Tools, and then select Certificates.
4. On the File to Import page, type the full path of the certificate file that you want to
import in the File name box, and then select Next. Instead, select Browse, search
for the file, and then select Next.
5. If the file that you want to import is a Personal Information Exchange - PKCS #12
(*.PFX), you'll be prompted for the password. Type the password, and then select
Next.
7 Note
The Windows Server 2003 versions of Certutil.exe and Certreq.exe are included in the
Windows Server 2003 Administration Tools Pack. To install the tools on a Windows 2000-
based computer, you must first install the Windows Server 2003 Administration Tools
Pack on a computer that is running Windows Server 2003 or Microsoft Windows XP with
Service Pack 1 (SP1) or with a later service pack. The Windows Server 2003
Administration Tools Pack cannot be installed directly on a Windows 2000-based
computer.
) Important
After you copy the Windows Server 2003 CA Certificate Tools to the Windows 2000-
based computer, two versions of the Certutil tool will reside on the Windows 2000-
based computer. Don't remove the Windows 2000 Certutil tool. Other programs
depend on the Windows 2000 version of this tool. For example, the Certificates
MMC snap-in requires the Windows 2000 Certutil tool. Additionally, don't register
the Windows Server 2003 Certcli.dll and Certadm.dll files on the Windows 2000-
based computer.
4. In the Windows Server 2003 Administration Tools Pack, locate the following files,
and then copy them to a removable storage medium, such as a 3.5-inch disk:
Certreq.exe
Certutil.exe
Certcli.dll
Certadm.dll
6. Insert the removable storage medium that you used in step 4 into the appropriate
drive of the Windows 2000-based computer.
8. Make a new folder, and then copy the files on the removable storage medium to
the new folder. To do it, type the following commands, and then press ENTER after
each command:
cd\
md W2k3tool
cd w2k3tool
copy Removable_Media_Drive_Letter:\cert*
7 Note
To avoid conflicts with the Windows 2000 versions of the Certutil tool that is
already on the computer, do not include the W2k3tool folder in your system
search path.
3. Make a note of the certificate in the Certenroll folder that looks similar to the
following:
Your_Server.Your_Domain.com_rootca.crt
4. Type the following commands, and then press ENTER after each command:
Root_Drive_Letter:\w2k3tool\certutil -addstore my
%systemroot%\system32\certsrv\certenroll\
Your_Server.Your_Domain.com_rootca.crt
Root_Drive_Letter:\w2k3tool\certutil -dump
%systemroot%\system32\certsrv\certenroll\
Your_Server.Your_Domain.com_rootca.crt
5. In the output from the last command, near the end, you'll see a line that is similar
to the following: Key Id Hash(sha1): ea c7 7d 7e e8 cd 84 9b e8 aa 71 6d f4 b7 e5
09 d9 b6 32 1b
The Key Id Hash data is specific to your computer. Make a note of this line.
6. Type the following command, including the quotation marks, and then press
ENTER:
Root_Drive_Letter:\w2k3tool\certutil -repairstore my "Key_Id_Hash_Data"
In this command, Key_Id_Hash_Data is the line that you noted in step 5. For
example, type the following:
c:\w2k3tool\certutil -repairstore my "ea c7 7d 7e e8 cd 84 9b e8 aa 71 6d f4 b7 e5
09 d9 b6 32 1b"
After you've completed this command, you'll receive the following output:
7. To verify the certificates, type the following command, and then press ENTER:
Root_Drive_Letter:\w2k3tool\certutil -verifykeys
More information
You must decommission and replace the CA if one of the following conditions is true:
The certutil -repairstore command can't be completed because the private keys
have been removed. To decommission and to replace the CA, follow these steps:
1. Revoke the certificates for the CA that has stopped working correctly. To do
it, follow these steps:
a. Sign in as an administrator to the computer that issued the certificates that
you want to revoke.
b. Select Start, point to Programs, point to Administrative Tools, and then
select Certification Authority.
c. Expand CA_Name, and then select Issued Certificates.
d. In the right-pane, select the certificate that you want to revoke.
e. On the Action menu, point to All Tasks, and then select Revoke
Certificate.
f. In the Reason code list, select the reason for revoking the certificate, and
then select Yes.
This will revoke all the certificates that were issued by the CA that has
stopped working correctly.
2. Publish the certificate revocation list (CRL) on the next-highest CA. To do it,
follow these steps:
a. Sign in as an administrator to the computer that is running the next
highest CA.
b. Select Start, point to Programs, point to Administrative Tools, and then
select Certification Authority.
c. Expand CA_Name, and then select Revoked Certificates.
d. On the Action menu, point to All Tasks, and then select Publish.
e. Select Yes to overwrite the previously published CRL.
3. If the CA that has stopped working correctly has been published to Active
Directory directory services, remove it. To remove the CA from Active
Directory, follow these steps:
a. Start Command Prompt.
b. Type the following, and then press ENTER:
certutil -dsdel CA_Name
4. Remove Certificate Services from the server where the CA has stopped
working correctly. To do it, follow these steps:
a. Select Start, point to Settings, and then select Control Panel.
b. Double-click Add/Remove Programs, and then select Add/Remove
Windows Components.
c. In the Components list, click to clear the Certificate Services check box,
select Next, and then select Finish.
6. All the users, the computers, or the services with certificates that were issued
by the CA that has stopped working correctly must enroll for certificates from
the new CA.
7 Note
If this issue occurs on the Root CA of the public key infrastructure (PKI) hierarchy
and if the issue cannot be repaired, you will have to replace the whole PKI
hierarchy. For more information about how to remove the PKI hierarchy, see How
to decommission a Windows enterprise certification authority and remove all
related objects.
Feedback
Was this page helpful? Yes No
This article describes how to change the validity period of a certificate that is issued by
Certificate Authority (CA).
Summary
By default, the lifetime of a certificate that is issued by a Stand-alone Certificate
Authority CA is one year. After one year, the certificate expires and is not trusted for use.
There may be situations when you have to override the default expiration date for
certificates that are issued by an intermediate or an issuing CA.
The validity period that is defined in the registry affects all certificates that are issued by
Stand-alone and Enterprise CAs. For Enterprise CAs, the default registry setting is two
years. For Stand-alone CAs, the default registry setting is one year. For certificates that
are issued by Stand-alone CAs, the validity period is determined by the registry entry
that is described later in this article. This value applies to all certificates that are issued
by the CA.
For certificates that are issued by Enterprise CAs, the validity period is defined in the
template that is used to create the certificate. Windows 2000 and Windows Server 2003
Standard Edition do not support modification of these templates. Windows Server 2003
Enterprise Edition supports Version 2 certificate templates that can be modified. The
validity period defined in the template applies to all certificates issued by any Enterprise
CA in the Active Directory forest. A certificate that is issued by a CA is valid for the
minimum of the following periods of time:
This applies to the stand-alone CA, and Subordinate CA certificates issued by the
Enterprise CA.
For an Enterprise CA, the validity period of an issued certificate is set to the minimum of
all the following:
7 Note
The ExpirationDate:Date syntax was not supported until Windows Server 2008.
For a stand-alone CA, no templates are processed. Therefore, the template
validity period does not apply.
7 Note
The Request Attribute name is made up of value string pairs that accompany the
request and that specify the validity period. By default, this is enabled by a registry
setting on a Standalone CA only.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CertSvc\Configuration\
<CAName>
5. In the Value data box, type one of the following, and then click OK:
Days
Weeks
Months
Years
7. In the Value data box, type the numeric value that you want, and then click OK. For
example, type 2.
c. At the command prompt, type the following lines. Press ENTER after each line.
Console
This article describes the steps to disable the Transport Layer Security (TLS) 1.0 and 1.1
on the Microsoft BitLocker Administration and Monitoring (MBAM) servers and force the
use of TLS 1.2.
Symptoms
Microsoft is planning to disable older TLS protocols, in preparation for disabling TLS 1.0
and TLS 1.1 by default. See Plan for change: TLS 1.0 and TLS 1.1 soon to be disabled by
default .
For enterprise customers, it may require disabling TLS 1.0 and 1.1 in their environment
for Microsoft BitLocker Administration and Monitoring (MBAM) Infrastructure.
Resolution
Follow these steps to disable TLS 1.0 and 1.1 on MBAM servers, and force the use of TLS
1.2.
1. Download and install the latest available version of Microsoft .NET Framework on
all MBAM servers that are:
Refer to: Microsoft .NET Framework 4.8 offline installer for Windows
2. Execute the PowerShell scripts below. They're used to disable TLS 1.0 and 1.1, and
force the use only TLS 1.2.
3. Reboot the servers, then test the MBAM web applications. Confirm that the MBAM
clients can communicate with the server to back up recovery information.
<Tighten_DotNet.PS1>
PowerShell
<Force_TLS1.2.PS1>
PowerShell
foreach($Protocol in $ProtocolList)
{
Write-Host " In 1st For loop"
foreach($key in $ProtocolSubKeyList)
{
$currentRegPath = $registryPath + $Protocol + "\" + $key
Write-Host " Current Registry Path $currentRegPath"
if(!(Test-Path $currentRegPath))
{
Write-Host "creating the registry"
New-Item -Path $currentRegPath -Force | out-Null
}
if($Protocol -eq "TLS 1.2")
{
Write-Host "Working for TLS 1.2"
New-ItemProperty -Path $currentRegPath -Name $DisabledByDefault -Value "0" -
PropertyType DWORD -Force | Out-Null
New-ItemProperty -Path $currentRegPath -Name $Enabled -Value "1" -
PropertyType DWORD -Force | Out-Null
}
else
{
Write-Host "Working for other protocol"
New-ItemProperty -Path $currentRegPath -Name $DisabledByDefault -Value "1" -
PropertyType DWORD -Force | Out-Null
New-ItemProperty -Path $currentRegPath -Name $Enabled -Value "0" -
PropertyType DWORD -Force | Out-Null
}
}
}
Exit 0
More information
Transport Layer Security (TLS) registry settings
Feedback
Was this page helpful? Yes No
This article provides a solution to solve DPAPI MasterKey backup failures that occur when
RWDC isn't available.
Applies to: Windows 10, version 1809, Windows Server 2012 R2, Windows Server 2016,
Windows Server 2019
Original KB number: 3205778
Symptoms
The following behavior occurs in Windows 8.1 and Windows Server 2012 R2 after you
install MS14-066, KB2992611, KB3000850, or newer updates that include these fixes.
The same behavior also occurs in all versions of Windows 10 and later versions of
Windows. Domain users who log on for the first time to a new computer in a site that's
serviced by a read-only domain controller (RODC) experience the following errors and
problems.
Generic problems
1. Opening Credential Manager fails with a 0x80090345 error, which maps to the following:
ノ Expand table
5. In Office and Office 365, adding a new account in Windows Live Mail 2012 fails with error
0x80090345.
7. Signing into Lync and Skype hangs or experiences a long delay during the "Contacting
server and signing in" stage.
8. SQL service fails to start under a domain account and triggers the following error:
Unable to initialize SSL encryption because a valid certificate could not be found, and
it is not possible to create a self-signed certificate.
Error(s): SQL server setup has encountered the following error: "generating the XML
document error code 0x8410001.
10. Domain users can't manage SQL databases from SMSS. (SQL Server Management Studio).
This issue occurs when the database is navigated from via SSMS DataBases ->
CustomerDatabase -> Tables -> Table name.
If you right-click the table and then select Design, the following error occurs:
The requested operation cannot be completed. The computer must be trusted for
delegation and the current user account must be configured to allow delegation. This
exception originated from
System_Security_ni!System.Security.Cryptography.ProtectedData.Protect(Byte[], Byte[],
System.Security.Cryptography.DataProtectionScope)."
11. ADFS WAP installation fails to create a self-signed certificate and triggers the following
error:
Exception: An error occurred when attempting to create the proxy trust certificate.
12. ADLDS installation in an RODC-only covered site fails with the following error:
ノ Expand table
c. Event ID 4625 is logged in the Security log of the ADLDS server, as follows:
ノ Expand table
In all cases, the NETLOGON.LOG shows DsGetDcName request making calls for
writable domain controllers:
Where:
ノ Expand table
0x54b 1355 ERROR_NO_SUCH_DOMAIN The specified domain either does not exist
or could not be contacted.
Cause
When a user logs on to a computer for the first time and tries to encrypt data for the first time,
the operating system must create a preferred DPAPI MasterKey, which is based on the user's
current password. During the creation of the DPAPI MasterKey, An attempt is made to back up
this master key by contacting an RWDC. If the backup fails, the MasterKey cannot be created
and a 0x80090345 error is returned.
This failure is new behavior, which was introduced by KB2992611 . In older operating systems
and on systems that don't have KB2992611 installed, if the client fails to contact an RWDC
during backup of the MasterKey, the creation of the master key is still allowed, and a local
backup is created.
That is, the legacy behavior performs a local backup of the master key if no RWDC is available.
Consistent with the design brief that RODCs don't store secrets, RODCs do not store or handle
the backup of the MasterKey. Therefore, in sites where no RWDC is available, the issues that are
described in the "Symptoms" section may occur.
7 Note
When a preferred master key exists but has expired (expired password case), an attempt
to generate a new master key is made. If it's not possible to create a domain backup of
the new master key, the client falls back to the old one, and the behavior that's described
in the "Symptoms" section does not occur.
The problem occurs only if there's no MasterKey present and when the user has not logged on
to the computer before.
Resolution
1. Verify that domain-joined workstations and servers where the issue occurs have access to
RWDCs.
Run the following command line to verify that an RWDC exists and is in a healthy state:
Console
Use NETLOGON.LOG and a network trace with the provided log examples in this article to
verify name resolution and connectivity to an RWDC.
To determine whether you're experiencing this issue, try opening CREDMAN in Control
Panel. If the attempt fails with a 0x80090345 error, you have verified this.
2. If possible, take the computer to a site where an RWDC exists and then log on there for
the first time. After this, the DPAPI MasterKey will be created, and the issue will be
resolved.
3. If you have no access to an RWDC and if the user will not be roaming between machines,
the following registry entry can be used to resolve the issue.
Setting this value to 1 causes DPAPI master keys to be backed up locally instead of using
a domain backup. Additionally, any previously created keys do not trigger calls for a
writable domain controller except in limited cases as explained below. This registry setting
applies only to domain accounts. Local accounts always use local backups.
ノ Expand table
Path HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Protect\Providers\df9d8cd0-
1501-11d1-8c7a-00c04fc297eb
Setting ProtectionPolicy
Data DWORD
Type
Value 1
OS Yes
restart
requested
Notes OS
2 Warning
Don't use this registry key if domain users log on to more than one computer! Because
the keys are backed up locally, any non-local password change may trigger a situation in
which all DPAPI master keys are wrapped using the old password, and then domain
recovery is not possible. This registry key should be set only in an environment in which
data loss is acceptable.
More information
ノ Expand table
Topic Details
Linked KB that November 2014 update rollup for Windows RT 8.1, Windows 8.1, and Windows Server
changes the 2012 R2 (KB3000850)
behavior/starts
this issue.
This article provides some guidelines for enabling smart card logon with third-party
certification authorities.
Summary
You can enable a smart card logon process with Microsoft Windows 2000 and a non-
Microsoft certification authority (CA) by following the guidelines in this article. Limited
support for this configuration is described later in this article.
More information
Requirements
Smart Card Authentication to Active Directory requires that Smartcard workstations,
Active Directory, and Active Directory domain controllers be configured properly. Active
Directory must trust a certification authority to authenticate users based on certificates
from that CA. Both Smartcard workstations and domain controllers must be configured
with correctly configured certificates.
As with any PKI implementation, all parties must trust the Root CA to which the issuing
CA chains. Both the domain controllers and the smartcard workstations trust this root.
Required: Active Directory must have the third-party issuing CA in the NTAuth
store to authenticate users to active directory.
Required: Domain controllers must be configured with a domain controller
certificate to authenticate smartcard users.
Optional: Active Directory can be configured to distribute the third-party root CA
to the trusted root CA store of all domain members using the Group Policy.
Smartcard certificate and workstation requirements
Required: All of the smartcard requirements outlined in the "Configuration
Instructions" section must be met, including the text formatting of the fields.
Smartcard authentication fails if they are not met.
Required: The smartcard and private key must be installed on the smartcard.
Configuration instructions
1. Export or download the third-party root certificate. How to obtaining the party
root certificate varies by vendor. The certificate must be in Base64 Encoded X.509
format.
2. Add the third-party root CA to the trusted roots in an Active Directory Group
Policy object. To configure Group Policy in the Windows 2000 domain to distribute
the third-party CA to the trusted root store of all domain computers:
a. Click Start, point to Programs, point to Administrative Tools, and then click
Active Directory Users and Computers.
b. In the left pane, locate the domain in which the policy you want to edit is
applied.
c. Right-click the domain, and then click Properties.
d. Click the Group Policy tab.
e. Click the Default Domain Policy Group Policy object, and then click Edit. A new
window opens.
f. In the left pane, expand the following items:
Computer Configuration
Windows Settings
Security Settings
Public Key Policy
3. Add the third party issuing the CA to the NTAuth store in Active Directory.
The smart card logon certificate must be issued from a CA that is in the NTAuth
store. By default, Microsoft Enterprise CAs are added to the NTAuth store.
If the CA that issued the smart card logon certificate or the domain controller
certificates is not properly posted in the NTAuth store, the smart card logon
process does not work. The corresponding answer is "Unable to verify the
credentials".
The NTAuth store is located in the Configuration container for the forest. For
example, a sample location is as follows:
LDAP://server1.name.com/CN=NTAuthCertificates,CN=Public Key
Services,CN=Services,CN=Configuration,DC=name,DC=com
By default, this store is created when you install a Microsoft Enterprise CA.
The object can also be created manually by using ADSIedit.msc in the
Windows 2000 Support tools or by using LDIFDE. For more information, click
the following article number to view the article in the Microsoft Knowledge
Base:
After you put the third-party CA in the NTAuth store, Domain-based Group
Policy places a registry key (a thumbprint of the certificate) in the following
location on all computers in the domain:
HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates\NTAuth\Ce
rtificates
The domain controller certificate is used for Secure Sockets Layer (SSL)
authentication, Simple Mail Transfer Protocol (SMTP) encryption, Remote
Procedure Call (RPC) signing, and the smart card logon process. Using a non-
Microsoft CA to issue a certificate to a domain controller may cause
unexpected behavior or unsupported results. An improperly formatted
certificate or a certificate with the subject name absent may cause these or
other capabilities to stop responding.
Enroll for a certificate from the third-party CA that meets the stated requirements.
The method for enrollment varies by the CA vendor.
The CRL Distribution Point (CDP) location (where CRL is the Certification
Revocation List) must be populated, online, and available. For example:
Output
6. There are two predefined types of private keys. These keys are Signature
Only(AT_SIGNATURE) and Key Exchange(AT_KEYEXCHANGE). Smartcard logon
certificates must have a Key Exchange(AT_KEYEXCHANGE) private key type in
order for smartcard logon to function correctly.
Make sure that the appropriate smartcard reader device and driver software are
installed on the smartcard workstation. It varies by smartcard reader vendor.
If the smartcard was not already put into the smartcard user's personal store in the
enrollment process in step 4, then you must import the certificate into the user's
personal store. To do so:
a. Open the Microsoft Management Console (MMC) that contains the Certificates
snap-in.
c. On the All Tasks menu, click Import to start the Certificate Import Wizard.
d. Click the file that contains the certificates that you are importing.
7 Note
7 Note
To turn on strong private key protection, you must use the Logical
Certificate Stores view mode.
e. Select the option to automatically put the certificate in a certificate store based
on the type of certificate.
9. Install the third-party smartcard certificate onto the smartcard. This installation
varies according to Cryptographic Service Provider (CSP) and by smartcard vendor.
See the vendor's documentations for instructions.
Possible issues
During smartcard logon, the most common error message seen is:
The system could not log you on. Your credentials could not be verified.
This message is a generic error and can be the result of one or more of below issues.
For each of the following conditions, you must request a new valid domain
controller certificate. If your valid domain controller certificate has expired, you
may renew the domain controller certificate, but this process is more complex and
typically more difficult than if you request a new domain controller certificate.
The domain controller certificate has expired.
The domain controller has an untrusted certificate. If the NTAuth store does not
contain the certification authority (CA) certificate of the domain controller
certificate's issuing CA, you must add it to the NTAuth store or obtain a DC
certificate from an issuing CA whose certificate resides in the NTAuth store.
The smartcard has an untrusted certificate. If the NTAuth store does not contain
the CA certificate of the smartcard certificate's issuing CA, you must add it to the
NTAuth store or obtain a smartcard certificate from an issuing CA whose certificate
resides in the NTAuth store.
If the domain controllers or smartcard workstations do not trust the Root CA to
which the user's smartcard certificate chains, then you must configure those
computers to trust that Root CA.
The certificate of the smart card is not installed in the user's store on the
workstation. The certificate that is stored on the smartcard must reside on the
smartcard workstation in the profile of the user who is logging on with the smart
card.
7 Note
You do not have to store the private key in the user's profile on the
workstation. It is only required to be stored on the smartcard.
The correct smartcard certificate or private key is not installed on the smartcard.
The valid smartcard certificate must be installed on the smartcard with the private
key and the certificate must match a certificate stored in the smartcard user's
profile on the smartcard workstation.
The certificate of the smart card cannot be retrieved from the smartcard reader. It
can be a problem with the smartcard reader hardware or the smartcard reader's
driver software. Verify that you can use the smartcard reader vendor's software to
view the certificate and the private key on the smartcard.
The UPN in SubjAltName field of the smartcard certificate is badly formatted. If the
information in the SubjAltName appears as Hexadecimal / ASCII raw data, the text
formatting is not ASN1 / UTF-8.
If your valid smartcard certificate has expired, you may also renew the smartcard
certificate, which is more complex and difficult than requesting a new smartcard
certificate.
The user does not have a UPN defined in their Active Directory user account. The
user's account in the Active Directory must have a valid UPN in the
userPrincipalName property of the smartcard user's Active Directory user account.
The UPN in the certificate does not match the UPN defined in the user's Active
Directory user account. Correct the UPN in the smartcard user's Active Directory
user account or reissue the smartcard certificate so that the UPN value in the
SubjAltName field the matches the UPN in smartcard users' Active Directory user
account. We recommend that the smart card UPN matches the userPrincipalName
user account attribute for third-party CAs. However, if the UPN in the certificate is
the "implicit UPN" of the account (format samAccountName@domain_FQDN), the
UPN does not have to match the userPrincipalName property explicitly.
The system could not log you on. The smartcard certificate used for authentication
was not trusted.
7 Note
Failing to find and download the Certificate Revocation List (CRL), an invalid CRL, a
revoked certificate, and a revocation status of "unknown" are all considered
revocation failures.
The revocation check must succeed from both the client and the domain controller.
Make sure the following are true:
Revocation check for the built-in revocation providers cannot be turned off. If a
custom installable revocation provider is installed, it must be turned on.
Every CA Certificate except the root CA in the certificate chain contains a valid CDP
extension in the certificate.
The CRL has a Next Update field and the CRL is up to date. You can check that the
CRL is online at the CDP and valid by downloading it from Internet Explorer. You
should be able to download and view the CRL from any of the HyperText Transport
Protocol (HTTP) or File Transfer Protocol (FTP) CDPs in Internet Explorer from both
the smartcard workstation(s) and the domain controller(s).
Verify that each unique HTTP and FTP CDP that is used by a certificate in your enterprise
is online and available.
To verify that a CRL is online and available from an FTP or HTTP CDP:
1. To open the Certificate in question, double-click on the .cer file or double-click the
certificate in the store.
2. Click the Details tab, and select the CRL Distribution Point field.
3. In the bottom pane, highlight the full FTP or HTTP Uniform Resource Locator (URL)
and copy it.
4. Open Internet Explorer and paste the URL into the Address bar.
5. When you receive the prompt, select the option to Open the CRL.
6. Make sure that there is a Next Update field in the CRL and the time in the Next
Update field has not passed.
To download or verify that a Lightweight Directory Access Protocol (LDAP) CDP is valid,
you must write a script or an application to download the CRL. After you download and
open the CRL, make sure that there is a Next Update field in the CRL and the time in the
Next Update field has not passed.
Support
Microsoft Product Support Services does not support the third-party CA smart card
logon process if it is determined that one or more of the following items contributes to
the problem:
Additional information
The client computer checks the domain controller's certificate. The local computer
therefore downloads a CRL for the domain controller certificate into the CRL cache.
The offline logon process does not involve certificates, only cached credentials.
To force the NTAuth store to be immediately populated on a local computer instead of
waiting for the next Group Policy propagation, run the following command to initiate a
Group Policy update:
Console
dsstore.exe -pulse
You can also dump out the smart card information in Windows Server 2003 and in
Windows XP by using the Certutil.exe -scinfo command.
Feedback
Was this page helpful? Yes No
This article helps fix an issue that occurs when an application tries to open a connection
to a SQL Server.
Symptoms
When an application tries to open a connection to a SQL Server, one of the following
error messages is displayed:
A connection was successfully established with the server, but then an error
occurred during the login process. (provider: SSL Provider, error: 0 - An existing
connection was forcibly closed by the remote host.)
A connection was successfully established with the server, but then an error
occurred during the pre-login handshake. (provider: TCP Provider, error: 0 - An
existing connection was forcibly closed by the remote host.)
If you enabled SChannel logging on the Server, you'll receive Event ID 36888 (A Fatal
Alert was generated) when the issue occurs.
7 Note
Depending on the provider or driver that you're using, the error message may
slightly vary.
This issue also occurs when an application running on Windows Server 2012
R2 tries to connect to SQL Server running on Windows Server 2019.
Other client-server applications may encounter a similar issue.
Cause
Windows 10, version 1511 and later versions of Windows, including Window Server 2016
or Windows 10, version 1607 that has updates released on Feb 25thor later updates
installed, contains a leading zero update. Meanwhile, all Windows versions that released
before that don't contain the leading zero updates.
The TLS client and server need to calculate keys exactly the same way otherwise they get
different results. TLS connections randomly fail if leading zeros are computed differently
by the TLS client and TLS Servers.
When a Diffie-Hellman key exchange group has leading zeros, unpatched computers
may incorrectly compute the mac by not accounting for the padded zeros. This issue is
typically seen when interacting with non-Windows-based crypto implementations and
can cause intermittent negotiation failures.
The error messages are returned when the secure TLS handshake is negotiated between
the client and the server by using TLS_DHE cipher suite. The use of one of the affected
cipher suites can be identified in the "Server Hello" packet. For more information, see
the network snippet in the "More information" section.
Resolution
To fix this issue, make sure that both the client and server involved in a connection are
running Windows that have the leading zero fixes for TLS_DHE installed. It's
recommended to install the updates since they enhance the conformance to TLS_DHE
specifications.
The following list the operating system version according to the updates that are
installed.
Workaround
If you can't update Windows, as a workaround, you can disable the TLS_DHE ciphers by
using one of the two methods.
Policy URL: Computer Configuration -> Administrative Templates -> Network -> SSL
Configuration Settings
Policy Setting: SSL Cipher Suite Order setting.
More information
You can confirm that you're encountering this issue during the connection
establishment. When the issue occurs, you can see the following sequence in the
network trace on the server.
Output
Examining the Server Hello packet to see the cipher suite being used:
Output
Reference
For more information, see the following articles:
Manage Transport Layer Security (TLS)
TLS
Feedback
Was this page helpful? Yes No
When you try to enroll a certificate on a Windows Server, it fails with the error
0x800706ba, "The RPC Server is unavailable." This article introduces steps to resolve this
issue.
7 Note
When the issue occurs, if we add the user account that's used to request the
certificate to the local administrators group on the certificate authority (CA), the
enrollment succeeds for a user-based template. However, enrollment against a
machine-based template still returns the same error.
Error messages
You receive error messages that resemble the following during certificate enrollment.
Error 1
An error occurred whilst enrolling for a certificate. The certificate request could not
be submitted to the certification authority.
Url: <certificate server FQDN>\MyPKI
Error: The RPC server is unavailable. 0x800706ba (WIN32: 1322
RPC_S_SERVER_UNAVAILABLE)
Error 2
Error 3
Network capture
The network trace shows the successful Lightweight Directory Access Protocol (LDAP)
queries to the configuration partition in Active Directory; the templates available are
revealed in the trace.
Then, the requesting server tries to do a remote procedure call (RPC) to the CA and gets
the response "ACCESS DENIED."
For example:
Output
Output
For example:
Output
Event log
If auditing is enabled, a Distributed Component Object Model (DCOM) error can be
observed on the CA server detailing an ANONYMOUS LOGON attempt:
Output
Description:
The machine wide limit settings do not grant Remote Activation permission
for COM Server applications to the user NT AUTHORITY\ANONYMOUS LOGON SID (S-
1-5-7) from address <IP address> running in the application container
Unavailable SID (Unavailable). This security permission can be modified
using the Component Services administrative tool.
7 Note
1. The group policy Access this computer from the network is set, and the user
account used to enroll the certificate isn't added. By default, the policy is
populated by the groups: Administrators, Backup Operators, Everyone, and Users.
2. The group policy Deny access to this computer from the network is set, and
Everyone, Users or a security group the user belongs to is added.
7 Note
You can run whoami /groups to identify the groups of the user account or use
Active Directory Users and computers to identify the groups belonging to the user
or the computer account.
Because the user account used for certificate enrollment fails authentication by using
Kerberos, the authentication mechanism is downgraded to "anonymous logon." The
logon fails on the DCOM level.
How to identify
1. Open an elevated command prompt on the certificate server.
3. Open the .html file that's generated, and review the section:
Settings \ Policies \ Windows Settings \ Local Policies \ User Rights Assignment
7 Note
The settings configured on the Group Policy Objects (GPOs) are for a reason, so
you should talk to your security team before making any changes.
Add the appropriate user groups to the Access this computer from the network group
policy. For example:
Then, remove the group that the user account or the computer account belongs to from
the Deny access to this computer from the network group policy.
For more information, see Access this computer from the network - security policy
setting.
Contoso\Domain Users
NT AUTHORITY\Authenticated Users
NT AUTHORITY\INTERACTIVE
To resolve this issue, open Local Users and Groups on the certificate server, locate the
Users group, and add the missing groups.
Cause 3: Missing "NT
AUTHORITY\Authenticated Users" from the
"Certificate Service DCOM Access" local group
of the certificate server
To resolve this issue, follow these steps:
3. Open the .html file, and identify the winning GPO where the Restrictions for
Unauthenticated RPC Client group policy is configured to Not Configured.
Reference
For more information, see Restrictions for Unauthenticated RPC Clients: The group
policy that punches your domain in the face .
Feedback
Was this page helpful? Yes No
Tips
1. Requesting the Root Certification Authority Certificate by using command line:
a. Log into the Root Certification Authority server with Administrator Account.
b. Go to Start > Run. Enter the text Cmd and then select Enter.
Console
2. Requesting the Root Certification Authority Certificate from the Web Enrollment
Site:
http://<ip_address>/certsrv
or
http://<fqdn>/certsrv
fqdn = Fully qualified domain name of the Root Certification Authority Server.
Microsoft corporation and/or its respective suppliers make no representations about the
suitability, reliability, or accuracy of the information and related graphics contained
herein. All such information and related graphics are provided "as is" without warranty
of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and
conditions with regard to this information and related graphics, including all implied
warranties and conditions of merchantability, fitness for a particular purpose,
workmanlike effort, title and non-infringement. You specifically agree that in no event
shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental,
special, consequential damages or any damages whatsoever including, without
limitation, damages for loss of use, data or profits, arising out of or in any way
connected with the use of or inability to use the information and related graphics
contained herein, whether based on contract, tort, negligence, strict liability or
otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of
damages.
Feedback
Was this page helpful? Yes No
This article helps you to find name of the Enterprise Root Certificate Authority (CA)
server.
Summary
The following content describes two options to find the name of the Enterprise Root
Certificate Authority server.
Option 1
1. Sign in by using domain administrator to computer that connects to the domain.
2. Go to Start -> Run -> Write cmd and press on Enter button.
Option 2
1. Sign in by using domain administrator to computer that connects to the domain.
3. Go to Start -> Run -> Write adsiedit.msc and press on Enter button.
4. Navigate to:
Services,CN=Services,CN=Configuration,DC=ntdomain,DC=com
Feedback
Was this page helpful? Yes No
This article describes how to uninstall and then reinstall the Certificate Authority (CA)
role in Windows Server 2012 Essentials.
3. On the Select destination server page, select the server in the server pool, and
then click Next.
4. On the Remove server roles page, expand Active Directory Certificate Services,
clear the Certification Authority Web Enrollment check box, and then click Next.
6. On the Confirm removal selections page, verify the information, and then click
Remove.
9. On the Remove server roles page, click to clear the Active Directory Certificate
Services check box.
7 Note
12. After the removal is complete, click Close, and then restart the server.
4. On the Select destination server page, select the server in the server pool, and
then click Next.
5. On the Select server roles page, click the Active Directory Certificate Services
role.
6. When you are prompted to install Remote Server Administration Tools, click Add
Features, and then click Next.
9. On the Select role services page, select Certification Authority and Certification
Authority Web Enrollment, and then click Next.
10. On the Confirm installation selections page, verify the information, and then click
Install.
11. Wait for the installation to finish. After the installation is complete, click the
Configure Active Directory Certificate Services on the destination server link.
7 Note
13. On the Role Services page, select Certification Authority and Certification
Authority Web Enrollment, and then click Next.
14. On the Setup Type page, click Enterprise CA, and then click Next.
15. On the CA Type page, click Root CA, and then click Next.
16. On the Private Key page, click Use existing private key, click Select a certificate
and use its associated private key, and then click Next.
17. On the Existing Certificate page, select the <Server_Name>-CA certificate, and
then click Next.
7 Note
18. On the CA Database page, accept the default locations, and then click Next.
19. On the Confirmation page, confirm your selections, and then click Configure.
Feedback
Was this page helpful? Yes No
Symptoms
In some organizations, there are regular backup procedures for Enterprise Windows
Certificate Authority. If there's a server problem (software/hardware), you may need to
reinstall the Enterprise Windows Certificate Authority. Before you can reinstall the
Enterprise Windows Certificate Authority, you may need to manually delete objects and
data that belong to the original Enterprise Windows and reside in the Windows Active
Directory.
Cause
Enterprise Windows Certificate Authority saves the configurations settings and data in
the Windows Active Directory.
Resolution
A. Backup:
You're recommended to back up all the nodes that contain Active Directory-related data
before and after you follow this procedure, including:
7 Note
Log on into the system with an account that has the permissions bellow:
1. Enterprise Administrator
2. Domain Administrator
3. Certificate Authority Administrator
4. Schema Administrator (The server that function as Schema Master FSMO
should be online during the process).
2. Select the "View" menu option, and select "Show Services" Node.
7. In the right-hand pane, locate the Container object for the server where
Certification Services is installed. Delete the container and the objects it contains.
11. In the right-hand pane, verify that the "pKIEnrollmentService" object for your
Certification Authority, delete it.
7 Note
Delete all the Certificate Templates only if no other Enterprise CAs are
installed in the forest. If the templates are inadvertently deleted, restore the
templates from backup.
14. Select the "Public key Services" node and locate the "NTAuthCertificates" object.
15. If there are no other Enterprise or Stand-alone CAs installed in the forest, delete
the object, otherwise leave it alone.
16. Use "Active Directory Sites and Services" or " Repadmin " command from the
Windows resource kit to force replication to the other domain controllers in the
domain/forest.
You can also remove old domain controller certificates by using certutil command:
2. Certutil.exe will attempt to validate all the DC certificates issued to the domain
controllers. Certificates that fail to validate will be removed. At this point, you can
reinstall Certificate Services. After the installation is finished, the new root
certificate will be published to Active Directory. When the domain
clients refresh their security policy, they'll automatically download the new root
certificate into their trusted root stores. o force application of the security policy.
7 Note
More information
Community Solutions Content Disclaimer
Microsoft corporation and/or its respective suppliers make no representations about the
suitability, reliability, or accuracy of the information and related graphics contained
herein. All such information and related graphics are provided "as is" without warranty
of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and
conditions with regard to this information and related graphics, including all implied
warranties and conditions of merchantability, fitness for a particular purpose,
workmanlike effort, title and non-infringement. You specifically agree that in no event
shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental,
special, consequential damages or any damages whatsoever including, without
limitation, damages for loss of use, data or profits, arising out of or in any way
connected with the use of or inability to use the information and related graphics
contained herein, whether based on contract, tort, negligence, strict liability or
otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of
damages.
Feedback
Was this page helpful? Yes No
This article describes how to move a certification authority (CA) to a different server.
Applies to: Windows Server 2000, Windows Server 2003, Windows Server 2008,
Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows
Server 2016, Windows Server 2019, Windows Server 2022
Original KB number: 298138
7 Note
This article applies to Windows 2000, Windows Server 2003, Windows Server 2008,
Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2,
Windows Server 2016, Windows Server 2019, Windows Server 2022. Support for
Windows 2000 ended on July 13, 2010. The Windows 2000 End-of-Support
Solution Center is a starting point for planning your migration strategy from
Windows 2000. Support for Windows 2008 and 2008 R2 ended on January 14,
2020. For more information, see the Microsoft Support Lifecycle Policy.
Summary
Certification authorities (CAs) are the central component of the public key infrastructure
(PKI) of an organization. The CAs are configured to exist for many years or decades,
during which time the hardware that hosts the CA is probably upgraded.
7 Note
To move a CA from a server that is running Windows 2000 Server to a server that is
running Windows Server 2003, you must first upgrade the CA server that is running
Windows 2000 Server to Windows Server 2003. Then you can follow the steps that
are outlined in this article.
Make sure that the %Systemroot% of the target server matches the %Systemroot% of the
server from which the system state backup is taken.
You must change the path of the CA files when you install the CA server components so
that they match the location of the backup. For example, if you back up from the
D:\Winnt\System32\Certlog folder, you must restore the backup to the
D:\Winnt\System32\Certlog folder. You cannot restore the backup to the
C:\Winnt\System32\Certlog folder. After you restore the backup, you can move the CA
database files to the default location.
If you try to restore the backup, and the %Systemroot% of the backup and the target
server do not match, you may receive the following error message:
Moving Certificate Services from a 32-bit operating system to a 64-bit operating system
or vice-versa may fail with one of the following error messages:
Database format changes from the 32-bit version to the 64-bit version cause
incompatibilities, and the restore is blocked. This resembles the move from Windows
2000 to Windows Server 2003 CA. However, there is no upgrade path from a 32-bit
version of Windows Server 2003 to a 64-bit version. Therefore, you cannot move an
existing 32-bit database to a 64-bit database on a Windows Server 2003-based
computer. However, you can upgrade from Windows Server 2003 CA (running on
Windows Server 2003 x86) to Windows Server 2008 R2 CA (running on Windows Server
2008 R2 x64). This upgrade is supported.
An x64-based version of Windows Server 2003 R2 CD2 only updates 64-bit versions of
Windows Server 2003 that are based on the EM64T architecture or on the AMD64
architecture.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
1. Note the certificate templates that are configured in the Certificate Templates
folder in the Certification Authority snap-in. The Certificate Templates settings are
stored in Active Directory. They are not automatically backed up. You must
manually configure the Certificate Templates settings on the new CA to maintain
the same set of templates.
7 Note
2. Use the Certification Authority snap-in to back up the CA database and private key.
To do this, follow these steps:
a. In the Certification Authority snap-in, right-click the CA name, click All Tasks,
and then click Back up CA to start the Certification Authority Backup Wizard.
b. Click Next, and then click Private key and CA certificate.
c. Click Certificate database and certificate database log.
d. Use an empty folder as the backup location. Make sure that the backup folder
can be accessed by the new server.
e. Click Next. If the specified backup folder does not exist, the Certification
Authority Backup Wizard creates it.
f. Type and then confirm a password for the CA private key backup file.
g. Click Next, and then verify the backup settings. The following settings should be
displayed:
h. Click Finish.
3. Save the registry settings for this CA. To do this, follow these steps:
a. Click Start, click Run, type regedit in the Open box, and then click OK.
b. Locate and then right-click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration
c. Click Export.
d. Save the registry file in the CA backup folder that you defined in step 2d.
7 Note
4. Check the CRL Distribution Point on the old CA. These settings have to be
configured in the new CA.
a. Open cmd.exe in the old CA.
b. Enter pkiview .
c. Export the configuration.
7 Note
This step removes objects from Active Directory. Do not perform this step out
of order. If removal of the source CA is performed after installation of the
target CA (step 7 in this section), the target CA will become unusable.
7. Install Certificate Services on the new server. To do this, follow these steps.
7 Note
The new server must have the same computer name as the old server.
a. In Control Panel, double-click Add or Remove Programs.
b. Click Add/Remove Windows Components, click Certificate Services in the
Windows Components Wizard, and then click Next.
c. In the CA Type dialog box, click the appropriate CA type.
d. Click Use custom settings to generate the key pair and CA certificate, and then
click Next.
e. Click Import, type the path of the .P12 file in the backup folder, type the
password that you chose in step 2f, and then click OK.
f. In the Public and Private Key Pair dialog box, verify that Use existing keys is
checked.
g. Click Next two times.
h. Accept the Certificate Database Settings default settings, click Next, and then
click Finish to complete the Certificate Services installation.
) Important
If the new server has a different computer name, then follow these steps:
9. Locate the registry file that you saved in step 3, and then double-click it to import
the registry settings. If the path that is shown in the registry export from the old
CA differs from the new path, you must adjust your registry export accordingly. By
default, the new path is C:\Windows in Windows Server 2003.
10. Use the Certification Authority snap-in to restore the CA database. To do this,
follow these steps:
a. In the Certification Authority snap-in, right-click the CA name, click All Tasks,
and then click Restore CA.
e. Verify the backup settings. The Issued Log and Pending Requests settings
should be displayed.
f. Click Finish, and then click Yes to restart Certificate Services when the CA
database is restored.
You may receive the following error during the restore CA process if the CA backup
folder is not in the correct folder structure format:
---------------------------
Microsoft Certificate Services
---------------------------
C:\Ca_Backup\CA_NAME.p12
C:\Ca_Backup\Database\certbkxp.dat
C:\Ca_Backup\Database\edb#####.log
C:\Ca_Backup\Database\CA_NAME.edb
Where C:\Ca_Backup is the folder you chose during the Backup CA phase in step 2.
11. In the Certification Authority snap-in, manually add or remove certificate templates
to duplicate the Certificate Templates settings that you noted in step 1.
7 Note
If you encounter problems publishing new Templates or your Custom ones, follow
the steps below.
1. From a Domain Controller within the forest where you migrated the CA role start
ADSI Edit.
2. Right click on ADSI Edit -> Connect to -> In Select a well known Naming Context
choose Configuration -> Ok.
3. Navigate to CN=Configuration | CN=Services | CN=Public Key Services |
CN=Enrollment Services.
4. Right click the CA in the right pane that you want to enroll from and click
Properties. Find the flags attribute; and verify that it is set to 10.
5. If it is not, then set it to 10 and wait or manually force Active Directory replication.
6. Close ADSI Edit and from your CA Server make sure you can now publish your new
Templates.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
1. Note the certificate templates that are configured in the Certificate Templates
folder in the Certification Authority snap-in. The Certificate Templates settings are
stored in Active Directory. They are not automatically backed up. You must
manually configure the Certificate Templates settings on the new CA to maintain
the same set of templates.
7 Note
2. Use the Certification Authority snap-in to back up the CA database and private key.
To do this, follow these steps:
a. In the Certification Authority snap-in, right-click the CA name, click All Tasks,
and then click Back up CA to start the Certification Authority Backup Wizard.
b. Click Next, and then click Private key and CA certificate.
c. Click Issued certificate log and pending certificate request queue.
d. Use an empty folder as the backup location. Make sure that the backup folder
can be accessed by the new server.
e. Click Next. If the specified backup folder does not exist, the Certification
Authority Backup Wizard creates it.
f. Type and then confirm a password for the CA private key backup file.
g. Click Next two times, and then verify the backup settings. The following settings
should be displayed:
h. Click Finish.
3. Save the registry settings for this CA. To do this, follow these steps:
a. Click Start, click Run, type regedit in the Open box, and then click OK.
b. Locate and then right-click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration
c. Click Configuration, and then click Export Registry File on the Registry menu.
d. Save the registry file in the CA backup folder that you defined in step 2d.
4. Check the CRL Distribution Point on the old CA. These settings have to be
configured in the new CA.
a. Open cmd.exe in the old CA.
b. Enter pkiview .
c. Export the configuration.
7 Note
This step removes objects from Active Directory. Do not perform this step out
of order. If removal of the source CA is performed after installation of the
target CA (step 7 in this section), the target CA will become unusable.
6. Rename the old server, or permanently disconnect it from the network.
7. Install Certificate Services on the new server. To do this, follow these steps.
7 Note
The new server must have the same computer name as the old server.
9. Locate the registry file that you saved in step 3, and then double-click it to import
the registry settings.
10. Use the Certification Authority snap-in to restore the CA database. To do this,
follow these steps:
a. In the Certification Authority snap-in, right-click the CA name, click All Tasks,
and then click Restore CA.
b. Click Next, and then click Issued certificate log and pending certificate request
queue.
Issued Log
Pending Requests
e. Click Finish, and then click Yes to restart Certificate Services when the CA
database is restored.
11. In the Certification Authority snap-in, manually add or remove certificate templates
to duplicate the Certificate Templates settings that you noted in step 1.
More information
For more information about upgrade and migration scenarios for Windows Server 2003
and Windows Server 2008, see the "Active Directory Certificate Services Upgrade and
Migration Guide" white paper. To see the white paper, see Active Directory Certificate
Services Upgrade and Migration Guide.
Feedback
Was this page helpful? Yes No
This article describes how to move a certificate server's database and log files.
) Important
This article contains information about modifying the registry. Before you modify
the registry, make sure to back it up and make sure that you understand how to
restore the registry if a problem occurs. For information about how to back up,
restore, and edit the registry, click the following article number to view the article in
the Microsoft Knowledge Base:
256986 Description of the Microsoft Windows Registry
2 Warning
If you use Registry Editor incorrectly, you may cause serious problems that may
require you to reinstall your operating system. Microsoft cannot guarantee that you
can solve problems that result from using Registry Editor incorrectly. Use Registry
Editor at your own risk.
Use these steps to change the location of the certificate server database and log files:
2. Copy the database files and log files to new location. The default database path is:
%SystemRoot%\System32\CertLog
3. Modify the database paths in the following registry entries to reflect the new path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\DBD
irectory
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\DBL
ogDirectory
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\DBS
ystemDirectory
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\DBT
empDirectory
5. Check the Application event log for CertSvc event 26 to verify that the Certificate
Services service started successfully. A warning message is displayed if the service
does not start successfully. If this occurs, check the syntax of the paths in the
registry.
You may need to edit the NTFS permissions to grant Full Control permissions to the
System account. By default, the System account and the Administrators and Enterprise
Administrators groups have Full Control access for the CertLog folder.
Feedback
Was this page helpful? Yes No
This article lists the trusted root certificates that are required by Windows operating systems. These trusted root
certificates are required for the operating system to run correctly.
Summary
As part of a public key infrastructure (PKI) trust management procedure, some administrators may decide to
remove trusted root certificates from a Windows-based domain, server, or client. However, the root certificates
that are listed in the Necessary and trusted root certificates section in this article are required for the operating
system to operate correctly. Removal of the following certificates may limit functionality of the operating system,
or may cause the computer to fail. Don't remove them.
Windows 7
Windows Vista
Windows Server 2008 R2
Windows Server 2008
ノ Expand table
The follow certificates are necessary and trusted in Windows XP and in Windows Server 2003:
ノ Expand table
The follow certificates are necessary and trusted in Microsoft Windows 2000:
ノ Expand table
Some certificates that are listed in the previous tables have expired. However, these certificates are necessary for
backward compatibility. Even if there's an expired trusted root certificate, anything that was signed by using that
certificate before the expiration date requires that the trusted root certificate is validated. As long as expired
certificates aren't revoked, they can be used to validate anything that was signed before their expiration.
Feedback
Was this page helpful? Yes No
This article describes how to set an enterprise subordinate certification authority (CA) to
have a different certificate validity period than that of the parent CA.
Summary
You can use the following steps to give a subordinate CA a different certificate validation
period than that of the parent CA. This process is divided into the following three steps:
Step 1: Set the validation period on the parent CA. Step 2: Install the subordinate CA.
Step 3: Set the validation time back on the parent CA.
1. Set the validation period on the parent CA. To do this, use the following
commands to set the desired validation period on the parent CA that will issue the
certificate of the subordinate CA:
Console
2. Install the subordinate CA. Make sure that you use the parent CA that you used in
step 1.
3. Reset the validation period on the parent CA that issued the certificate of the
subordinate CA (for example, "2 years", which is the default value). To do this, use
the following commands:
Console
If you run certutil -getreg ca\val* on the subordinate CA, both the
ValidityPeriod property and the ValidityPeriodUnits property are still
synchronized with the parent CA, even though the subordinate CA certificate
is only valid for three weeks.
Feedback
Was this page helpful? Yes No
This article describes how to set up a web server to use smart cards for cross-forest
certificate-based authentication when the user forests and the resource forest do not
trust one another.
Environment configuration
Consider an environment that uses the following configuration:
Configure Active Directory and the web server as described in the following procedures.
1. Make sure that a Kerberos Authentication Certificate that has a KDC Authentication
extended key usage (EKU) has been issued to the domain controllers.
2. Make sure that the Issuing CA certificate of the user's certificate is installed in the
Enterprise NTAUTH store.
To publish the Issuing CA certificate in the domain, run the following command at
a command prompt:
Console
In this command, <filename> represents the name of the CA certificate file, which
has a .cer extension.
3. Users must have accounts that use the alternate UPN of the resource forest.
1. Make sure that you have Smart Card Logon and Client Authentication EKU defined
in the certificate.
2. Make sure that the SAN of the certificate uses the UPN of the user.
3. Make sure that you install the Issuing CA Certificate of the user certificate in the
Enterprise NTAUTH store.
7 Note
If you want to set up delegation on the front end server or want to skip using
the UPN in the SAN attribute of the certificate (AltSecID route), see the More
information section.
Configure the web server
To configure the IIS Web server in the resource forest, follow these steps:
1. Install the IIS Web server role, and select the Client Certificate Mapping
Authentication Security feature.
2. On the IIS Web server, enable Active Directory Client Certificate Authentication.
3. On your website, configure SSL Settings to Require SSL and then under Client
certificates, select Require.
Make sure that no other authentication type is enabled on the website. We don't
recommend enabling Certificate Based Authentication with any other
authentication type because the DS Mapper service, which is responsible for
mapping the user's presented certificate to the user account in Active Directory, is
designed to only work with the Active Directory Client Certificate Authentication
type. If you enable Anonymous Authentication, you may experience unexpected
outcomes.
More information
If you want to set up delegation on this resource web server to query a backend server,
such as a database server or a CA, you may also configure constrained delegation by
using a custom service account. Additionally, you must set up the web server for
constrained delegation (S4U2Self) or protocol transition. For more information, see How
to configure Kerberos Constrained Delegation for Web Enrollment proxy pages.
If you want to skip the UPN in the SAN attribute of the user smart card certificate, you
have to either explicitly map by using AltSecID attributes, or use name hints.
7 Note
We do not recommend this approach to configuring smart card certificates.
If you publish the SAN attribute as the intended UPN in the user's certificate, you should
not enable AltSecID.
To check the NTAuth store on the web server, open a Command Prompt window and
run the following command:
Console
References
Prepare a non-routable domain for directory synchronization
HowTo: Map a user to a certificate via all the methods available in the
altSecurityIdentities attribute
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix common Active
This article is designed to help get you started troubleshooting Active Directory
replication issues.
Troubleshooting checklist
Use the following checklist to troubleshoot these replication issues:
The error and warning events in the Directory Service event log indicate the
specific constraint that's causing replication failure on the source or destination
domain controller. If the event message suggests steps for a solution, try the steps
that are described in the event.
Diagnostic tools such as Repadmin also provide information that can help you
resolve replication failures. To help monitor replication and diagnose errors,
download and run the Microsoft Support and Recovery Assistant tool .
When another domain controller is trying to replica with the domain controller, it
reports replication errors. You can account for such replication errors.
Active Directory replication remote procedure calls (RPCs) occur dynamically over
an available port through the RPC Endpoint Mapper (RPCSS) on port 135. Make
sure that Windows Defender Firewall with Advanced Security and other firewalls
are configured correctly to enable replication.
After you rule out intentional disconnections and hardware failures, the replication
issues might have one of the following causes:
Event ID 2042
Repadmin message:
The time since last replication with this server has exceeded the tombstone lifetime.
A domain controller has failed inbound replication with the named source domain
controller long enough for a deletion to have been tombstoned, replicated, and
garbage-collected from AD DS. See Active Directory replication Event ID 2042.
Event ID 1925
Repadmin message:
No inbound neighbors
If no items appear in the "Inbound Neighbors" section of the output that is generated
by repadmin /showrepl , the domain controller wasn't able to establish replication links
with another domain controller. See Active Directory replication Event ID 1925.
Error code 5
Repadmin message:
Access is denied.
A replication link exists between two domain controllers, but replication can’t be done
correctly because of an authentication failure. See Active Directory replication fails with
error 5: Access is denied.
Error code 49
Repadmin message:
The administration tool couldn't contact AD DS. See the following articles:
Last attempt at <date - time> failed with the "Target account name is incorrect."
This problem can be related to connectivity, DNS, or authentication issues. If this error is
a DNS error, the local domain controller couldn't resolve the globally unique identifier
(GUID)-based DNS name of its replication partner. See the following articles:
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Active Directory replication issues.
Reference
Troubleshoot common Active Directory replication errors
Monitoring and Troubleshooting Active Directory Replication Using Repadmin
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where valid root CA certificates that are
distributed by using GPO appear as untrusted.
Symptoms
) Important
Various applications that use certificates and Public Key Infrastructure (PKI) might
experience intermittent problems, such as connectivity errors, once or twice per
day/week. These problems occur because of failed verification of end entity certificate.
Affected applications might return different connectivity errors, but they will all have
untrusted root certificate errors in common. Below is an example of such an error:
ノ Expand table
Any PKI-enabled application that uses CryptoAPI System Architecture can be affected
with an intermittent loss of connectivity, or a failure in PKI/Certificate dependent
functionality. As of April 2020, the list of applications known to be affected by this issue
includes, but aren't likely limited to:
Citrix
Remote Desktop Service (RDS)
Skype
Web browsers
Focus your troubleshooting efforts on Build Chain/Verify Chain Policy errors within the
CAPI2 log containing the following signatures. For example:
Result A certificate chain processed, but terminated in a root certificate which is not
trusted by the trust provider.
[value] 800b0109
Cause
Untrusted root CA certificate problems might occur if the root CA certificate is
distributed using the following Group Policy (GP):
Computer Configuration > Windows Settings > Security Settings > Public Key Policies
> Trusted Root Certification Authorities
deleted and written again. This deletion is by design, as it's how the GP applies registry
changes.
Changes in the area of the Windows registry that's reserved for root CA certificates will
notify the Crypto API component of the client application. And the application will start
synchronizing with the registry changes. The synchronization is how the applications are
kept up-to-date and made aware of the most current list of valid root CA certificates.
In some scenarios, Group Policy processing will take longer. For example, many root CA
certificates are distributed via GPO (similar with many Firewall or Applocker policies). In
these scenarios, the application might not receive the complete list of trusted root CA
certificates.
Because of this reason, end entity certificates that chain to those missing root CA
certificates will be rendered as untrusted. And various certificate-related problems will
start to occur. This problem is intermittent, and can be temporarily resolved by
reenforcing GPO processing or reboot.
If the root CA certificate is published using alternative methods, the problems might not
occur, due to the afore-mentioned situation.
Workaround
Microsoft is aware of this issue and is working to improve the certificate and Crypto API
experience in a future version of Windows.
To address this issue, avoid distributing the root CA certificate using GPO. It might
include targeting the registry location (such as
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\Root\Certificate
When storing root CA certificate in a different, physical, root CA certificate store, the
problem should be resolved.
Console
7 Note
This command can be executed only by local admins, and it will affect only single
machine.
Method 2: Start certlm.msc (the certificates management console for local machine) and
import the root CA certificate in the Registry physical store.
7 Note
The certlm.msc console can be started only by local administrators. Also, the import
will affect only single machine.
Method 3: Use GPO preferences to publish the root CA certificate as described in Group
Policy Preferences
1. Manually import the root certificate on a machine by using the certutil -addstore
root c:\tmp\rootca.cer command (see Method 1).
2. Open GPMC.msc on the machine that you've imported the root certificate.
3. Edit the GPO that you would like to use to deploy the registry settings in the
following way:
a. Edit the Computer Configuration > Group Policy Preferences > Windows
Settings > Registry > path to the root certificate.
b. Add the root certificate to the GPO as presented in the following screenshot.
4. Deploy the new GPO to the machines where the root certificate needs to be
published.
Any other method, tool, or client management solution that distributes root CA
certificates by writing them into the location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates will
work.
References
Certutil tool
Certificate Stores
System Store Locations
Group Policy Preferences
CertControlStore Crypto API
Feedback
Was this page helpful? Yes No
This article helps fix an issue where the CNG or 2008 templates don't appear in the
Advanced Certificate Request template pulldown menu.
Symptoms
When using the certificate web enrollment page on a Windows Server 2008 or Windows
Server 2008 R2 server, the new Version 3, also known as CNG or 2008 templates, don't
appear in the Advanced Certificate Request template pulldown menu. As a result, web
enrollment using a CNG template can't take place via the web enrollment method.
When this occurs, certificates can be requested and enrolled in successfully using the
same templates but other enrollment methods. In other words, you can successfully
request a certificate from that template using the certificates MMC snap-in, script,
autoenrollment, or exported request. The issue only occurs with web enrollment not
allowing the Version 3 template from being available to select.
Frequent other causes of not being able to blanket request a certificate may be that the
server isn't an Enterprise server, or the requestor doesn't have Read Allow and Request
Allow permissions on the template in Active Directory.
Cause
This behavior is by design. Version 3 templates may have additional request
requirements that the web enrollment method may not fulfill.
Resolution
Use a different request method for these certificates. Aside from web enrollment, all
other request methods work in this scenario.
More information
An alternative, which shouldn't be attempted in production for customers without
extensive testing in a test environment, is available that will allow the version 3
templates to appear in the web enrollment default pages. The reason it's not
recommended is that the web enrollment pages, again, may not contain the code
necessary for the certificate to populate all needed data, and so the result may be a
problematic certificate. Make sure to keep that in mind when considering doing the
steps below. This option is to alter the msPKI-Template-Schema-Version from 3 to 2.
1. On your domain controller go to Start, Run, type AdsiEdit.msc and press Enter.
2. In AdsiEdit.msc right-click on the ADSIEDIT node in the left-hand pane and select
Connect To in the menu that appears.
4. Expand the nodes in the left-hand pane until you've drilled down to your
Templates store (CN=Certificate Templates,CN=Public Key
Services,CN=Services,CN=Configuration,DC=,DC=).
5. Double-click the Version 3 template you would like to have appear in the web
enrollment page.
8. Click Apply. This updates the template and CSP list. Keep this in mind if you use
3rd-party CSPs in your environment.
9. Go to your web enrollment page (if ran from your CA server) and attempt to enroll
the certificate using an advanced request.
Feedback
Was this page helpful? Yes No
This article describes how to restrict the use of certain cryptographic algorithms and
protocols in the Schannel.dll file. This information also applies to independent software
vendor (ISV) applications that are written for the Microsoft Cryptographic API (CAPI).
7 Note
This article applies to Windows Server 2003 and earlier versions of Windows. For
registry keys that apply to Windows Server 2008 and later versions of Windows, see
the TLS Registry Settings.
Summary
The following cryptographic service providers (CSPs) that are included with Windows NT
4.0 Service Pack 6 were awarded the certificates for FIPS-140-1 crypto validation.
Microsoft TLS/SSL Security Provider, the Schannel.dll file, uses the CSPs that are listed
here to conduct secure communications over SSL or TLS in its support for Internet
Explorer and Internet Information Services (IIS).
You can change the Schannel.dll file to support Cipher Suite 1 and 2. However, the
program must also support Cipher Suite 1 and 2. Cipher Suites 1 and 2 are not
supported in IIS 4.0 and 5.0.
This article contains the necessary information to configure the TLS/SSL Security
Provider for Windows NT 4.0 Service Pack 6 and later versions. You can use the Windows
registry to control the use of specific SSL 3.0 or TLS 1.0 cipher suites with respect to the
cryptographic algorithms that are supported by the Base Cryptographic Provider or the
Enhanced Cryptographic Provider.
7 Note
In Windows NT 4.0 Service Pack 6, the Schannel.dll file does not use the Microsoft
Base DSS Cryptographic Provider (Dssbase.dll) or the Microsoft DS/Diffie-Hellman
Enhanced Cryptographic Provider (Dssenh.dll).
Cipher suites
Both SSL 3.0 and TLS 1.0 (RFC2246) with INTERNET-DRAFT 56-bit Export Cipher Suites
For TLS draft-ietf-tls-56-bit-ciphersuites-00.txt provide options to use different cipher
suites. Each cipher suite determines the key exchange, authentication, encryption, and
MAC algorithms that are used in an SSL/TLS session. When you use RSA as both key
exchange and authentication algorithms, the term RSA appears only one time in the
corresponding cipher suite definitions.
The Windows NT 4.0 Service Pack 6 Microsoft TLS/SSL Security Provider supports the
following SSL 3.0-defined CipherSuite when you use the Base Cryptographic Provider or
the Enhanced Cryptographic Provider:
ノ Expand table
SSL_RSA_EXPORT_WITH_RC4_40_MD5 { 0x00,0x03 }
SSL_RSA_WITH_RC4_128_MD5 { 0x00,0x04 }
SSL_RSA_WITH_RC4_128_SHA { 0x00,0x05 }
SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5 { 0x00,0x06 }
SSL_RSA_WITH_DES_CBC_SHA { 0x00,0x09 }
SSL_RSA_WITH_3DES_EDE_CBC_SHA { 0x00,0x0A }
SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA { 0x00,0x62 }
SSL_RSA_EXPORT1024_WITH_RC4_56_SHA { 0x00,0x64 }
7 Note
Neither SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA nor
SSL_RSA_EXPORT1024_WITH_RC4_56_SHA is defined in SSL 3.0 text. However,
several SSL 3.0 vendors support them. This includes Microsoft.
Windows NT 4.0 Service Pack 6 Microsoft TLS/SSL Security Provider also supports the
following TLS 1.0-defined CipherSuite when you use the Base Cryptographic Provider or
Enhanced Cryptographic Provider:
ノ Expand table
TLS_RSA_EXPORT_WITH_RC4_40_MD5 { 0x00,0x03 }
TLS_RSA_WITH_RC4_128_MD5 { 0x00,0x04 }
TLS_RSA_WITH_RC4_128_SHA { 0x00,0x05 }
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 { 0x00,0x06 }
TLS_RSA_WITH_DES_CBC_SHA { 0x00,0x09 }
TLS_RSA_WITH_3DES_EDE_CBC_SHA { 0x00,0x0A }
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA { 0x00,0x62 }
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA { 0x00,0x64 }
7 Note
A cipher suite that is defined by using the first byte 0x00 is non-private and is used
for open interoperable communications. Therefore, the Windows NT 4.0 Service
Pack 6 Microsoft TLS/SSL Security Provider follows the procedures for using these
cipher suites as specified in SSL 3.0 and TLS 1.0 to make sure of interoperability.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
7 Note
Any changes to the contents of the CIPHERS key or the HASHES key take effect
immediately, without a system restart.
SCHANNEL key
Start Registry Editor (Regedt32.exe), and then locate the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL
SCHANNEL\Protocols subkey
To enable the system to use the protocols that will not be negotiated by default (such as
TLS 1.1 and TLS 1.2), change the DWORD value data of the DisabledByDefault value to
0x0 in the following registry keys under the Protocols key:
SCHANNEL\Protocols\TLS 1.1\Client
SCHANNEL\Protocols\TLS 1.1\Server
SCHANNEL\Protocols\TLS 1.2\Client
SCHANNEL\Protocols\TLS 1.2\Server
2 Warning
The DisabledByDefault value in the registry keys under the Protocols key does not
take precedence over the grbitEnabledProtocols value that is defined in the
SCHANNEL_CRED structure that contains the data for an Schannel credential.
SCHANNEL\Ciphers subkey
The Ciphers registry key under the SCHANNEL key is used to control the use of
symmetric algorithms such as DES and RC4. The following are valid registry keys under
the Ciphers key.
RC4 128/128
Ciphers subkey: SCHANNEL\Ciphers\RC4 128/128
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Or, change the DWORD value data to 0x0. If you do not configure the Enabled
value, the default is enabled. This registry key does not apply to an exportable server
that does not have an SGC certificate.
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_RSA_WITH_RC4_128_SHA
This registry key refers to 168-bit Triple DES as specified in ANSI X9.52 and Draft FIPS
46-3. This registry key does not apply to the export version.
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Or, change the DWORD data to 0x0. If you do not configure the Enabled
value, the default is enabled.
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
7 Note
For the versions of Windows that releases before Windows Vista, the key
should be Triple DES 168/168.
RC2 128/128
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Otherwise, change the DWORD value data to 0x0. If you do not configure the
Enabled value, the default is enabled.
RC4 64/128
This registry key refers to 64-bit RC4. It does not apply to the export version (but is used
in Microsoft Money).
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Otherwise, change the DWORD value data to 0x0. If you do not configure the
Enabled value, the default is enabled.
RC4 56/128
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Otherwise, change the DWORD value data to 0x0. If you do not configure the
Enabled value, the default is enabled.
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
RC2 56/128
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Otherwise, change the DWORD value data to 0x0. If you do not configure the
Enabled value, the default is enabled.
DES 56
This registry key refers to 56-bit DES as specified in FIPS 46-2. Its implementation in the
Rsabase.dll and Rsaenh.dll files is validated under the FIPS 140-1 Cryptographic Module
Validation Program.
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Otherwise, change the DWORD value data to 0x0. If you do not configure the
Enabled value, the default is enabled.
SSL_RSA_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
RC4 40/128
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Otherwise, change the DWORD value data to 0x0. If you do not configure the
Enabled value, the default is enabled.
SSL_RSA_EXPORT_WITH_RC4_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
RC2 40/128
To allow this cipher algorithm, change the DWORD value data of the Enabled value to
0xffffffff. Otherwise, change the DWORD value data to 0x0. If you do not configure the
Enabled value, the default is enabled.
SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
NULL
Hashes
The Hashes registry key under the SCHANNEL key is used to control the use of hashing
algorithms such as SHA-1 and MD5. The following are valid registry keys under the
Hashes key.
MD5
To allow this hashing algorithm, change the DWORD value data of the Enabled value to
the default value 0xffffffff. Otherwise, change the DWORD value data to 0x0.
SSL_RSA_EXPORT_WITH_RC4_40_MD5
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
TLS_RSA_WITH_RC4_128_MD5
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SHA
This registry key refers to Secure Hash Algorithm (SHA-1), as specified in FIPS 180-1. Its
implementation in the Rsabase.dll and Rsaenh.dll files is validated under the FIPS 140-1
Cryptographic Module Validation Program.
To allow this hashing algorithm, change the DWORD value data of the Enabled value to
the default value 0xffffffff. Otherwise, change the DWORD value data to 0x0.
SSL_RSA_WITH_RC4_128_SHA
SSL_RSA_WITH_DES_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA
SSL_RSA_EXPORT1024_WITH_RC4_56_SHA
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
KeyExchangeAlgorithms
The KeyExchangeAlgorithms registry key under the SCHANNEL key is used to control
the use of key exchange algorithms such as RSA. The following are valid registry keys
under the KeyExchangeAlgorithms key.
PKCS
This registry key refers to the RSA as the key exchange and authentication algorithms.
To allow RSA, change the DWORD value data of the Enabled value to the default value
0xffffffff. Otherwise, change the DWORD data to 0x0.
Disabling RSA effectively disallows all RSA-based SSL and TLS cipher suites supported by
the Windows NT4 SP6 Microsoft TLS/SSL Security Provider.
In this article, we refer to them as FIPS 140-1 cipher suites. Specifically, they are as
follows:
SSL_RSA_WITH_DES_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
To use only FIPS 140-1 cipher suites as defined here and supported by Windows NT 4.0
Service Pack 6 Microsoft TLS/SSL Security Provider with the Base Cryptographic Provider
or the Enhanced Cryptographic Provider, configure the DWORD value data of the
Enabled value in the following registry keys to 0x0:
SCHANNEL\Ciphers\RC4 128/128
SCHANNEL\Ciphers\RC2 128/128
SCHANNEL\Ciphers\RC4 64/128
SCHANNEL\Ciphers\RC4 56/128
SCHANNEL\Ciphers\RC2 56/128
SCHANNEL\Ciphers\RC4 40/128
SCHANNEL\Ciphers\RC2 40/128
SCHANNEL\Ciphers\NULL
SCHANNEL\Hashes\MD5
And configure the DWORD value data of the Enabled value in the following registry keys
to 0xffffffff:
SCHANNEL\Ciphers\DES 56/56
SCHANNEL\Hashes\SHA
SCHANNEL\KeyExchangeAlgorithms\PKCS
where:
Selecting the option to use only FIPS 140-1 cipher suites in TLS 1.0:
Because of this difference, customers may want to prohibit the use of SSL 3.0 even
though the allowed set of cipher suites is limited to only the subset of FIPS 140-1 cipher
suites. In that case, change the DWORD value data of the Enabled value to 0x0 in the
following registry keys under the Protocols key:
SCHANNEL\Protocols\SSL 3.0\Client
SCHANNEL\Protocols\SSL 3.0\Server
2 Warning
The Enabled value data in these registry keys under the Protocols key takes
precedence over the grbitEnabledProtocols value that is defined in the
SCHANNEL_CRED structure that contains the data for a Schannel credential. The
In a computer that is running Windows NT 4.0 Service Pack 6 with the exportable
Rasbase.dll and Schannel.dll files, run Export.reg to make sure that only TLS 1.0 FIPS
cipher suites are used by the computer.
In a computer that is running Windows NT 4.0 Service Pack 6 that includes the non-
exportable Rasenh.dll and Schannel.dll files, run Non-export.reg to make sure that only
TLS 1.0 FIPS cipher suites are used by the computer.
For the Schannel.dll file to recognize any changes under the SCHANNEL registry key,
you must restart the computer.
To return the registry settings to default, delete the SCHANNEL registry key and
everything under it. If these registry keys are not present, the Schannel.dll rebuilds the
keys when you restart the computer.
Feedback
Was this page helpful? Yes No
This article outlines Microsoft's support policy concerning Windows Server containers
for on-premises implementations.
Applies to: Windows Server 2019, Windows Server 2016, Windows 10 - all editions, and
Windows 11 - all editions
Original KB number: 4489234
Microsoft supports Windows Server containers for the following Windows versions and
releases:
Refer to Overview - Product end of support public doc for more information on the end
of support.
7 Note
For similar information about Microsoft's support policy for containers in Azure, see
Support policy for containers and related services on Azure.
Host operating system: Windows Server, Windows 10 or Windows 11. For more
information, see Windows containers requirements.
Hypervisor: Windows 10 or Windows 11 must run Hyper-V to support containers;
Windows Server, as shown in the table, has more flexibility.
Mirantis Container Runtime (MCR): Mirantis Container Runtime is a third-party
application used to create and manage containers that run on Windows Server. For
more information, see Windows containers requirements.
ContainerD: Used AKS Hybrid and AKS deployments.
Docker Desktop for Windows runs on Windows 10.
Container type: Microsoft supports Windows Server containers with Hyper-V
isolation. However, not all host configurations can support any container type. For
general information about Windows Server containers and container types, see
Container base images and Windows container version compatibility.
7 Note
The Linux Containers on Windows (LCOW) feature on Windows Server has been
deprecated.
SVVP validated Windows Server None (Hyper-V not Windows Server containers
hypervisor (full or core) supported on VMware ESX)
For more information on SVVP validated hypervisors, see Welcome to the Windows
Server Virtualization Validation Program .
7 Note
Users are no longer disallowed from running Windows Server containers in process
isolation mode on Windows 10 Enterprise or Professional for dev/test purposes
since Windows 10 October 2018 update. See the FAQ to learn more.
Microsoft doesn't provide support for the following configurations on Windows 10 and
Windows 11 Professional or Enterprise:
Docker Desktop. You can get support from the Docker Community Forums or
from Docker support. For more information, see Docker Desktop for Windows
FAQ .
Windows Server containers or Hyper-V containers with isolation on virtual
machines that are hosted on a Windows 10 or Windows 11 Professional or
Enterprise system. To use containers on a virtual machine, use Windows Server as
the host.
Windows Server containers do work on Windows 10 or Windows 11 now but aren't
fully supported.
For more information about requirements and compatibility issues for virtualization, see
Windows Server Catalog: Server Virtualization Validation Program .
ノ Expand table
Container host Windows Server Nano Server Windows Windows IoT
OS Core container container base container base Core
base image image image container
base image
If you plan to use container hosts that run different versions and releases of Windows,
you also need to consider the versions and releases of the container images. Some
container features aren't backward compatible, so some newer container base images
may not run on container hosts with old Operation System (OS) versions. See Windows
Container Version Compatibility for more information.
For support of Microsoft applications like IIS, SQL and .NET running in containers, see
Microsoft repository on DockerHub for the respective container image support
guidance.
7 Note
There isn't a “single source of truth” in terms of which .DLLs are offered in a
Redistributable form or not.
For guidance on moving legacy apps, see Lift and shift to containers.
When using a third-party endpoint security/anti-virus software, verify with the vendor
that Windows Server containers are supported and refer to the vendor's public docs for
recommendations and exclusions. See Anti-virus optimization for Windows Containers
for more information.
See Get Started: Prep Windows for containers for the recommended and supported
installation method on Windows Server.
After April 30, 2023, Microsoft will no longer be the first point of contact for customers
running the Mirantis Container Runtime on Windows Server. Customers need to engage
Mirantis first.
1. Microsoft will provide support for Mirantis Container Runtime until April 30, 2023.
2. Customers are licensed to run, in perpetuity, only the number of copies of Mirantis
Container Runtime obtained before April 30, 2023, and no more.
3. After April 30, 2023, customers won't be able to get support, updates, or patches
for the Mirantis container runtime from either Microsoft or Mirantis.
4. Customers can purchase a license to use a fully supported version of Mirantis
Container Runtime from Mirantis at any time.
Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) or Windows Server is an on-
premises implementation of Azure’s flag ship container service, which automates
running containerized applications at scale. AKS makes it quicker to get started hosting
Linux and Windows containers in your datacenter.
Microsoft provides end-to-end support for Azure Kubernetes Service on Azure Stack HCI
or Windows Server, including a single node without high availability.
For more information on support policies, see Support policies for AKS hybrid - AKS
hybrid | Microsoft Learn.
Microsoft provides end-to-end support for Azure Kubernetes Service Edge Essentials
except for the following.
For more information on support policies, see Support policies for AKS hybrid - AKS
hybrid | Microsoft Learn.
Azure Kubernetes Service (AKS) is Azure’s flag ship container service; customers can
create Windows Server based node pools within an AKS cluster to run their Windows
containers. This is a fully supported service; Any issues or questions should be opened
using the Help + Support in the Azure portal.
For any issues and questions related to Kubernetes, see Reporting Issues and Feature
Requests .
Microsoft only provides support for Windows nodes participating in an on-premises
Kubernetes cluster.
Azure Service Fabric is fully supported and all issues or questions should be directed to
Azure support using the Help + Support in the Azure portal. For more information, see
Introducing Service Fabric cluster resource manager and Service Fabric and containers.
Docker swarm is a feature of the Mirantis Container Runtime that creates, manages, and
runs Windows Server containers in a mixed node environment of Linux and Windows
hosts. Docker swarm is fully supported by Mirantis. Mirantis support advises customers
on whether Microsoft support should be engaged regarding issues or questions related
to Windows Server. For more information about using Docker swarm with Windows
Server containers, see Getting started with swarm mode and Swarm mode overview
on Mirantis website.
Feedback
Was this page helpful? Yes No
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve Group Policy-related issues. The topics are divided into
subcategories. Browse the content or use the search feature to find relevant content.
Feedback
Was this page helpful? Yes No
This article describes how to apply Group Policy objects to Terminal Services servers.
Summary
Microsoft Windows Server 2003 Terminal Services servers and Microsoft Windows 2000
Terminal Services servers are installed for users in Application Server mode. When the
Terminal Services servers are in an Active Directory domain, the domain administrator
implements Group Policy objects (GPOs) to the Terminal Services server to control the
user environment. This article describes the recommended process of applying GPOs to
Terminal Services without adversely affecting other servers on the network.
More information
There are two methods for applying GPOs to Terminal Services without adversely
affecting other servers on the network.
Method 1
Put the Terminal Server computers into their own organizational unit (OU). This
configuration permits relevant computer configuration settings to be put in GPOs that
apply only to Terminal Server computers. This configuration does not affect the user
experience on workstations or on other servers and lets you create a tightly controlled
Terminal Server experience for users. This OU should not contain users or other
computers so that domain administrators can fine-tune the Terminal Services
experience. The OU can also be delegated for control to subordinate groups such as
server operators or individual users.
To create a new OU for the Terminal Services servers, follow these steps:
1. Click Start, point to Programs, point to Administrative Tools, and then click Active
Directory Users and Computers.
4. On the Action menu, click New, and then click Organizational Unit.
5. In the Name box, type a name for the Terminal Services server.
6. Click OK.
The new Terminal Services OU now appears in the list in the left pane and contains
no default objects. The Terminal Services servers reside in either the Computers OU
or the Domain Controllers OU.
7. Locate and then click the Terminal Services server or servers, click Action, and then
click Move.
8. In the Move dialog box, click the new Terminal Services server or servers, and then
click OK.
9. Click the new Terminal Services OU to verify that the move has successfully
occurred.
7 Note
6. When modifications are completed, close the Group Policy editor, and then click
Close to close OU Properties.
Method 2
Use the Group Policy loopback feature to apply User Configuration GPO settings to
users only when they log on to the Terminal Servers. When GPO Loopback processing is
enabled for the computers in an OU that contains only Terminal Servers, those
computers apply the User Configuration settings from the set of GPOs that apply to that
OU. Additionally, those computers apply the User Configuration settings from GPOs that
are linked to or inherited by the OU that contains the user's account.
For additional information, click the following article number to view the article in the
Microsoft Knowledge Base:
The computer account of the terminal server should be added to the security properties
of the GPO being created for the loopback. To do it, follow these steps:
1. Select the GPO that is created for the loopback, and then click Properties.
2. Click the Security tab, and then click Add.
3. In the Select Users, Computers, or Groups box, select the computer account, and
then click OK.
4. Click the computer account from the Group or user names box.
5. In the Permissions for computer name box, click to select the Read and Apply
Group Policy check boxes in the Allow column.
6. Click OK two times to close and save the policy settings.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article describes common problems and solutions when troubleshooting Software
Restriction Policies (SRP) beginning with Windows Server 2008 and Windows Vista.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows Server 2012
Introduction
Software Restriction Policies (SRP) is Group Policy-based feature that identifies software
programs running on computers in a domain and controls the ability of those programs
to run. You use software restriction policies to create a highly restricted configuration for
computers, in which you allow only identified applications to run. These applications are
integrated with Microsoft Active Directory Domain Services and Group Policy but can
also be configured on stand-alone computers. For more information about SRP, see
Software Restriction Policies.
Beginning in Windows Server 2008 R2 and Windows 7, Windows AppLocker can be used
instead of or in concert with SRP for a portion of your application control strategy.
Cause: The default security level (or a rule) was created so that the software program is
set as Disallowed and as a result it doesn't start.
Solution: Look in the event log for an in-depth description of the message. The event
log message indicates what software program is set as Disallowed and what rule is
applied to the program.
Cause 2: Group Policy might not have refreshed its policy settings. Group Policy applies
changes to policy settings periodically; therefore, it's likely that the policy changes made
in the directory haven't yet been refreshed.
Solutions:
The computer on which you modify software restriction policies for the network
must be able to contact a domain controller. Ensure the computer can contact a
domain controller.
Refresh policy by logging off of the network and then logging on to the network
again. If any policy is applied through Group Policy, logging back in refreshes
those policies.
You can refresh policy settings with the command-line utility gpupdate or by
logging off from and then logging back on to your computer. For best results, run
gpupdate , and then sign out from and log back on to your computer. Generally,
the security settings are refreshed every 90 minutes on a workstation or server and
every 5 minutes on a domain controller. The settings are also refreshed every 16
hours, whether or not there are any changes. These settings are configurable, so
refresh intervals can be different in each domain.
Check which policies apply. Check domain level policies for No Override settings.
Software restriction policies specified in a domain through Group Policy override
any policies configured locally. Use Gpresult command-line tool to determine
what the net effect of the policy is. When policies aren't taking effect, it might
imply that there's a policy from the domain that's overriding your local setting.
If SRP and AppLocker policy settings are in the same GPO, AppLocker settings take
precedence on Windows 7, Windows Server 2008 R2, and later versions. It's
recommended to put SRP and AppLocker policy settings in different GPOs.
Solution: Add the filename extension to the list of file types supported by SRP.
1. Hash rules
2. Certificate rules
3. Path rules
4. Internet Zone rules
5. Default rules
Solution: Evaluate the rules restricting the application and, if appropriate, remove all but
the Default rule.
Solutions:
This article describes how to change the MSI file location in the Software Deployment
GPO and set the multiple UNC paths for the same MSI package.
Summary
Scenario: 1
You create a GPO for deploying an MSI Package, and need to change the location of the
MSI package (UNC path). You need to create a new GPO for the package and this new
GPO would be applied to all the machines in the OU, which will further end up
redeploying the same package on the machines already having the software (installed
from the previous GPO).
Scenario: 2
You want to provide multiple paths for the same installation package and push it
through via GPO, but the GUI only gives you one option to select the package location.
More information
You can work around this using the following methods:
1. Open the GPO the Package Object it is defined in and right-click the Package
Object and select Properties.
2. Click the Deployment tab, then click the Advanced button. Note the Script Name
location. You will need the CLSID (long alphanumeric number) directly after the
\Policies notation.
3. Open the ADSI editor, connect to your domain and navigate to the System\Policies
tree on the left side of the window. Locate the CLSID you noted above.
4. Expand this CLSID tree and then expand the following trees to get to the actual
defined Package Object: CN=Machine \ CN=Class Store \ CN=Packages.
5. Right click on the Package Object and select Properties. Navigate to the Optional
property ' msiFileList '. This property contains the UNC path of the location of the
MSI Installer file. Edit this value to represent the new UNC path.
7 Note
6. The UNC path for the Package Object has now been updated to reflect the new
UNC path.
Feedback
Was this page helpful? Yes No
This article describes how you can troubleshoot software installations by using Windows
application management debug logging.
) Important
This article contains information about how to modify the registry. Make sure to
back up the registry before you modify it. Make sure that you know how to restore
the registry if a problem occurs. For more information about how to back up,
restore, and modify the registry, click the following article number to view the
article in the Microsoft Knowledge Base: 256986 Description of the Microsoft
Windows registry
Applies to: Windows Server (All supported versions), Windows client (All supported
versions)
Original KB number: 249621
Summary
When a problem occurs with a program that is deployed on a client computer by using
Group Policy, a log file (Appmgmt.log) can be generated. This log file records
information that is related to the advertisement, publishing, or assignment of Windows
Installer applications by using Group Policy. This information, in conjunction with
logging from the Windows Installer service, can help determine the cause of a software
installation problem.
For more information about how to enable Windows Installer Logging, click the
following article number to view the article in the Microsoft Knowledge Base:
More information
To enable diagnostic logging of Group Policy Software Installation processing, modify
the registry on the computer where the program will be installed.
2 Warning
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall your operating system. Microsoft cannot guarantee that these problems
can be solved. Modify the registry at your own risk.
1. Click Start, click Run, type regedit in the Open box, and then click OK.
2. In the left pane, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Diagnostics
7 Note
3. On the Edit menu, point to New, and then click DWORD Value.
4. Type AppMgmtDebugLevel, and then press Enter.
5. Double-click AppMgmtDebugLevel, type 4b in the Value data box, and then click
OK.
6. Quit Registry Editor.
After you make this registry modification, a log file named Appmgmt.log is created
when Group Policy processing occurs. The Appmgmt.log file is located in the
%SystemRoot%\Debug\UserMode folder on the computer where the
AppMgmtDebugLevel registry value is enabled.
7 Note
This step-by-step article describes how to use Group Policy to configure automatic
logon in Microsoft Windows Server 2003 Terminal Services.
Summary
When you use Remote Desktop Connection to connect to a Windows Server 2003-
based computer running Terminal Services, you can provide your logon information
before you make the connection. In this way, you automatically pass these credentials to
the server.
You specify your user name, password, and logon domain on the General tab in the
Remote Desktop Connection dialog box (in the Remote Desktop Connection client
window, click Options, and then click the General tab). When you click Connect, the
logon information that you typed becomes the default setting for all Remote Desktop
connections and is saved in the Default.rdp file.
1. Click Start, click Run, type mmc in the Open box, and then click OK.
2. On the File menu, click Add/Remove Snap-in.
3. Click Add.
4. Click Group Policy Object Editor, and then click Add.
5. Click the target Group Policy object (GPO). The default GPO is Local Computer.
Click Browse to select the GPO that you want, and then click Finish.
6. Click Close, and then click OK.
7. Expand the Group Policy object, expand Computer Configuration, expand
Administrative Templates, expand Windows Components, expand Terminal
Services, and then click Encryption and Security.
8. In the right pane, double-click Always prompt client for password upon
connection.
9. Click Disabled.
10. Click OK, and then quit the Group Policy Object Editor snap-in.
Feedback
Was this page helpful? Yes No
This article describes how to configure Group Policy to use a Known Issue Rollback (KIR)
policy definition that activates a KIR on managed devices.
Applies to: Windows Server (All supported versions), Windows client (All supported
versions)
Summary
Microsoft has developed a new Windows servicing technology that's named KIR for
Windows Server 2019 and Windows 10, versions 1809 and later versions. For the
supported versions of Windows, a KIR rolls back a specific change that was applied as
part of a nonsecurity Windows Update release. All other changes that were made as a
part of that release remain intact. By using this technology, if a Windows update causes
a regression or other problem, you don't have to uninstall the entire update and return
the system to the last known good configuration. You roll back only the change that
caused the problem. This rollback is temporary. After Microsoft releases a new update
that fixes the problem, the rollback is no longer necessary.
) Important
KIRs apply to only nonsecurity updates. This is because rolling back a fix for a
nonsecurity update doesn't create a potential security vulnerability.
Microsoft manages the KIR deployment process for non-enterprise devices. For
enterprise devices, Microsoft provides KIR policy definition MSI files. Enterprises can
then use Group Policy to deploy KIRs in hybrid Microsoft Entra ID or Active Directory
Domain Services (AD DS) domains.
7 Note
You have to restart the affected computers in order to apply this Group Policy
change.
The KIR process
If Microsoft determines that a nonsecurity update has a critical regression or similar
issue, Microsoft generates a KIR. Microsoft announces the KIR in the Windows Health
Dashboard, and adds the information to the following locations:
For non-enterprise customers, the Windows Update process applies the KIR
automatically. No user action is required.
For enterprise customers, Microsoft provides a policy definition MSI file. Enterprise
customers can propagate the KIR to managed systems by using the enterprise Group
Policy infrastructure.
To see an example of a KIR MSI file, download Windows 10 (2004 & 20H2) Known Issue
Rollback 031321 01.msi .
A KIR policy definition has a limited lifespan (a few months, at most). After Microsoft
publishes an amended update to address the original issue, the KIR is no longer
necessary. The policy definition can then be removed from the Group Policy
infrastructure.
) Important
Make sure that the operating system that is listed in the .msi file name
matches the operating system of the device that you want to update.
2. Run the .msi file on the device. This action installs the KIR policy definition in the
Administrative Template.
3. Open the Local Group Policy Editor. To do this, select Start, and then enter
gpedit.msc.
4. Select Local Computer Policy > Computer Configuration > Administrative
Templates > KB ####### Issue XXX Rollback > Windows 10, version YYMM.
7 Note
In this step, ####### is the KB article number of the update that caused the
problem. XXX is the issue number, and YYMM is the Windows 10 version
number.
5. Right-click the policy, and then select Edit > Disabled > OK.
6. Restart the device.
For more information about how to use the Local Group Policy Editor, see Working with
the Administrative Template policy settings using the Local Group Policy Editor.
7 Note
For more information about how to create GPOs, see Create a Group Policy Object.
3. Enter a description of your WMI filter, such as Filter to all Windows 10, version
2004 devices.
4. Select Add.
SQL
) Important
10.0.xxxxx
where xxxxx is a five digit number. Currently, KIRs support the following
versions:
ノ Expand table
Version Build number
For an up-to-date list of Windows releases and build numbers, see Windows 10 -
release information.
) Important
The build numbers that are listed on the Windows 10 release information
page don't include the 10.0 prefix. To use a build number in the query, you
must add the 10.0 prefix.
For more information about how to create WMI filters, see Create WMI Filters for the
GPO.
1. Right-click the GPO that you created previously, and then select Edit.
2. In the Group Policy Editor, select GPOName > Computer Configuration >
Administrative Templates > KB ####### Issue XXX Rollback > Windows 10,
version YYMM.
3. Right-click the policy, and then select Edit > Disabled > OK.
For more information about how to edit GPOs, see Edit a Group Policy object from
GPMC.
6. Monitor the GPO results
In the default configuration of Group Policy, managed devices should apply the new
policy within 90 to 120 minutes. To speed up this process, you can run gpupdate on
affected devices to manually check for updated policies.
Make sure that each affected device restarts after it applies the policy.
) Important
The fix that introduced the issue is disabled after the device applies the policy and
then restarts.
7 Note
To use the solutions in this section, you must install the cumulative update that is
released on July 26, 2022 or a later one on the computer.
Group Policies and GPOs aren't compatible with mobile device management (MDM)
based solutions, such as Microsoft Intune. These instructions will guide you through how
to use Intune custom settings for ADMX ingestion and configure ADMX backed MDM
policies to perform a KIR activation without requiring a GPO.
1. Download and install the KIR MSI file to get ADMX files.
2. Create a custom configuration profile in Microsoft Intune.
3. Monitor KIR activation.
1. Download and install the KIR MSI file to get ADMX files
1. Check the KIR release information or the known issues lists to identify which
operating system (OS) versions you must update.
2. Download the required KIR policy definition .msi files on the machine you use to
sign in to Microsoft Intune.
7 Note
You will need access to the contents of a KIR activation ADMX file.
3. Run the .msi files. This action installs the KIR policy definition in the Administrative
Template.
7 Note
If you want to extract the ADMX files to another location, use the msiexec
command with the TARGETDIR property. For example:
Console
4. Select Create.
Name: Enter a descriptive name for the policy. Name your policies so you can
easily identify them later. For example, a good policy name is "04/30 KIR
Activation – Windows 10 21H2".
Description: Enter a description for the policy. This setting is optional but
recommended.
7 Note
6. Select Next.
7 Note
Before proceeding to the next two steps, open the ADMX file in a text editor (for
example, Notepad) where the file was extracted. The ADMX file should be in the path
C:\Windows\PolicyDefinitions if you installed it as an MSI file.
XML
<policies>
<policy name="KB5011563_220428_2000_1_KnownIssueRollback" … >
<parentCategory ref="KnownIssueRollback_Win_11" />
<supportedOn ref="SUPPORTED_Windows_11_0_Only" />
<enabledList…> … </enabledList>
<disabledList…>…</disabledList>
</policy>
</policies>
Record the values for policy name and parentCategory . This information is in the
"policies" node at the end of the file.
B. Add custom configuration setting to ingest ADMX files for KIR
activation
This configuration setting is used to install the KIR activation policy on target devices.
Follow these steps to add the ADMX ingestion settings:
Name: Enter a descriptive name for the configuration setting. Name your
settings so you can easily identify them later. For example, a good setting
name is "ADMX Ingestion: 04/30 KIR Activation – Windows 10 21H2".
Description: Enter a description for the setting. This setting is optional but
recommended.
7 Note
Replace <ADMX Policy Name> with the value of the recorded policy
name from the ADMX file. For example,
"KB5011563_220428_2000_1_KnownIssueRollback".
Value: Open the ADMX file with a text editor (for example, Notepad). Copy
and paste the entire contents of the ADMX file you intend to ingest into this
field.
3. Select Save.
Name: Enter a descriptive name for the configuration setting. Name your
settings so you can easily identify them later. For example, a good setting
name is "KIR Activation: 04/30 KIR Activation – Windows 10 21H2".
Description: Enter a description for the setting. This setting is optional but
recommended.
7 Note
3. Select Save.
4. Select Next.
To target the devices by OS that are applicable to the GP, add an applicability rule to
check the device OS Version (Build) before applying this configuration. You can look up
the build numbers for the supported OS on the following pages:
Windows 11 release information
Windows 10 release information
Windows Server release information
The build numbers shown in the pages are formatted as MMMMM.mmmm (M= major
version and m= minor version). The OS Version properties use the major version digits.
The OS Version values entered into the Applicability Rules should be formatted as
"10.0.MMMMM". For example, "10.0.22000".
Follow these instructions to set the correct Applicability Rules for your KIR activation:
2. Select Next.
7 Note
The OS version of a device can be found by running the winver command from the
Start menu. It will show a two-part version number separated by a ".". For example,
"22000.613". You can append the left number to "10.0." for the Min OS version.
Obtain the Max OS version number by adding 1 to the last digit of the Min OS
version number. For this example, you can use these values:
Min OS version: "10.0.22000"
Max OS version: "10.0.22001"
1. Go to Devices > Configuration profiles, and select an existing profile. For example,
select a macOS profile.
2. Select the Overview tab. In this view, the Profile assignment status includes the
following statuses:
For more information, see Monitor device configuration profiles in Microsoft Intune.
More information
Local Group Policy Editor
Working with the Administrative Template policy settings using the Local Group
Policy Editor
Group Policy Overview
GPMC How To
Create WMI Filters for the GPO (Windows 10) - Windows security
Edit a Group Policy object from GPMC
Create and manage group policy in Microsoft Entra Domain Services
Use Windows 10/11 templates to configure group policy settings in Microsoft
Intune
Feedback
Was this page helpful? Yes No
This article describes how to use Group Policy to automatically distribute programs to
client computers or users.
Summary
You can use Group Policy to distribute computer programs by using the following
methods:
Assigning software
You can assign a program distribution to users or computers. If you assign the
program to a user, it's installed when the user logs on to the computer. When the
user first runs the program, the installation is completed. If you assign the program
to a computer, it's installed when the computer starts, and it's available to all users
who log on to the computer. When a user first runs the program, the installation is
completed.
Publishing software
You can publish a program distribution to users. When the user logs on to the
computer, the published program is displayed in the Add or Remove Programs
dialog box, and it can be installed from there.
7 Note
1. Start the Active Directory Users and Computers snap-in by clicking Start, pointing
to Administrative Tools, and then clicking Active Directory Users and Computers.
2. In the console tree, right-click your domain, and then click Properties.
3. Click the Group Policy tab, and then click New.
4. Type a name for this new policy, and then press Enter.
5. Click Properties, and then click the Security tab.
6. Clear the Apply Group Policy check box for the security groups that you don't
want this policy to apply to.
7. Select the Apply Group Policy check box for the groups that you want this policy
to apply to.
8. When you're finished, click OK.
Assign a package
To assign a program to computers that are running Windows Server 2003, Windows
2000, or Windows XP Professional, or to users who are logging on to one of these
workstations, follow these steps:
1. Start the Active Directory Users and Computers snap-in by clicking Start, pointing
to Administrative Tools, and then clicking Active Directory Users and Computers.
2. In the console tree, right-click your domain, and then click Properties.
3. Click the Group Policy tab, select the policy that you want, and then click Edit.
) Important
Don't use the Browse button to access the location. Make sure that you use
the UNC path of the shared installer package.
7. Click Open.
8. Click Assigned, and then click OK. The package is listed in the right-pane of the
Group Policy window.
9. Close the Group Policy snap-in, click OK, and then close the Active Directory Users
and Computers snap-in.
10. When the client computer starts, the managed software package is automatically
installed.
Publish a package
To publish a package to computer users and make it available for installation from the
Add or Remove Programs list in Control Panel, follow these steps:
1. Start the Active Directory Users and Computers snap-in by clicking Start, pointing
to Administrative Tools, and then clicking Active Directory Users and Computers.
2. In the console tree, right-click your domain, and then click Properties.
3. Click the Group Policy tab, click the policy that you want, and then click Edit.
6. In the Open dialog box, type the full UNC path of the shared installer package that
you want. For example, \\file server\share\file name.msi .
) Important
Don't use the Browse button to access the location. Make sure that you use
the UNC path of the shared installer package.
7. Click Open.
10. Close the Group Policy snap-in, click OK, and then close the Active Directory Users
and Computers snap-in.
7 Note
Because there are several versions of Windows, the following steps may be
different on your computer. If they are, see your product documentation to
complete these steps.
Redeploy a package
In some cases, you may want to redeploy a software package (for example, if you
upgrade or change the package). To redeploy a package, follow these steps:
1. Start the Active Directory Users and Computers snap-in by clicking Start, pointing
to Administrative Tools, and then clicking Active Directory Users and Computers.
2. In the console tree, right-click your domain, and then click Properties.
3. Click the Group Policy tab, click the Group Policy Object that you used to deploy
the package, and then click Edit.
4. Expand the Software Settings container that contains the software installation
item that you used to deploy the package.
7. Click Yes.
8. Quit the Group Policy snap-in, click OK, and then close the Active Directory Users
and Computers snap-in.
Remove a package
To remove a published or assigned package, follow these steps:
1. Start the Active Directory Users and Computers snap-in by clicking Start, pointing
to Administrative Tools, and then clicking Active Directory Users and Computers.
2. In the console tree, right-click your domain, and then click Properties.
3. Click the Group Policy tab, click the Group Policy Object that you used to deploy
the package, and then click Edit.
4. Expand the Software Settings container that contains the software installation
item that you used to deploy the package.
5. Click the software installation container that contains the package.
6. In the right-pane of the Group Policy window, right-click the program, point to All
Tasks, and then click Remove.
7. Perform one of the following actions:
Click Immediately uninstall the software from users and computers, and
then click OK.
Click Allow users to continue to use the software but prevent new
installations, and then click OK.
8. Close the Group Policy snap-in, click OK, and then closet the Active Directory Users
and Computers snap-in.
Troubleshoot
Published packages are displayed on a client computer after you use a Group Policy to
remove them.
This situation can occur when a user has installed the program but hasn't used it. When
the user first starts the published program, the installation is finished. Group Policy then
removes the program.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs where AGPM and GPRESULT do
not work on a Windows Server Core installation.
Symptoms
The overall error was: The data is invalid. (Exception from HRESULT: 0x8007000D)
Additional details follow.
[Error] Unable to cast object of type 'System.DBNull' to type
'Microsoft.Agpm.GroupPolicy.Interop.GPMBackup'
GPRESULT Scenario
On a Windows Server Core computer, when an administrator runs the gpresult /h
<filename.htm> command to retrieve the GPO settings for this computer or user,
GPRESULT returns the following error message:
Cause
These issues occur because the AGPM Server component and the GPRESULT /h
command require the Group Policy Management Console (GPMC) to be installed on the
Local System. Several GPMC Interfaces will be installed on the system only when GPMC
is installed.
GPMC Interfaces
Because Windows Server Core doesn't have the GPMC Interfaces installed, applications
that use this interface will fail.
Resolution
Resolution for AGPM
Install the AGPM Server component on a Windows Server-based computer that has the
GUI installed.
Run the GPRESULT report from a remote computer against the Windows Server Core
computer.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where changes to Group Policy object
permissions that's controlled in Advanced Group Policy Management (AGPM) aren't
saved as expected.
Applies to: Windows Server (All supported versions), Windows client (All supported
versions)
Original KB number: 3174540
Symptoms
To change permissions on a Group Policy object that's controlled in AGPM, you first
check out the policy in AGPM, and then you edit the permissions on the Security tab of
the policy object. For example, you add the Read only permission to Authenticated
Users. However, after you check in the policy to save your changes, and then you view
the Security tab on the policy, you see that your changes are not saved as expected.
Cause
This behavior is by design in AGPM 4.0 Service Pack 3 (SP3) and earlier versions. To add
permissions to newly created Group Policy objects, we recommend to that you use the
Production Delegation tab in AGPM.
Workaround
To work around this issue, follow these steps:
1. Install the Microsoft Desktop Optimization Pack March 2017 Servicing Release
on the AGPM server.
2. Set the following registry key and values on the AGPM server.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Agpm
Value name: OverrideRemovePermissionsWithoutReadAndApply
Value type: String REG_SZ
Value data: 1
3. Restart the AGPM server.
References
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0
Overview Series: Advanced Group Policy Management
Operations guide for Microsoft AGPM 4.0
Feedback
Was this page helpful? Yes No
This article describes how to use the new .admx and .adml files to create and to
administer registry-based policy settings in Windows Vista, and how the Central Store is
used to store and to replicate Windows Vista policy files in a domain environment.
Overview
Windows Vista uses a new format to display registry-based policy settings. These
registry-based policy settings appear under Administrative Templates in the Group
Policy Object Editor. In Windows Vista, these registry-based policy settings are defined
by standards-based XML files that have an .admx file name extension. The .admx file
format replaces the legacy .adm file format. The .adm file format uses a proprietary
markup language.
In Windows Vista, Administrative Template files are divided into .admx files and
language-specific .adml files that are available to Group Policy administrators. The
changes that are implemented in Windows Vista let administrators configure the same
set of policies by using two different languages. Administrators can configure policies by
using the language-specific .adml files and the language-neutral .admx files.
Windows Vista uses a Central Store to store Administrative Template files. In Windows
Vista, the ADM folder isn't created in a GPO as in earlier versions of Windows. So
domain controllers don't store or replicate redundant copies of .adm files.
7 Note
If you use a client that is running an earlier version of Windows to modify a policy
that is created or administered on a Windows Vista-based computer, the client
creates the ADM folder and replicates the files.
For more information, see Recommendations for managing Group Policy administrative
template (.adm) files .
To create a Central Store for .admx and .adml files, create a folder that is named
PolicyDefinitions in the following location: \\FQDN\SYSVOL\FQDN\policies
7 Note
For example, to create a Central Store for the Test.Microsoft.com domain, create a
PolicyDefinitions folder in the following location:
\\Test.Microsoft.Com\SYSVOL\Test.Microsoft.Com\Policies
Copy all files from the PolicyDefinitions folder on a Windows Vista-based client
computer to the PolicyDefinitions folder on the domain controller. The PolicyDefinitions
folder on a Windows Vista-based computer stays in the same folder as Windows Vista.
The PolicyDefinitions folder on the Windows Vista-based computer stores all .admx files
and .adml files for all languages that are enabled on the client computer.
The .adml files on the Windows Vista-based computer are stored in a language-specific
folder. For example, English (United States).adml files are stored in a folder that is
named "en-US." Korean .adml files are stored in a folder that is named "ko_KR." If .adml
files for additional languages are required, you must copy the folder that contains the
.adml files for that language to the Central Store. When you've copied all .admx and
.adml files, the PolicyDefinitions folder on the domain controller should contain the
.admx files and one or more folders that contain language-specific .adml files.
7 Note
When you copy the .admx and .adml files from a Windows Vista-based computer,
verify that the most recent updates to these files and to Windows Vista are
installed. Also, make sure that the most recent Administrative Template files are
replicated. This advice also applies to service packs if applicable.
To download the Administrative template files for Windows Server 2008, see
Administrative Templates (ADMX) for Windows Server 2008 .
Feedback
Was this page helpful? Yes No
This article explains that the Dcgpofix tool doesn't restore security settings in the
Default Domain Controller Policy to the same state that they were in after successfully
completing Dcpromo and that it's best to use this tool only in disaster recovery scenario.
Symptoms
The documentation for the Dcgpofix.exe tool incorrectly indicates that the Dcgpofix tool
will restore security settings in the Default Domain Controller Policy to the same state
that they were in immediately after Dcpromo successfully completed. This isn't the case.
It's best to use the Dcgpofix tool only in disaster recovery scenarios. The Dcpromo
operation modifies the security of the domain in an incremental manner, based on the
existing security settings on that server. Therefore, after you run Dcpromo, the final set
of security settings in the Default Domain Controller Policy depends on both the
Dcpromo operation and the security state of the system that existed before you ran
Dcpromo. Before you run Dcpromo, the security state of the system can be modified by
a number of mechanisms. For example, when you install some server applications,
changes may be made to user rights that are granted to local user accounts, such as the
SUPPORT_388945a0 account.
Cause
The Dcgpofix tool can't know what state the security settings were in before you run
Dcpromo. Therefore, the Dcgpofix tool can't return the security settings to precisely the
original state. Instead, the Dcgpofix tool recreates the two default Group Policy objects
(GPOs) and creates the settings based on the operations that are performed only during
Dcpromo.
If you have a new installation of Windows Server and no security changes are made to
the operating system before you run Dcpromo, the recreated Default Domain Controller
Policy that is created by Dcgpofix will be almost the same as the Default Domain
Controller Policy just after you run Dcpromo. However, there will be some differences in
the settings in the Default Domain Controller Policy in this case.
Resolution
For general backup and restore of the Default Domain Policy and Default Domain
Controller Policy, and also for other GPOs, Microsoft recommends that you use the
Group Policy Management Console (GPMC) to create regular backups of these GPOs.
You can then use GPMC in conjunction with these backups to restore the exact security
settings that are contained in these GPOs.
If you're in a disaster recovery scenario and you don't have any backed-up versions of
the Default Domain Policy or the Default Domain Controller Policy, you may consider
using the Dcgpofix tool. If you use the Dcgpofix tool, Microsoft recommends that as
soon as you run it, you review the security settings in these GPOs and manually adjust
the security settings to suit your requirements. A fix isn't scheduled to be released
because Microsoft recommends you use GPMC to back up and restore all GPOs in your
environment. The Dcgpofix tool is a disaster-recovery tool that will restore your
environment to a functional state only. It is best not to use it as a replacement for a
backup strategy using GPMC. It is best to use the Dcgpofix tool only when a GPO
backup for the Default Domain Policy and Default Domain Controller Policy doesn't
exist.
More information
The following table lists differences in security settings in the Default Domain Controller
Policy after you run the Dcgpofix tool and the settings on a new installation of Windows
Server after you run Dcpromo. Microsoft recommends that you adjust these security
settings to match the requirements in your environment after you run the Dcgpofix tool.
ノ Expand table
Setting in Default Value after running DCPromo Value after running DCGPOFIX
Domain Controller on cleanly installed Windows
Policy Server
Audit Settings
Access
User Rights
Shut down the system Administrators, Backup Operators, Account Operators, Administrators,
Server Operators, Print Operators Backup Operators, Server
Operators, Print Operators
The following settings will change after you run the Dcgpofix tool:
AuditAccountManage
AuditDSAccess
AuditPolicyChange
AuditSystemEvents
SeCreateGlobalPrivilege
SeImpersonatePrivilege
SeLoadDriverPrivilege
SeShutdownPrivilege
Based on configuration options, the following settings may also change the following:
This article provides a description of group policy restricted groups in Windows Server
2016, Windows Server 2012 R2, and Windows Server 2008 R2 Service Pack 1.
Applies to: Windows Server 2016, Windows Server 2012 R2, Windows Server 2008 R2
Service Pack 1
Original KB number: 279301
Restricted groups allow an administrator to define the following two properties for
security-sensitive (restricted) groups:
Members
Member Of
The Members list defines who should and shouldn't belong to the restricted group. The
Member Of list specifies which other groups the restricted group should belong to.
Feedback
Was this page helpful? Yes No
On a computer that is running Windows Server 2016 or Windows Server 2019 Core
edition and has the Group Policy Management Console (GPMC) feature installed, you
can't use the Backup-GPO PowerShell CmdLet to back up a group policy that contains
folder redirection settings.
PowerShell
7 Note
Cause
This issue is a known issue. Some modules aren't present by default in Windows Server
Core editions.
During the backup process, the system checks settings related to the type of policy
found. On Windows Server Core version, a Client-Side Extension (CSE) related library
used for Folder Redirection policies isn't present. This causes a COM Exception.
Reference
For more information on wbadmin syntax, see wbadmin start systemstatebackup.
Feedback
Was this page helpful? Yes No
This article helps fix an issue in which you fail to restore a Group Policy Object (GPO)
from the backup by using the Group Policy Management Console (GPMC) or the
Import-GPO cmdlet.
When you try to import or restore a GPO with one of the following options:
The process cannot access the file because it is being used by another process.
The Process Monitor log shows that the caller (mmc.exe or powershell.exe) receives the
SHARING VIOLATION result when trying to get a handle to some file of that GPO in the
SYSVOL share.
The exclusive handle is necessary in this scenario because each file of the GPO in the
SYSVOL share will be replaced by the corresponding file from the backup. Failure of any
file will cause the restore operation to fail.
To work around this issue, specify a different DC with no or little user access.
In GPMC, expand Domains in the console tree, right-click the domain, and select
Change Domain Controller.
For the Import-GPO cmdlet, use the -Server parameter. For example:
Powershell
Feedback
Was this page helpful? Yes No
This article helps you resolve the problem of applying the Group Policy loopback
function when a user signs in to a computer in a specific organizational unit.
Summary
Group Policy applies to the user or computer in a manner that depends on where both
the user and the computer objects are located in Active Directory. In some cases, users
may need policy applied to them based on the location of the computer object alone.
You can use the Group Policy loopback feature to apply Group Policy Objects (GPOs)
that depend only on which computer the user signs in to.
More information
To set user configuration per computer, follow these steps:
This policy directs the system to apply the set of GPOs for the computer to any user who
logs on to a computer affected by this policy. This policy is intended for special-use
computers where you must modify the user policy based on the computer that's being
used. For example, computers in public areas, in laboratories, and in classrooms.
7 Note
Windows XP Professional
Windows 2000 Professional
Windows 2000 Server
Windows 2000 Advanced Server
Windows Server 2003
When users work on their own workstations, you may want Group Policy settings
applied based on the location of the user object. So we recommend you to configure
policy settings based on the organizational unit in which the user account resides. When
a computer object resides in a specific organizational unit, the user settings of a policy
should be applied based on the location of the computer object instead of the user
object.
7 Note
You cannot filter the user settings that are applied by denying or removing the AGP
and Read rights from the computer object specified for the loopback policy.
Normal user Group Policy processing specifies that computers located in their
organizational unit have the GPOs applied in order during computer startup. Users in
their organizational unit have GPOs applied in order during logon, regardless of which
computer they log on to.
This processing order may not be appropriate in some cases. For example, when you
don't want applications that have been assigned or published to the users in their
organizational unit to be installed when the user is logged on to a computer in a specific
organizational unit. With the Group Policy loopback support feature, you can specify
two other ways to retrieve the list of GPOs for any user of the computers in this specific
organizational unit:
Merge Mode
In this mode, when the user logs on, the user's list of GPOs is typically gathered by
using the GetGPOList function. The GetGPOList function is then called again by
using the computer's location in Active Directory. The list of GPOs for the
computer is then added to the end of the GPOs for the user. It causes the
computer's GPOs to have higher precedence than the user's GPOs. In this example,
the list of GPOs for the computer is added to the user's list.
Replace Mode
In this mode, the user's list of GPOs isn't gathered. Only the list of GPOs based on
the computer object is used.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article describes how to give users permission to access the Group Policy object if
the Access Control List (ACL) has been modified so that Read and Apply permissions are
restricted.
Summary
You may not be able to apply a Group Policy object if the Access Control List (ACL) has
been configured to restrict Read and Apply permissions for the Group Policy object.
More information
By default, if you're a member of the Authenticated Users group, you have access to
Group Policy objects. The Authenticated Users group has Read and Apply Group Policy
permissions on Group Policy objects. If the Authenticated Users group is removed from
the ACL on the Group Policy object, then you don't have Read and Apply permissions for
that Group Policy object.
As an administrator, you can give users access to the Group Policy object by using either
of the following methods:
Add the user to the ACL on the Group Policy object explicitly, and then give this
user Read and Apply Group Policy permissions.
Give the Authenticated Users group Read and Apply Group Policy permissions.
Create a security group, add the necessary users to this group, and then give this
group Read and Apply Group Policy permissions on the ACL of the Group Policy
object.
7 Note
You must also ensure that the user, or the group that the user belongs to, isn't
explicitly denied access to the Group Policy object. An explicit Deny permission
always overrides an Allow permission.
Feedback
Was this page helpful? Yes No
You can customize security access rights to their event logs in Windows Server 2012.
These settings can be configured locally or through Group Policy. This article describes
how to use both of these methods.
Applies to: Windows Server 2012 Standard, Windows Server 2012 Datacenter
Original KB number: 323076
Summary
You can grant users one or more of the following access rights to event logs:
Read
Write
Clear
) Important
You can configure the security log in the same way. However, you can change only
Read and Clear access permissions. Write access to the security log is reserved only
for the Windows Local Security Authority (LSA).
You can use an Administrative Template Policy for the purpose. The path for the System
Eventlog, for example, is:
The setting is configure log access and it takes the same Security Descriptor Definition
Language (SDDL) string.
Microsoft suggests moving to this method once you are on Windows Server 2012.
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
The security of each log is configured locally through the values in the registry key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog .
For example, the Application log Security Descriptor is configured through the following
registry value:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\Application\CustomSD
The Security Descriptor for each log is specified by using SDDL syntax. For more
information about SDDL syntax, see the Platform SDK, or see the article mentioned in
the References section of this article.
To construct an SDDL string, note that there are three distinct rights that pertain to
event logs: Read, Write, and Clear. These rights correspond to the following bits in the
access rights field of the ACE string:
1= Read
2 = Write
4 = Clear
The following is a sample SDDL that shows the default SDDL string for the Application
log. The access rights (in hexadecimal) are bold-faced for illustration:
O:BAG:SYD:(D;; 0xf0007 ;;;AN)(D;; 0xf0007 ;;;BG)(A;; 0xf0007 ;;;SY)(A;; 0x5 ;;;BA)(A;; 0x7
;;;SO)(A;; 0x3 ;;;IU)(A;; 0x2 ;;;BA)(A;; 0x2 ;;;LS)(A;; 0x2 ;;;NS)
For example, the first ACE denies Anonymous Users read, write, and clear access to the
log. The sixth ACE permits Interactive Users to read and write to the log.
Modify your local policy to permit
customization of the security of your event logs
1. Back up the %WinDir%\Inf\Sceregvl.inf file to a known location.
3. Scroll to the middle of file, and then put the pointer immediately before [Strings].
MACHINE\System\CurrentControlSet\Services\Eventlog\Application\CustomSD
,1,%AppLogSD%,2
MACHINE\System\CurrentControlSet\Services\Eventlog\System\CustomSD,1,%
SysLogSD%,2
5. Scroll to the end of the file, and then insert the following lines:
7. Select Start, select Run, type regsvr32 scecli.dll in the Open box, and then press
ENTER.
) Important
To view the group policy settings that are described in this article in the Group
Policy editor, first complete the following steps, and then continue to the Use
group policy to set your application and system log security section:
1. Use a text editor such as Notepad to open the Sceregvl.inf in the %Windir%\Inf
folder.
MACHINE\System\CurrentControlSet\Services\Eventlog\Application\CustomSD
,1,%AppCustomSD%,2
MACHINE\System\CurrentControlSet\Services\Eventlog\Security\CustomSD,1,
%SecCustomSD%,2
MACHINE\System\CurrentControlSet\Services\Eventlog\System\CustomSD,1,%
SysCustomSD%,2
MACHINE\System\CurrentControlSet\Services\Eventlog\Directory
Service\CustomSD,1,%DSCustomSD%,2
MACHINE\System\CurrentControlSet\Services\Eventlog\DNS
Server\CustomSD,1,%DNSCustomSD%,2
MACHINE\System\CurrentControlSet\Services\Eventlog\File Replication
Service\CustomSD,1,%FRSCustomSD%,2
5. Start Gpedit.msc, and then double-click the following branches to expand them:
Computer Configuration
Windows Settings
Security Settings
Local Policies
Security Options
3. If you must create a new policy, select New, and then define the policy's name.
Otherwise, go to step 5.
4. Select the policy that you want, and then select Edit.
6. Double-click Event log: Application log SDDL, type the SDDL string that you want
for the log security, and then select OK.
7. Double-click Event log: System log SDDL, type the SDDL string that you want for
the log security, and then select OK.
References
For more information about SDDL syntax and about how to construct an SDDL string,
see Security Descriptor String Format.
Feedback
Was this page helpful? Yes No
This article describes how ADM files work, the policy settings that are available to
manage their operation, and recommendations about how to handle common ADM file
management scenarios.
7 Note
We recommend that you use Windows Vista to manage the Group Policy
infrastructure by using a central store. This recommendation holds true even when
the environment has a mix of down-level clients and servers, such as computers
that are running Windows XP or Windows Server 2003. Windows Vista uses a new
model that employs ADMX and ADML files to manage Group Policy templates.
Each operating system includes a standard set of ADM files. These standard files are the
default files that are loaded by Group Policy Object Editor. For example, Windows Server
2003 includes the following ADM files:
System.adm
Inetres.adm
Conf.adm
Wmplayer.adm
Wuau.adm
7 Note
Programs and components must be designed and coded to recognize and respond
to the policy settings that are described in the ADM file.
To load ADM files in Group Policy Object Editor, follow these steps:
7 Note
3. Click Add.
5. Click Close.
6. The custom ADM file policy settings are now available in Group Policy Object
Editor.
7 Note
Creating a GPO without later editing that GPO creates a GPT without any ADM files.
By default, when GPOs are edited, Group Policy Object Editor compares the timestamps
of the ADM files in the workstation's %windir%\Inf folder with those that are stored in
the GPTs Adm folder. If the workstation's files are newer, Group Policy Object Editor
copies these files to the GPT Adm folder, overwriting any existing files of the same
name. This comparison occurs when the Administrative Templates node (computer or
user configuration) is selected in Group Policy Object Editor, regardless of whether the
administrator actually edits the GPO.
7 Note
The ADM files stored in the GPT can be updated by viewing a GPO in Group Policy
Object Editor.
7 Note
If this policy setting is enabled, the Turn off automatic updates of ADM files policy
setting is implied.
For Windows 2000, the use of local ADM files by Group Policy Object Editor is not
supported. To work around this, use the "Turn off automatic updates of ADM files"
policy setting. Because this policy setting has no effect on the creation of new GPOs, the
local ADM files will be uploaded to the GPT in Windows 2000, and creating a GPO in
Windows 2000 effectively defines "the language of the GPO". If the "Turn off automatic
updates of ADM files" policy setting is in effect at all Windows 2000 workstations, the
language of the ADM files in the GPT will be defined by the language of the computer
that is used to create the GPO.
For administrators that are using Windows XP and Windows Server 2003, the "Always
use local ADM files for Group Policy editor" policy setting can be used. This makes it
possible for the French administrator to view policy settings by using the ADM files that
are installed locally on his or her workstation (French), regardless of the ADM file that is
stored in the GPT. When you use this policy setting, it is implied that the "Turn off
automatic updates of ADM files" policy setting is enabled to avoid unnecessary updates
of the ADM files to the GPT.
Also, consider standardizing on the latest operating system from Microsoft for
administrative workstations in a multi-language administrative environment. Then
configure both the "Always use local ADM files for Group Policy editor" and "Turn off
automatic updates of ADM files" policy settings.
If Windows 2000 workstations are being used, use the "Turn off automatic updates of
ADM files" policy setting for administrators and consider the ADM files in the GPT to be
the effective language for all Windows 2000 workstations.
7 Note
Windows XP workstations may still use their local, language specific versions.
In some situations, an operating system or service pack release may include a subset of
the ADM files that was provided with earlier releases. This has the potential to present
an earlier subset of the ADM files, resulting in policy settings no longer being visible to
administrators when they use Group Policy Object Editor. However, the policy settings
will remain active in the GPO. Only the visibility of the policy settings in Group Policy
Object Editor is affected. Any active (either Enabled or Disabled) policy settings are not
visible in Group Policy Object Editor, but remain active. Because the settings are not
visible, it is not possible for the administrator to view or edit these policy settings. To
work around this issue, administrators must become familiar with the ADM files that are
included with each operating system or service pack release before using Group Policy
Object Editor on that operating system, keeping in mind that the act of viewing a GPO is
enough to update the ADM files in the GPT, when the timestamp comparison
determines an update is appropriate.
To plan for this in your environment, Microsoft recommends that you either:
Define a standard operating system/service pack from which all viewing and
editing of GPOs occurs, making sure that the ADM files that are being used include
the policy settings for all platforms.
Use the "Turn off automatic updates of ADM files" policy setting for all Group
Policy administrators to make sure that ADM files are not overwritten in the GPT by
any Group Policy Object Editor session, and make sure that you are using the latest
ADM files that are available from Microsoft.
7 Note
The "Always use local ADM files for Group Policy editor" policy is typically used with
this policy, when it is supported by the operating system from which Group Policy
Object Editor is run.
Remove ADM files from the Sysvol folder
By default, ADM files are stored in the GPT, and this can significantly increase the Sysvol
folder size. Also, frequent editing of GPOs can result in a significant amount of
replication traffic. Using a combination of the "Turn off automatic updates of ADM files"
and "Always use local ADM files for Group Policy editor" policy settings can greatly
reduce the size of Sysvol folder and reduce policy-related replication traffic where a
significant number of policy edits occur.
If the size of the Sysvol volume or Group Policy-related replication traffic becomes
problematic, consider implementing an environment where the Sysvol does not store
any ADM files. Or consider maintaining ADM files on administrative workstations. This
process is described in the following section.
1. Enable the "Turn off automatic update of ADM files" policy setting for all Group
Policy administrators who will be editing GPOs.
2. Make sure that this policy has been applied.
3. Copy any custom ADM templates to the %windir%\Inf folder.
4. Edit existing GPOs, and then remove all ADM files from the GPT. To do this, right-
click Administrative Templates, and then click Add/Remove Template.
5. Enable the "Always use local ADM files for Group Policy Object Edit" policy setting
for administrative workstations.
7 Note
Because the workstation ADM files are stored in the %windir%\Inf folder, any
process that is used to distribute these files must run in the context of an
account that has administrative credentials on the workstation.
Windows XP does not support editing GPOs when there are no ADM files in
the Sysvol folder. In a live environment, you must consider this design
limitation.
Feedback
Was this page helpful? Yes No
This article provides a solution to a permissions issue that occurs when you run Group
Policy Management Console in a Windows 2008 or Windows Server 2003 domain.
Symptoms
When you run Group Policy Management Console (GPMC) in a Windows Server 2008 or
Windows Server 2003 domain, and then you select either Default Domain Policy or
Default Domain Controllers Policy, you receive one of the following messages:
The permissions for this GPO in the SYSVOL folder are inconsistent with those
in Active Directory. It is recommended that these permissions be consistent. To
change the permissions in SYSVOL to those in Active Directory, click OK.
You receive this message if you have the permissions to modify security on the
Group Policy Objects (GPOs).
The permissions for this GPO in the SYSVOL folder are inconsistent with those
in Active Directory. It is recommended that these permissions be consistent.
Contact an administrator who has rights to modify security on this GPO.
You receive this message if you don't have the permissions to modify security on
the Group Policy Objects (GPOs).
Cause
This issue occurs for one of the following reasons:
The access control list (ACL) on the Sysvol part of the Group Policy Object is set to
inherit permissions from the parent folder.
The Special permission (List object) is set for the Authenticated Users group.
However, the Authenticated Users group is missing from the Delegation tab of the
Group Policy Object.
Resolution
If you have permissions to modify security on the default GPOs, select OK in response to
the message that is mentioned in the Symptoms section. This action modifies the ACLs
on the Sysvol part of the Group Policy Object and makes them consistent with the ACLs
on the Active Directory component. In this situation, Group Policy removes the
inheritance attribute in the Sysvol folder.
1. Make sure that you're running the latest service pack for the system. For more
information, see:
How to obtain the latest service pack for Windows Server 2008
2. Check whether the List object permission is set for the Authenticated Users group
and whether the Authenticated Users group is missing from the Delegation tab of
the Group Policy Object.
If these conditions are true, take one of the following actions:
Feedback
Was this page helpful? Yes No
This article describes the behavior of the Remove this item if it is no longer applied
option in Group Policy preferences.
Summary
Windows Server 2008 and later versions of Windows use the Group Policy preferences
feature. On the Common tab in Group Policy preferences, there's a Remove this Item
when it is no longer applied option. This option removes a preferences item if it was
applied before. There is a local database on the computer that stores this information.
Because the Remove this item when it is no longer applied option is considered on a
per-machine basis, this database is not roamed under Roaming User Profiles. Therefore,
if a change is made by Group Policy preferences to portions of the user profile that
roam between computers (for example, the user registry), the Remove this item if it is
no longer applied option should not be used. This option does not work in a roaming
scenario.
More information
For a computer policy setting, the database is stored in the following location:
C:\ProgramData\Microsoft\Group Policy\History
For a user policy setting, the database is stored in the following location:
C:\Users%username%\AppData\Local\Microsoft\Group Policy\History
Feedback
Was this page helpful? Yes No
Provide product feedback
How to reset user rights in the default
domain group policy in Windows Server
2003
Article • 12/26/2023
This article describes how to reset user rights in the default domain Group Policy object
(GPO) in Windows Server 2003.
Summary
The default domain GPO contains many default user-rights settings. Sometimes, if you
change the default settings, unexpected restrictions may be put on user rights. If the
changes are unexpected or if the changes were not recorded so that you do not know
which changes were made, you may have to reset the user-rights settings to their
default values.
2 Warning
Make sure that you use caution when you perform the following procedures. If you
configure the GPO template incorrectly, you may cause your domain controllers to
be inoperable.
) Important
Sysvol_path\Sysvol\DomainName\Policies\{31B2F340-016D-11D2-945F-
00C04FB984F9}\Machine\Microsoft\Windows NT\SecEdit
7 Note
3. To completely reset the user rights to the default settings, replace the existing
information in the Gpttmpl.inf file with the following default user-rights
information. To do so, paste the following text in the appropriate section of your
current Gpttmpl.inf file:
INF
Unicode=yes
[System Access]
MinimumPasswordAge = 0
MaximumPasswordAge = 42
MinimumPasswordLength = 0
PasswordComplexity = 0
PasswordHistorySize = 1
LockoutBadCount = 0
RequireLogonToChangePassword = 0
ForceLogoffWhenHourExpire = 0
ClearTextPassword = 0
[Kerberos Policy]
MaxTicketAge = 10
MaxRenewAge = 7
MaxServiceAge = 600
MaxClockSkew = 5
TicketValidateClient = 1
[Version]
signature="$CHICAGO$"
Revision=1
7 Note
The permissions settings that result from this procedure are the same as the
permissions that are compatible with pre-Microsoft Windows 2000 users and
permissions that are compatible only with Windows 2000 users.
1. Start Windows Explorer and open the following folder, where Sysvol_path is the
path of the Sysvol folder: Sysvol_path\Sysvol\Domain\Policies\{31B2F340-016D-
11D2-945F-00C04FB984F9}
7 Note
3. Increase the version number to a number that is sufficient to guarantee that typical
replication does not outdate the new version number before the policy is reset.
Increment the number either by adding the number "0" to the end of the version
number or the number "1" to the beginning of the version number.
3. At the command prompt, type the following line, and then press ENTER: GPUpdate
/Force
4. Type exit and then press ENTER to quit the command prompt.
7 Note
1. Click Start, point to Administrative Tools, and then click Event Viewer.
2. Click Application.
Look for Event ID 1704 to verify that the GPO was successfully applied.
Feedback
Was this page helpful? Yes No
This article provides solutions to an issue where importing a saved GPO using Group
Policy Management Console (GPMC) fails.
Symptoms
Importing a saved GPO using Group Policy Management Console (GPMC) sporadically
fails with an error dialog "The Directory is not empty".
Cause
During Import of the Policy settings, GPMC creates several temporary directories
(staging) and backups the old settings in separate folders.
As the Import is done on the SysVol share, DFSR replication might interfere with the
import sequence and therefore show the above error.
Resolution 1
To prevent the conflicting operations from occurring, use DFSRDIAG.EXE to suspend
replication on the DC the GPMC import is happening on. The command requires the
user to specify the Replication Group name, the Partner name (in this case the DC used
for the import is the partner) and the amount of time in minutes to suspend replication.
DFSR will automatically resume replication once the number of minutes specified has
elapsed.
7 Note
In this command, <DcName> represents the domain controller name, and
<number of minutes to suspend replication> represents how long replication is
suspended.
7 Note
DFSR will log event 5106 when replication is stopped and again when it resumes.
You can use these events to monitor the service state.
Additional Information:
Previous Replication Mode: Obey Configured Schedule
Current Replication Mode: Stop Replication
Current Bandwidth Usage: Full
Duration, in minutes, for current mode: 5
Connection ID: 79E6D60D-6044-4775-A9BE-D98DAF557BD6
Replication Group ID: Domain System Volume
Additional Information:
Previous Replication Mode: Stop Replication
Current Replication Mode: Obey Configured Schedule
Current Bandwidth Usage: Obey Configured Schedule
Duration, in minutes, for current mode:
Connection ID: 79E6D60D-6044-4775-A9BE-D98DAF557BD6
Replication Group ID: Domain System Volume
Resolution 2
To resolve the issue, in case the import needs to happen more often, add a filter for
DFSR to exclude the temporary directories from replication. These temporary directories
are:
MachineOld
UserOld
MachineStaging
UserStaging
AdmOld
Append the five directories to the end of the already existing exclusions, it should look
like this:
DO_NOT_REMOVE_NtFrs_PreInstall_Directory,NtFrs_PreExisting___See_EventLog,Machine
Old,UserOld,MachineStaging,UserStaging,AdmOld
To make DFSR read the new settings from AD, run dfsrdiag PollAD .
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to errors that occur when you use the Adprep tool
together with the /gpprep argument.
Symptoms
You use the Adprep tool together with the /gpprep argument in Windows Server 2012
R2. For example, you run the following arguments:
Adprep is about to upgrade the Group Policy Object (GPO) information on the
Infrastructure Master FSMO dc1.corp.contoso.com .
If you use the Adprep.exe that is included with Windows Server 2012 R2, Adprep.exe
crashes, and you receive an error that resembles the following:
Problem signature:
Problem Event Name: APPCRASH
Application Name: adprep.exe
Application Version: 6.1.7601.17514
Application Timestamp: 4ce7a045
Fault Module Name: StackHash_9a46
Fault Module Version: 6.1.7601.17725
Fault Module Timestamp: 4ec4aa8e
Exception Code: c0000374
Exception Offset: 00000000000c40f2
OS Version: 6.1.7601.2.1.0.274.10
Locale ID: 1033
Additional Information 1: 9a46
Additional Information 2: 9a46fc9b92ce31eadc29a5f5673559ea
Additional Information 3: ec6e
Additional Information 4: ec6ee41ac19ad12f608f0599c2c1bb6f
Cause
The infrastructure operations master role holder in this domain implements a disjoint
namespace. Adprep.exe assumes that computer names will match their domain names
because this match is the default behavior in all versions of Windows.
Resolution
7 Note
All steps require membership in the Domain Admins group. Also, run commands at
an elevated command prompt.
1. Locate the infrastructure master role holder in the domain. To do this, run the
command: netdom.exe query fsmo .
2. Disable incoming and outgoing (also known as inbound and outbound) replication
on server with the Infrastructure Master role. To do this, run the following
command:
Console
3. Log on to server with the Infrastructure Master role, and modify its Domain Name
System (DNS) suffix. To do this, follow these steps:
a. Start SYSDM.CPL, select OK, select Change, and then select More
b. Set the suffix in the Primary DNS suffix of this computer box to match the
Active Directory Domain Services (AD DS) domain name instead of the current
disjointed name.
4. Restart and log on to server with the Infrastructure Master role, and then run the
command: adprep.exe /domainprep /gpprep .
5. Use SYSDM.CPL, and then follow the steps in step 3, except this time in step 3B,
you must set the suffix in the Primary DNS suffix of this computer box to match
the original disjoint name on server with the Infrastructure Master role.
6. Restart and then log on to server with the Infrastructure Master role, and enable
inbound and outbound replication. To do this, use the following command:
Console
More information
Gpprep adds cross-domain planning functionality for Group Policy and Resultant Set of
Policy (RSOP) Planning Mode. Adding this functionality requires updating the file system
in SYSVOL and AD DS permissions for existing group policies. The environment may
already contain custom or delegated permissions that were manually implemented by
administrators. In this case, gpprep triggers replication of all Group Policy files in
SYSVOL and may deny RSOP functionality to delegated users until their permissions are
recreated by administrators. So Administrators should run gpprep only one time in the
history of a domain. Gpprep shouldn't be run with every upgrade.
Notes
For more information about Disjoint Namespace support and limitations in AD DS, go to
the following Microsoft TechNet website:
https://technet.microsoft.com/library/cc731125(v=WS.10).aspx
Feedback
Was this page helpful? Yes No
This article describes ways to troubleshoot and to resolve SCECLI 1202 events.
Summary
The first step in troubleshooting these events is to identify the Win32 error code. This
error code distinguishes the type of failure that causes the SCECLI 1202 event. Below is
an example of a SCECLI 1202 event. The error code is shown in the Description field. In
this example, the error code is 0x534. The text after the error code is the error
description. After you determine the error code, find that error code section in this
article, and then follow the troubleshooting steps in that section.
0x534: No mapping between account names and security IDs was done.
or
0x6fc: The trust relationship between the primary domain and the trusted domain
failed.
1. Determine the account that is causing the failure. To do so, enable debug logging
for the Security Configuration client-side extension:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\GPExtensions\{827D319E-6EAC-11D2-A4EA-00C04F7
9F83A}
c. On the Edit menu, select Add Value, and then add the following registry value:
2. Refresh the policy settings to reproduce the failure. To refresh the policy settings,
type the following command at the command prompt, and then press ENTER:
Console
3. Find the problem account. To do so, type the following command at the command
prompt, and then press ENTER:
Console
The Find output identifies the problem account names, for example, Cannot find
MichaelPeltier. In this example, the user account MichaelPeltier doesn't exist in the
domain. Or it has a different spelling, such as MichellePeltier.
Determine why this account can't be resolved. For example, look for typographical
errors, a deleted account, the wrong policy that applies to this computer, or a trust
problem.
4. If you determine that the account must be removed from the policy, find the
problem policy and the problem setting. To determine which setting contains the
unresolved account, type the following command at the command prompt on the
computer that's producing the SCECLI 1202 event, and then press ENTER:
Console
Console
c:\>find /i "MichaelPeltier"
%SYSTEMROOT%\security\templates\policies\gpt*.*
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00000.DOM
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00001.INF
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00002.INF
SeInteractiveLogonRight = TsInternetUser,*S-1-5-32-549,*S-1-5-32-
550,MichaelPeltier,*S-1-5-32-551,*S-1-5-32-544,*S-1-5-32-548
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00003.DOM
It identifies GPT00002.inf as the cached security template from the problem Group
Policy object (GPO) that contains the problem setting. It also identifies the problem
setting as SeInteractiveLogonRight. The display name for SeInteractiveLogonRight
is Logon locally.
5. Determine which GPO contains the problem setting. Search the cached security
template that you identified in step 4 for the text GPOPath= . In this example, you
would see:
GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}\MACHINE
6. To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type
the following command at the command prompt, and then press ENTER:
Console
gpotool /verbose
Search the output for the GUID that you identified in step 5. The four lines that
follow the GUID contain the friendly name of the policy. For example:
Output
Policy {6AC1786C-016F-11D2-945F-00C04FB984F9}
Policy OK
Details:
------------------------------------------------------------
DC: domcntlr1.wingtiptoys.com
Friendly name: Default Domain Controllers Policy
Now you've identified the problem account, the problem setting, and the problem GPO.
To resolve the problem, remove or replace the problem entry.
1. Determine which service or which object is having the failure. To do so, enable
debug logging for the Security Configuration client-side extension:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\GPExtensions\{827D319E-6EAC-11D2-A4EA-00C04F7
9F83A}
c. On the Edit menu, select Add Value, and then add the following registry value:
2. Refresh the policy settings to reproduce the failure. To refresh the policy settings,
type the following command at the command prompt, and then press ENTER:
Console
3. At the command prompt, type the following command, and then press ENTER:
Console
The Find output identifies the problem account names, for example, Cannot find
MichaelPeltier. In this example, the user account MichaelPeltier doesn't exist in the
domain. Or it has a different spelling--for example, MichellePeltier.
Determine why this account can't be resolved. For example, look for typographical
errors, a deleted account, the wrong policy applying to this computer, or a trust
problem.
4. If you determine that the account has to be removed from the policy, find the
problem policy and the problem setting. To find what setting contains the
unresolved account, type the following command at the command prompt on the
computer that's producing the SCECLI 1202 event, and then press ENTER:
Console
Console
c:\>find /i "MichaelPeltier"
%SYSTEMROOT%\security\templates\policies\gpt*.*
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00000.DOM
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00001.INF
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00002.INF
SeInteractiveLogonRight = TsInternetUser,*S-1-5-32-549,*S-1-5-32-
550,JohnDough,*S-1-5-32-551,*S-1-5-32-544,*S-1-5-32-548
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00003.DOM
It identifies GPT00002.inf as the cached security template from the problem GPO
that contains the problem setting. It also identifies the problem setting as
SeInteractiveLogonRight. The display name for SeInteractiveLogonRight is Logon
locally.
5. Determine which GPO contains the problem setting. Search the cached security
template that you identified in step 4 for the text GPOPath= . In this example, you
would see:
GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}\MACHINE
6. To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type
the following command at the command prompt, and then press ENTER:
Console
gpotool /verbose
Search the output for the GUID you identified in step 5. The four lines that follow
the GUID contain the friendly name of the policy. For example:
Output
Policy {6AC1786C-016F-11D2-945F-00C04FB984F9}
Policy OK
Details:
------------------------------------------------------------
DC: domcntlr1.wingtiptoys.com
Friendly name: Default Domain Controllers Policy
You have now identified the problem account, the problem setting, and the problem
GPO. To resolve the problem, search the Restricted Groups section of the security policy
for instances of the problem account (in this example, MichaelPeltier), and then remove
or replace the problem entry.
Error code 0x5: Access denied
This error typically occurs when the system hasn't been granted the correct permissions
to update the access control list of a service. It may occur if the Administrator defines
permissions for a service in a policy but doesn't grant the System account Full Control
permissions.
1. Determine which service or which object is having the failure. To do so, enable
debug logging for the Security Configuration client-side extension:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\GPExtensions\{827D319E-6EAC-11D2-A4EA-00C04F7
9F83A}
c. On the Edit menu, select Add Value, and then add the following registry value:
2. Refresh the policy settings to reproduce the failure. To refresh the policy settings,
type the following command at the command prompt, and then press ENTER:
Console
3. At the command prompt, type the following, and then press ENTER:
Console
4. Find out which policy or which policies are trying to modify the service
permissions. To do so, type the following command at the command prompt, and
then press ENTER:
Console
Console
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00000.DOM
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00001.INF
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00002.INF
Dnscache,3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;LA)"
---------- D:\WINNT\SECURITY\TEMPLATES\POLICIES\GPT00003.DOM
5. Determine which GPO contains the problem setting. Search the cached security
template that you identified in step 4 for the text GPOPath= . In this example, you
would see:
GPOPath={6AC1786C-016F-11D2-945F-00C04FB984F9}\MACHINE
6. To find the friendly name of the GPO, use the Resource Kit utility Gpotool.exe. Type
the following command at the command prompt, and then press ENTER:
Console
gpotool /verbose
Search the output for the GUID that you identified in step 5. The four lines that
follow the GUID contain the friendly name of the policy. For example:
Output
Policy {6AC1786C-016F-11D2-945F-00C04FB984F9}
Policy OK
Details:
------------------------------------------------------------
DC: domcntlr1.wingtiptoys.com
Friendly name: Default Domain Controllers Policy
Now you have identified the service with the misconfigured permissions and the
problem GPO. To resolve the problem, search the System Services section of the security
policy for instances of the service with the misconfigured permissions. And then take
corrective action to grant the System account Full Control permissions to the service.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\GPExtensions\{827D319E-6EAC-11D2-A4EA-00C04F7
9F83A}
c. On the Edit menu, select Add Value, and then add the following registry value:
2. Refresh the policy settings to reproduce the failure. To refresh the policy settings,
type the following command at the command prompt, and then press ENTER:
Console
3. See ESENT event IDs 1000, 1202, 412, and 454 are logged repeatedly in the
Application log . This article describes known issues that cause the 0x4b8 error.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article describes how to use Group Policy Objects (GPOs) to change default logon
domain name.
Symptoms
In multi domain environment, there are scenarios where users consistently login to
workstations that are joined to a different domain than that of the logged in user. By
default the domain that the workstation is joined to is listed as the default domain name
and other domain users have to always provide the user name as domain\username to
login correctly. Also there are scenarios where the machine is domain joined but the
logins are almost always happening with local user accounts (using .\username).
Cause
Its a common mistake that users make to skip the domain name and unknowingly
attempt to login to a different domain than theirs and result in failures. To avoid these
problems and improve user experience, you may decide to choose a default logon
domain name that is different from workstation domain name.
Resolution
The following group policy setting is available in Windows Vista or later operating
systems:
7 Note
The Assign a default domain for logon group policy specifies a default logon domain
that may be different domain than the machine joined domain. You can enable this
policy setting and add the preferred domain name so that the default logon domain
name will be set to the specified domain that may not be the machine joined domain. If
you enable this policy and set the domain name as a period (.), once the policy is
applied to the machine, users will see a period (.) as their default domain and unless
users specify a domainname\username to login, all users will be treated as local users.
(.\username)
7 Note
Feedback
Was this page helpful? Yes No
This article describes how to use the Resultant Set of Policy utility (Rsop.msc) to gather
only computer-specific policy information.
Use Rsop.msc
When using the Resultant Set of Policy utility, you can gather only computer-specific
policy information:
1. Click Start, click Run, type mmc in the Open box, and then click OK.
2. Click File, click Add/Remove Snapin, and then click Add in the Add/Remove
dialog box.
3. Click Resultant Set of Policy, click Add, and then click Close in the Add/Remove
Standalone Snapin dialog box.
4. Click OK in the Add/Remove dialog box. The Resultant Set of Policy snapin is
displayed in the MMC.
5. Click Generate RSOP data on the Action menu.
6. Click Next, click Logging Mode, and then click Next.
7. Click either This Computer or Another Computer, and then type the computer
name.
8. Click Select a specific user, and then click the blank space that is below the listed
users. This has the same effect as clicking Do not display user policy settings in
the results.
9. Click Next, and then click Next. Only computer-specific settings are displayed.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides help to solve a WinStoreUI.admx conflict that occurs when Central
Store is updated by using Windows 10 Version 1511 ADMX files.
Symptoms
The WinStoreUI.admx file is available in Windows Server 2012 R2 but is not included in
the initial release of Windows 10. However, after you update the Central Store by using
the .admx files from Windows 10 Version 1511, the following error is displayed as soon
as you start editing a Group Policy object (GPO):
Comparing the .admx files of Windows Server 2012 R2 and Windows 10 Version 1511
shows that WindowsStore.admx contains the same information as WinStoreUI.admx,
plus a few additional policy settings. After you delete WinStoreUI.admx, this error no
longer occurs. However, the Resultant Set of Policies on a 2012 R2-based computer
contains the following error:
An error has occurred while collecting data for Administrative Templates. The following
errors were encountered
Cause
In Windows 10 Version 1507, the Store .admx file was removed. A fix restored the .admx
file. However, this file now has a new name. After Version 1511 is installed, when
customers update their Central Store, they now have two .admx files that have identical
settings. Because this is not allowed, the error that's described in the "Symptoms"
section occurs.
Resolution
This problem is fixed in Windows 10 Version 1511 and by the most recent cumulative
update. Affected customers should upgrade to that release if possible. To prevent the
error from occurring when you open Gpedit.msc and when you run Gpresult.exe, follow
these steps:
1. Verify that you have both winstoreui.admx and windowsstore.admx in the Central
Store.
2. Delete the winstoreui.admx and winstoreui.adml files from the Central Store.
3. Verify that both opening Gpedit.msc and running Gpresults.exe work without error.
Feedback
Was this page helpful? Yes No
Provide product feedback
Wrong error message for missing .adml
files
Article • 12/26/2023
This article provides a solution to an issue where wrong error messages are returned
when .adml files are missing.
Symptoms
SR symptoms:
EN-US Domain Controller tries to create a settings report for a GPO. The report is
created with the message:
Repro symptoms:
Renaming the folder that contains the appropriate .adml files returns the error:
Editing the affected GPOs becomes impossible, reports are inaccurate. The problem
does not happen in the same way when other language files and folders are missing as
EN-US is the fallback language and it will be loaded instead when another language is
missing.
Cause
In order to generate reports or edit the GPO, the .admx file needs to be loaded as well
as the appropriate .adml language file. Depending on the native language user
requesting the edit / reporting operation the .adml file is searched for in the appropriate
language folder (en for en, de for de, an so on). If, for example, the querying user wants
english and the GPO central store only has the german .adml files installed such an error
would occur.
The error reporting is incorrect since it is referring to the .admx file as missing, while this
file is present at the specified location.
Resolution
Making the .adml files available for the language queried for in the correct folder solves
the problem. See How to create the Central Store for Group Policy Administrative
Template files in Windows Vista .
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where manual drive mappings are removed
after drive maps are deployed through Group Policy Preferences.
Symptoms
After drive maps are deployed through Group Policy Preferences (GPP), users observe
that previously mapped drives are no longer available after a new logon. Additionally,
only a subset of mapped drives that are configured through GPP are present if more
than one policy is configured through drive map items.
Cause
Within a drive map item, there's a Drive Letter option to enable the Use first available,
starting at setting. This setting (denoted as the useLetter element in the drive map
XML) is defined as follows at Element-Specific Attributes:
useLetter - If 1, then letter refers to a single drive letter on which the action should
operate. If 0, then letter is the alphabetic beginning of a range of drive letters to which
the action may apply. When the preference item is configured with Use first available,
starting at: (or useLetter=0 in the XML), the Preference client-side extension will clear all
mapped drives starting with that drive latter through the letter Z. If multiple GPP policies
are being applied, the order of how the drive maps are processed may lead to
seemingly random removal of GPP-mapped drives.
Resolution
By design, drive maps are cleared when the Use first available, starting at setting is
enabled.
If the Use first available, starting at setting is required, make sure that the following
conditions are met:
Manually mapped drives are configured to use drive letters from earlier in the
alphabet than those that are configured by GPP drive maps.
Only a single GPP drive map policy is applied to the user.
You can also assign specific drive letters to each drive map and not use the Use first
available, starting at option on any drive map. Then, any number of GPP drive map
policies may be applied to the user without the loss of manually mapped drives or of
GPP drive maps that are configured in multiple policies that apply to the user.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides help to solve an issue where the Allow active content to run files
on My Computer Group Policy setting doesn't work.
Symptoms
If you use Windows or the Remote Server Administration Tools (RSAT) for Windows to
enable he Group Policy Preference setting Allow active content to run files on My
Computer remain disabled when the policy is applied on the client computers. If you
disable the policy setting, you will find that it gets enabled on the client computers after
the next Group Policy refresh.
The Allow active content to run files on My Computer is configured in the Group Policy
Management Editor by navigating to User Configuration\Preferences\Control Panel
Settings\Internet Settings and selecting New, then Internet Explorer 7. On the
Advanced tab, scroll down to the Security section to view the Allow active content to
run files on My Computer setting.
Cause
To enable Allow active content to run files on My Computer, the following registry
value must be set to 0:
HKEY_CURRENT_USER\Software\Microsoft\Internet
Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN
XML
The default location of the Group Policy Preferences XML setting file is:
%windir%\SYSVOL\sysvol\domain\Policies\{GUID}\
<user/computer>\Preferences\InternetSettings\InternetSettings.xml
Resolution
As a workaround you can disable the Allow active content to run files on My Computer
policy setting and the setting will be enabled when the policy is applied to the client
computers.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article helps you to use Windows Group Policy to control access to web sites.
Tips
7 Note
5. Under Address of proxy, write the host name of the local proxy (In case that you
don't have a proxy server, write a 0.0.0.0 as the Server IP).
6. Under Exceptions, write the web site that you allow access to (To use multiple web
site names, add ; between each web site name.
Microsoft corporation and/or its respective suppliers make no representations about the
suitability, reliability, or accuracy of the information and related graphics contained
herein. All such information and related graphics are provided "as is" without warranty
of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and
conditions with regard to this information and related graphics, including all implied
warranties and conditions of merchantability, fitness for a particular purpose,
workmanlike effort, title and non-infringement. You specifically agree that in no event
shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental,
special, consequential damages or any damages whatsoever including, without
limitation, damages for loss of use, data or profits, arising out of or in any way
connected with the use of or inability to use the information and related graphics
contained herein, whether based on contract, tort, negligence, strict liability or
otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of
damages.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where Group Policy Printer Preferences
fails to set the default printer.
Symptoms
Using Group Policy Preferences to create a new printer mapping and set that printer as
the default printer fails on Windows Vista and higher clients when the user is logging on
for the first time. The printer mapping is successfully created, but is not set as the
default printer in the registry. A printer preferences trace shows the following error:
Cause
Group Policy Preferences creates the network printer mapping and calls the
SetDefaultPrinterW() API before the user logon completes. At this point, the network
connection under Software\Microsoft\Windows NT\CurrentVersion\Devices is not
created yet. So when it calls the SetDefaultPrinterW() API, it fails with the error code
0x80070709 "The printer name is invalid."
The printer connection registry values will only be created by the Spooler Service when
it receives the SERVICE_CONTROL_SESSIONCHANGE notification. This notification
message will only be sent AFTER the user logon completes. So when Group Policy
Preferences calls SetDefaultPrinterW() the first time, the default printer will not be set.
Resolution
There is currently no hotfix available for this issue. Possible work-arounds include:
1. Force a group policy update after logon using the GPUPDATE /FORCE command
2. Restart the Print Spooler (spooler) service after user logon
3. Use a Scheduled Task to run a script after logon to define the default printer
4. Use Registry Preferences to configure the default printer
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
User Experience issues.
Feedback
Was this page helpful? Yes No
This article describes an ADM template that allows an Administrator to disable the
respective drivers of these devices.
Symptoms
By default, Group Policy doesn't offer a facility to easily disable drives containing
removable media, such as USB ports, CD-ROM drives, Floppy Disk drives, and high
capacity LS-120 floppy drives. But Group Policy can be extended to use customized
settings by applying an ADM template. The ADM template in this article allows an
Administrator to disable the respective drivers of these devices, ensuring that they can't
be used.
Resolution
Import this administrative template into Group Policy as an .adm file. See the link in the
"More information" section if you're unsure how to do this.
CLASS MACHINE
CATEGORY !!category
CATEGORY !!categoryname
POLICY !!policynameusb
KEYNAME "SYSTEM\CurrentControlSet\Services\USBSTOR"
EXPLAIN !!explaintextusb
PART !!labeltextusb DROPDOWNLIST REQUIRED
VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 3 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
POLICY !!policynamecd
KEYNAME "SYSTEM\CurrentControlSet\Services\Cdrom"
EXPLAIN !!explaintextcd
PART !!labeltextcd DROPDOWNLIST REQUIRED
VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 1 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
POLICY !!policynameflpy
KEYNAME "SYSTEM\CurrentControlSet\Services\Flpydisk"
EXPLAIN !!explaintextflpy
PART !!labeltextflpy DROPDOWNLIST REQUIRED
VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 3 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
POLICY !!policynamels120
KEYNAME "SYSTEM\CurrentControlSet\Services\Sfloppy"
EXPLAIN !!explaintextls120
PART !!labeltextls120 DROPDOWNLIST REQUIRED
VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 3 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
END CATEGORY
END CATEGORY
[strings]
category="Custom Policy Settings"
categoryname="Restrict Drives"
policynameusb="Disable USB"
policynamecd="Disable CD-ROM"
policynameflpy="Disable Floppy"
policynamels120="Disable High Capacity Floppy"
explaintextusb="Disables the computers USB ports by disabling the usbstor.sys
driver"
explaintextcd="Disables the computers CD-ROM Drive by disabling the cdrom.sys
driver"
explaintextflpy="Disables the computers Floppy Drive by disabling the flpydisk.sys
driver"
explaintextls120="Disables the computers High Capacity Floppy Drive by disabling
the sfloppy.sys driver"
labeltextusb="Disable USB Ports"
labeltextcd="Disable CD-ROM Drive"
labeltextflpy="Disable Floppy Drive"
labeltextls120="Disable High Capacity Floppy Drive"
Enabled="Enabled"
Disabled="Disabled"
More information
For more information about applying Administrative Template files, including
instructions on how to use the above template, download the Microsoft White Paper
'Using Administrative Template Files with Registry-Based Group Policy' from here.
This template is considered a preference rather than a true policy and will tattoo the
registry of client computers with its settings. If this template is moved out of scope of
the Group Policy that applies it, the registry changes that it makes will remain. If you
wish to reverse the settings made by this template, reverse the options to re-enable the
drivers.
Preference settings are hidden by default in the Group Policy template editor. When
applying this template, follow these instructions to change the view settings that allow
preferences to be viewed.
Feedback
Was this page helpful? Yes No
This article describes a problem in which the "System objects: Default owner for objects
created by members of the Administrators group" Group Policy setting isn't available in
the security policy settings list.
Symptoms
When you try to access the "System objects: Default owner for objects created by
members of the Administrators group" Group Policy setting on a computer that is
running Windows Vista or newer, this setting isn't available in the security policy settings
list.
When the setting is present in your security group policy, it will be ignored by Windows
Vista and newer domain members.
Cause
Windows Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2 don't
support this setting any longer. When enabled, User Account Control (UAC) will ensure
the user account is being used as owner for all objects created locally. For remote
access, the administrators' group will be used there's no restricted token for network
sessions.
Since the support for the setting was removed, the system security policy "System
objects: Default owner for objects created by members of the Administrators group"
setting isn't available in the Security Templates user interface anymore.
Resolution
You can add the "System objects: Default owner for objects created by members of the
Administrators group" Group Policy setting to the Security Templates user interface.
Hint: This procedure will NOT make Windows Vista and newer honor the setting as
Windows XP and Windows Server 2003 do.
To be able to create this Group Policy setting for some computers that are running
Windows XP or Windows Server 2003, follow these steps on a computer that is running
Windows Server 2008:
3. Take ownership of this file and give the Administrators group full access user
rights. To do this, follow these steps:
7 Note
4. To give the Administrators group full access user rights to the file, follow these
steps.
7 Note
After you give the Administrators group full access user rights, you can edit
and save changes to the file.
MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\nodefaultadminowner,3,"Syste
m objects: Default owner for objects created by members of the Administrators
group",3,0|Administrators group,1|Object Creator
7. Paste the text just after the following line in the file:
(MACHINE\System\CurrentControlSet\Control\Lsa\SCENoApplyLegacyAuditPolicy,
4,%SCENoAp plyLegacyAuditPolicy%,0)
9. Reset the file ownership and permissions for the c:\windows\inf\Sceregvl.inf file
back to the default settings. To do this, follow these steps:
a. Right-click the c:\windows\inf\Sceregvl.inf file, and then click Properties.
b. Click the Security tab.
c. Click Advanced.
d. Click the Owner tab.
e. Click Edit.
f. Click Other users or groups.
g. Click Locations.
h. Under Locations, click your local computer name, and then click OK.
i. In the Select Users or Group window, type NT SERVICE\TrustedInstaller under
Enter the object name to select, and then click OK.
j. In the Advanced Security Settings for Sceregvl.inf window, click the
TrustedInstaller account under Change Owner to, and then click OK.
k. Click OK three times.
11. Reregister the client-side extension for the Group Policy Scecli.dll file. To do this,
open an elevated command prompt, type the following command, and then press
ENTER:REGSVR32 scecli.dll Click OK.
12. To apply the "System objects: Default owner for objects created by members of the
Administrators group" Group Policy setting in the Local Security Policy settings,
follow these steps.
7 Note
If the computer is a domain controller, use the "Domain Controller security Policy"
snap-in.
1. Click Start, click Control Panel, click Administrative Tools, and then click Local
Security Policy.
2. Move to the Security Settings\Local Policies\Security Options location.
3. In the right pane of the window, right-click the "System objects: Default owner for
objects created by members of the Administrators group" Group Policy setting,
and then click Properties.
4. In the drop-down box, click Object Creator, and then click OK.
5. You may receive a warning in a Windows Security message box. Read the warning,
and then click Yes.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue in which AuthZ fails with an Access Denied
error when an application does access checks in Windows Server.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4055652
Symptoms
Consider the following scenario:
In this scenario, when the application tries to do an access check, AuthZ fails and returns
an Access Denied error message.
Cause
This issue occurs because the Network access: Restrict clients allowed to make remote
calls to SAM policy is enabled. The policy controls which users can enumerate users and
groups in the local Security Accounts Manager (SAM) database and in Active Directory.
This policy is introduced after the following versions of Windows or Windows updates
are installed:
Name Description
Policy Network access: Restrict clients allowed to make remote calls to SAM
name
Registry HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\RestrictRemoteSam
subkey
Registry REG_SZ
type
Registry A string that contains the SDDL of the security descriptor to be deployed.
value
When you define the policy by using the Windows Server 2016 Admin Tools, the default
is to allow only administrators access to this interface.
The error that's mentioned in the "Symptoms" section occurs if the following conditions
are true:
Resolution
To fix this issue, use one of the following methods.
For example, the "Exchange Servers" universal group requires this access.
If the application does not have a group that contain the required accounts, you may
have to create and maintain such a group. This is the recommended solution because it
provides access to a group that's specific to the task.
7 Note
More Information
For more information, see the following article:
Network access: Restrict clients allowed to make remote calls to SAM
You're running Active Directory together with Windows Server 2008 R2 or a later
version.
You're running Microsoft Exchange 2016 or Microsoft Exchange 2013 as an email
collaboration platform.
7 Note
Although this example specifies Exchange Server, this issue applies similarly to
other applications that use AuthZ in this manner.
In this scenario, offline address book (OAB) generation on the server that's running
Exchange Server 2016 fails.
Also, you see an entry for Event 17004 (source: MSExchange Mailbox Assistants
Provider) that resembles the following. This entry is logged in the Application log on the
server on which the "SystemMailbox{bb558c35-97f1-4cb9-8ff7-d53741dc928c}"
arbitration mailbox that's used for generating the OAB is mounted.
When the offline address book is generated, Exchange verifies whether the Mailbox-
Assistant is allowed to run the task. The SystemMailbox{bb558c35-97f1-4cb9-8ff7-
d53741dc928c} system mailbox is a disabled user account in the users container of the
forest root domain. Exchange uses the AuthZ engine of Windows for this task.
When you examine the network trace of what the server that's running Exchange Server
is doing, you notice a failed Kerberos S4U request that resembles the following:
The next step is to retrieve the Domain-Local groups. AuthZ uses SAM RPC to retrieve
these group memberships. When the program connects to the domain controller, you
receive a failure notice that resembles the following:
NFO{V1=SAMPR_REVISION_INFO_V1{Revision=3,SupportedFeatures=0}}}
FileId Persistent = 0x0000002800008761, Volatile = 0x0000002800000005 576 128
SMB2.SMB2Fileid
In the system event log of the domain controller, Event 16969 is logged, as follows:
If you have the throttling disabled, you will see one 16965 event for each access denial
incident together with the client information.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides help to fix the error 0x80004005 that occurs when you configure a
Data Source Name (DSN) using Group Policy Preferences (GPP).
Symptoms
Attempts to configure a DSN using GPP may result in error events similar to the
following:
If client-side debug logging is enabled, the following error messages may be recorded
in the debug log:
To enable GPP debug logging, enable the relevant policy setting below:
In the Event Logging section, select Informational, Warnings, and Errors. Tracing
should be set to On.
The default locations for the log file are listed below. Both the location and name of the
log file are configurable.
Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista
%SystemDrive%\ProgramData\GroupPolicy\Preference\Trace\Computer.log
Cause
The error condition occurs if you attempt to configure username and password for the
DSN policy using GPP. Username and password are not valid keywords when
configuring a SQL Server DSN. For more information about the valid SQL Server-specific
keyword/value pairs for data source configuration attribute strings, visit this Microsoft
Web site .
Resolution
When configuring SQL connections, the only way to make the connection transparent
for the user is to set Trusted_Connection to Yes. Otherwise, the user will be prompted
for credentials when trying to connect. You must also ensure that attributes not listed in
the above MSDN link, including username and password, are left blank (not configured)
within the policy when configuring SQL connections.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that Event ID 1053 is logged when you use
the Gpupdate /force command, or you restart a domain controller.
Symptoms
When you use the Gpupdate /force command on a Microsoft Windows Server 2003-
based domain controller, or you restart a Windows Server 2003-based domain
controller, the following error message may be logged in the Application log:
Additionally, if you enable USERENV logging, the following entries may be logged in the
Userenv.log file:
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base: 322756 How to back up and restore the registry in Windows
To resolve this problem, add the MaxTokenSize registry entry and the MaxUserPort
registry entry on the affected domain controllers. To do this, follow these steps:
1. Click Start, click Run, type regedit, and then click OK.
7 Note
If the Parameters key is not available, you must create it. To create the
Parameters key, follow these steps:
a. Click the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\Kerberos
3. Click the Parameters key, click New on the Edit Menu, and then click DWORD
Value.
6. In the Value data box, type 65535, click Decimal, and then click OK.
9. In the Value data box, type a value between 5000 and 65534, click Decimal, and
then click OK.
7 Note
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that Events 1101 and 1030 are logged in
the Application log when applying Group Policy.
Applies to: Windows Server 2012 R2, Windows 10 - all editions, Windows 7 Service Pack
1
Original KB number: 909260
Symptoms
On a computer that is running Microsoft Windows XP or newer you may experience the
following Error event entries in the Application log: If you enable user environment or
GPSVC debug logging, the following entries are logged:
7 Note
In these entries, OUName is the parent organizational unit (OU) of the user account
or of a computer object.
Cause
This problem occurs because the Group Policy engine in Windows XP Professional and
newer does not have read permissions to the following attributes of the parent OUs:
In Microsoft Windows 2000 Server, the events that are described in the "Symptoms"
section are not logged. The Group Policy engine in Windows 2000 Server then ignores
the Group Policy settings that are linked to the OU. Windows XP was changed to not
ignore this error.
By default, access to all OUs is granted according to an access control entry in the
default security descriptor. This security descriptor is part of the schema that enables the
Authenticated Users group to read all the properties.
Resolution
To resolve this problem, grant sufficient permissions to access the parent OUs to all the
user accounts and to all the computers that apply Group Policy settings through the
OUs.
When you then restart the application showing ACL Editor, the attribute should be
visible.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
Symptoms
The Application log on Windows Server 2008 R2 domain controllers contains Event ID
1202 with status code "0x534: No mapping between account names and security IDs
was done" every time security policy is applied. The relevant part of the Event ID 1202 is
shown below:
Error 0x534 occurs when a user account in one or more Group Policy objects (GPOs)
could not be resolved to a SID. This error is possibly caused by a mistyped or
deleted user account referenced in either the User Rights or Restricted Groups
branch of a GPO. To resolve this event, contact an administrator in the domain to
perform the following actions:
...
Configure S-1-1-0.
Configure S-1-5-11.
Configure S-1-5-32-554.
Configure S-1-5-32-548.
Configure S-1-5-32-550.
Configure S-1-5-9.
Configure WdiServiceHost.
Error 1332: No mapping between account names and security IDs was done.
Cannot find WdiServiceHost.
Configure S-1-5-21-2125830507-553053660-2246957542-519.
add SeTimeZonePrivilege.
User Rights configuration was completed with one or more errors. ...
By default, the GPTMPL.INF policy in the Default Domain Controllers Policy looks like
this:
SeSystemProfilePrivilege = *S-1-5-80-3139157870-2983391045-3678747466-
658725712-1809340420,*S-1-5-32-544
Once an unrelated security setting is modified in the Default Domain Controllers Policy,
the SeSystemProfilePrivilege entry in Default Domain Controllers Policy appears as
below:
SeSystemProfilePrivilege = *S-1-5-32-544,WdiServiceHost
For more information, see SceCli 1202 events are logged every time Computer Group
Policy settings are refreshed on a computer that is running Windows Server 2008 R2 or
Windows 7 .
Cause
When modifying any security setting in the Default Domain Controllers Policy using the
Group Policy Management Console (GPMC) from the console of a Windows Server 2008
R2 domain controller, GPMC incorrectly translates the SID for the Wdiservice account in
the policy to a user name that isn't recognized by the local machines where the policy is
enforced. This issue also occurs when a Windows 7 or Windows Server 2008 R2 member
computer modifies any security setting in the Default Domain Controllers Policy on a
Windows Server 2008 R2 domain controller.
Workaround
As a temporary workaround, manually edit the GPTMPL.INF file by adding the NT
Service\ prefix in front of the wdiservicehost account name for the Profile System
Performance user right in the Default Domain Controllers Policy. Which has to be done
every time any security setting in the Default Domain Controllers Policy is administered
with GPMC.
This step will prevent the 1202 event from being logged until the next time security
policy is modified in the Default Domain Controllers Policy by the relevant operating
system versions.
1. Open the GPTTMPL.INF file for the Default Domain Controllers Policy of a domain
controller logging the Event ID 1202. The path to the GPTTMPL.INF file when
SYSVOL is located below %SystemRoot% is:
%SystemRoot%\Sysvol\domain\Policies\{6AC1786C-016F-11D2-945F-
00C04fB984F9}\MACHINE\Microsoft\Windows NT\SecEdit\GPTTMPL.INF
7 Note
NT Service\ should appear after the "," delimiter. Don't prefix NT Service\
with the "*" character.
5. View the Application log to see if an Event ID 1202 with status code 0x534 was
logged. If so, review the WINLOGON.LOG to see if the event was caused by the
WdiServiceHost security principal.
More information
In the Default Domain Controllers Policy on a Windows Server 2008 R2 domain
controller, the SID for the Diagnostics Service Host (wdiservicehost) account is granted
the SeSystemProfilePrivilege where it's added to the local SAM of the machine, picked
up by SCE, then added to the GPTTMPL.INF.
When any security setting is modified in the Default Domain Controllers Policy on a
Windows Server 2008 domain controller, a code defect causes the SID for the
Wdiservicehost account to be replaced with its SAM account but fails to add the NT
Service\ prefix required by SCECLI to resolve the account's name. (that is, NT
Service\Wdiservicehost).
1. The issue described in this policy occurs when the Group Policy Management
Editor on Windows 7 or Windows Server 2008 R2 computers is used to modify
security settings in Default Domain Controllers Policy on a Windows Server 2008
domain controller.
2. This issue doesn't occur when security policy is modified in policies other than
Default Domain Controllers Policy.
3. Despite the logging of the Event ID 1202 with status code 0x534, this issue doesn't
prevent Windows computers from applying security policy contained in the Default
Domain Controllers Policy. However, there's no way to distinguish a false positive
event caused by this issue from a legitimate misconfiguration that will prevent
security policy from applying, identified by the same Event ID 1202 and 0x534
status code.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
Provide product feedback
Group Policy error: "The given Key was
not present in the dictionary"
Article • 12/26/2023
This article provides a solution to a Group Policy error (The given Key was not present in
the dictionary) that occurs when you run the Group Policy Modeling Wizard against a
new Group Policy setting.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1
Original KB number: 2692409
Symptoms
Consider the following scenario:
You create a new Group Policy setting and configure some registry items under
Preferences (user or Computer). To do this, you use the registry wizard to add
keys or values to the registry. For example, under Computer
configuration\Preferences\Registry , you right-click and then select New ->
Registry Wizard. This opens a user interface that enables you to manipulate
registry items.
On Windows Server 2008 R2 and Windows Server 2008, you run the Group Policy
Modeling Wizard against the new Group Policy setting. In this scenario, you
experience one of the following symptoms, depending on your version of Internet
Explorer:
In Internet Explorer 8, you receive the following error message and error code
80131577: An error occurred while generating report. The given Key was not
present in the dictionary
In Internet Explorer 9, the wizard runs but does not report any registry settings.
Additionally, the Registry Preferences section is empty.
Cause
There is a faulty registry item in the XML file that is associated with the Group Policy
registry settings.
Resolution
To fix this issue, re-create the Group Policy and registry settings. However, while you are
using the registry browser to select values in a registry key, do not select the parent key
together with the values in it. The parent key is autoselected. This is, when you select a
value in a key, a red tick appears automatically on the parent key folder. It is not
necessary also to select the parent key.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article helps fix an issue that prevents User Profiles and folder redirection policies
from working in Microsoft System Center Configuration Manager (SCCM).
Symptoms
Computers running Windows 8 and later versions may not apply User Profiles and
Folder Redirection Group Policy objects (GPOs) as expected. This issue can occur if the
computers are domain clients and are managed by System Center 2012 Configuration
Manager Service Pack 1 (ConfigMgr 2012 SP1) or later.
Resolution
To work around this issue, disable the Enable User Data and Profiles device setting in
the System Center 2012 Configuration Manager console.
For more information, see Create user data and profiles configuration items in
Configuration Manager.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article helps avoid Group Policy error events that are logged when unknown
environment variable is used.
Symptoms
If you are running an Active Directory forest and using a file system security policy, you
may see the following events logged:
Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2
will log this event to the Group Policy operational log:
All Windows version will log this event in the Application log:
Cause
The events are logged because the file system security settings of one policy contain an
environment variable that is unknown on the client computer. To find out more about
the problem, enable logging of the security configuration client-side extension:
Resolution
To avoid the problem, create a new policy at the same level that receives the settings
referencing the missing environment variable. Then use a WMI filter to allow the policy
to only apply to machines that have the environment variable defined.
More information
This section explains why in some cases the policy settings apply successfully, but in
other cases they do not.
Security group policy is driven by the Userenv.dll library running within the
Winlogon.exe process, or on Windows Vista and later, the Group Policy Service (GPSvc).
This is the component that gets the list of policies that are assigned to the machine, and
filters out the ones that do not apply. They may be filtered based on the permissions on
the policy or a WMI filter.
Userenv/GPSvc then sorts the policies based on their priority. The first policy applied is
the one with the lowest priority, the last one is the one with the highest priority. For
security policy, Userenv/GPSvc calls the security policy client-side extension (SCECLI)
with the policy settings file downloaded from SYSVOL.
SCECLI has two phases. In the first phase, it takes the settings passed to it and feeds
them into the security database. The second phase is applying these settings to the
system, for example, set user rights, security options or set security descriptors on the
registry and files.
The first phase is active until the last policy is being processed. The call from
Userenv/GPSvc to SCECLI for the last policy is a special case. When the call is made, the
first phase is still active and the settings from the last policy are read into the security
database as with all other policies. But before the call returns, SCECLI sees that this is the
last policy and, within the same call, executes the second phase.
The settings for registry and file system policy are deemed to be expensive to commit,
SCECLI does not execute them in the calling thread in foreground mode. For these
settings, Userenv/GPSvc would create an additional thread so processing can complete
while the user can already logon. Domain controllers are an exception to this rule. They
would always first complete all security policy application before the user can logon.
With regard to missing environment variables, SCECLI reads the settings in the first
phase and encounters an error when it resolves the environment variable to the actual
path. SCECLI will skip the entry and continue adding settings to the security database
and later return an error to Userenv/GPSVC.
When the problem happens in any policy except the last policy, Userenv/GPSVC treats
the error as a fatal problem and aborts security group policy. Therefore the second
phase is never happening. When the problem happens in the last policy, SCECLI ignores
the error and executes the second phase. Userenv/GPSVC still aborts policy application
with an error, but actually policy processing has been completed by this point.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article helps fix an issue in which Group Policy fails to apply because the Specify
startup policy processing wait time group policy value isn't honored.
Group Policy fails to apply during system startup because the default value of the
Specify startup policy processing wait time group policy isn't honored.
This issue occurs because the Specify startup policy processing wait time group policy
isn't configured. If the group policy isn't configured, the Group Policy Service will
retrieve the wait time-out from the following registry values:
HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\History\AvgWaitTimeoutAtStartup
HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\History\CurrentWaitAtStartup
In this case, the time-out is miscalculated, and the Group Policy Service doesn't wait for
the default 30 seconds for the network to be available.
To work around this issue, configure the Specify startup policy processing wait time
group policy in Computer Configuration\Administrative Templates\System\Group policy\
with the desired value.
ノ Expand table
Products Updates
Windows 11, version 22H2 August 22, 2023—KB5029351 (OS Build 22621.2215)
Windows 11, version 21H2 August 22, 2023—KB5029332 (OS Build 22000.2360)
Windows 10, version 22H2 August 22, 2023—KB5029331 (OS Build 19045.3393)
Windows 10 Enterprise LTSC 2019 September 12, 2023—KB5030214 (OS Build 17763.4851)
Windows 10 IoT Enterprise LTSC
2019
Windows 10 IoT Core 2019
Windows Server 2019
Feedback
Was this page helpful? Yes No
This article provides a resolution to an issue where Group policy with WMI filters can be
denied or cause slow logon/boot.
Symptoms
Group policy with WMI filter fails to apply. The WMI query (WMI filter linked to a GPO)
times out due to which the GPO does not apply to the computers, intermittently.
Cause
WMI filtering was taking time while being processed. It was trying to enumerate all the
domain names as query used was:
SQL
SQL
After you apply a WMI filter, the GPO does not take effect on a client computer that is
running Windows 7 or Windows Server 2008 R2
More information
Timeout for WMI queries:
Per-Vista = None
Vista onwards = 30 seconds (hardcoded)
In one of the cases, it was informed that removing customized security filtering from the
GPO (that has WMI filter configured) resolved the issue, however, it has not been tested
or verified.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
User Experience issues.
Feedback
Was this page helpful? Yes No
This article helps resolve the error "LDAP Bind function call failed" that occurs when
updating Group Policy settings.
When you use the gpupdate command to update Group Policy settings, you receive the
following error:
Output
C:\Windows\system32>gpupdate
Updating policy...
Computer policy could not be updated successfully. The following errors were
encountered:
The processing of Group Policy failed because of lack of network
connectivity to a domain controller. This may be a transient condition. A
success message would be generated once the machine gets connected to the
domain controller and Group Policy has successfully processed. If you do not
see a success message for several hours, then contact your administrator.
User Policy could not be updated successfully. The following errors were
encountered: The processing of Group Policy failed. Windows could not
authenticate the Active Directory service on a domain controller. (LDAP Bind
function call failed). Look in the details tab for error code and
description.
On the domain controller, the default principles are missing for the SeNetworkLogonRight
user right associated with the Access this computer from the network Group Policy
setting. That policy is under Computer Configuration > Windows Settings > Security
Settings > Local Policies > User Rights Assignment in the Local Group Policy Editor.
In this scenario, the default domain policy is enforced over the default domain controller
policy. Then, the default domain policy shows an incorrect user right assignment for the
Access this computer from the network Group Policy setting.
To resolve this issue, make sure that the appropriate principles are added and that the
settings are effective on the domain controller, as described in Access this computer
from the network - security policy setting. Then, restart the domain controller.
Feedback
Was this page helpful? Yes No
This article helps fix an issue that triggers an error when the central store contains the
.admx files from Windows 10.
Applies to: Windows 10 - all editions, Windows Server 2012 R2, Windows Server 2016,
Windows Server 2019
Original KB number: 3077013
Symptoms
Consider the following scenarios.
Scenario 1:
Scenario 2:
Administrative Templates
Dialog Message text Namespace
'Microsoft.Policies.Sensors.WindowsLocationProvider' is already defined as the
target namespace for another file in the store.
File
\\<forest.root>\SysVol\<forest.root>\Policies\PolicyDefinitions\Microsoft-Windows-
Geolocation-WLPAdm.admx, line 5, column 110
7 Note
For example, the error message resembles the message in the following screenshot:
7 Note
You may not notice this issue if you are upgrading from Windows 7 or Windows 8.1
to Windows 10 version 1511 (skipping Windows 10 RTM).
Cause
This issue occurs because the LocationProviderADM.admx file was renamed as
Microsoft-Windows-Geolocation-WLPAdm.admx in Windows 10 RTM.
Scenario 1
After you copy the .admx files from Windows 10 to a central store that contains a
LocationProviderADM.ADMX file that's from an earlier release of Windows, there
are two .admx files that contain the same settings but that have different names.
This triggers the "namespace is already defined" error.
Scenario 2
When you upgrade from Windows 10 RTM to Windows 10 version 1511, the new
LocationProviderAdm.admx file is copied to the folder while still keeping the old
Microsoft-Windows-Geolocation-WLPAdm.admx file. Therefore, there are two
ADMX files that address the same policy namespace.
Workaround
Method 1
Click OK to ignore the error message. The error message is informational, and the
Group Policy setting works as expected.
Method 2
Scenario 1:
Scenario 2:
DMX and ADML files are system-protected. To rename or delete these files, you must
add NTFS permissions to the files. To do this, use the following commands:
3. Rename both files with an extension of .old, and you'll no longer receive the
Geolocation pop-ups when you open GPEDIT.MSC.
More information
There's only a single line of difference between the contents of the pre-Windows 10
LocationProviderADM.admx file and the Windows 10 Microsoft-Windows-Geolocation-
WLPAdm.admx file.
XML
<supportedOn ref="windows:SUPPORTED_Windows8"/>
XML
<supportedOn ref="windows:SUPPORTED_Windows8_Or_Windows_6_3_Only"/>
This error occurs when you click the Policy node under Computer Configuration or User
Configuration.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful?
Yes No
This article solves the Netlogon event ID 5719 or Group Policy event 1129 that's logged
when you start a domain member.
Symptoms
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
You have a computer that's running Windows 10 or Windows Server 2012 R2.
The computer is joined to a domain.
One of these conditions is true:
The computer has a Gigabit network adapter installed.
You secure the network access by using Network Access Protection (NAP),
network authentication (by using 802.1x), or another method.
In this scenario, the following event is logged in the System log when you start the
computer in Windows 8.1 and earlier versions. In Windows 10 and later versions, event
5719 is no longer logged in this situation. The following lines are recorded in
Netlogon.log instead:
Output
Output
On Windows 10 and later versions, you'll see only events by components, depending on
the Domain Controller connectivity (such as Group Policy). The following entries are
recorded in the group policy debug log:
Output
CGPApplicationService::MachinePolicyStartedWaitingOnNetwork.
CGPMachineStartupConnectivity::CalculateWaitTimeoutFromHistory: Average is
388.
CGPMachineStartupConnectivity::CalculateWaitTimeoutFromHistory: Current is
-1.
CGPMachineStartupConnectivity::CalculateWaitTimeoutFromHistory: Taking min
of 776 and 30000.
Waiting for SamSs with timeout 776
The first section shows the calculation for the time-out to use to bring up the network. It
can be based on previous fast startups.
The second section shows that Network Location Awareness (NLA) fails to report a
working network within the wait interval that's allowed, and group policy startup
processing fails. The third section shows that the Group Policy engine starts a
background procedure, and then waits for one minute after a network becomes
available.
Cause
This issue may occur for any of these reasons:
The Netlogon service starts before the network is ready. The network stack and
adapter initialization often start at about the same time. Some network adapters
and switches have link arbitration and MAC address uniqueness checks that take
longer to complete than the wait time that is set for Netlogon to detect network
connectivity.
Solutions that verify the health of the new network member delay the network
connection and your ability to access domain controllers. If you have an automatic
Direct Access channel connection enabled, it may also require more time to do
than Netlogon allows.
The 802.1X authentication process delays connections to the domain controllers.
The client experiences a delay to retrieve an IP address from the DHCP server. It
delays the display of the network interface.
Group Policy in Windows Vista and later versions is written to negotiate the network
status that has NLA enabled. And it waits for a network that has DC connectivity.
However, Group Policy may start prematurely because of a policy application. This
situation is especially true when the delay in finding a network alternates between
startups.
2 Warning
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall the operating system. Microsoft cannot guarantee that these problems can
be solved. Modify the registry at your own risk.
Resolution 1
To resolve this issue, install the most current driver for the Gigabit network adapter. Or,
enable the PortFast option on the network switches.
Resolution 2
To resolve this issue, use the registry to change the related settings that affect DC
connectivity. To do it, use the following methods.
Method 1
Adjust the firewall settings or IPSEC policies that are changed to allow DC connectivity.
These changes are made when the client receives an IP address but requires more time
to access a domain controller, for example, after a successful verification through Cisco
NAC or Microsoft NPS Services.
Method 2
Configure the Netlogon registry setting to a value that is safely beyond the time that is
required allow DC connectivity.
7 Note
This is only effective if the machine already has an IP address. This applies to
scenarios where a NAP solution puts the machine into a quarantine network. Use
the following settings as guidelines.
Registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
Value Name: ExpectedDialupDelay
Data Type: REG_DWORD
Data Value is in seconds (default= 0 )
Data Range is between 0 and 600 seconds (10 minutes)
For more information, see Settings for minimizing periodic WAN traffic .
Method 3
The IP stack tries to verify the IP address using an ARP broadcast. It delays the time that
the IP takes to come online. You can set the ArpRetryCount registry entry to one (1), so
the wait for uniqueness is shortened. To do it, follow these steps:
3. On the Edit menu, point to New, and then select DWORD Value.
4. Type ArpRetryCount.
5. Right-click the ArpRetryCount registry entry, and then select Modify.
7 Note
Method 4
Reduce the Netlogon negative cache period by changing the NegativeCachePeriod
registry entry in the following subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\NegativeCa
chePeriod
After you make this change, the Netlogon service doesn't behave as if the domain
controllers are offline for 45 seconds. The event 5719 is still logged. However, the event
doesn't cause any other significant problems. This setting allows member to try domain
controllers earlier if the process failed previously.
Suggestion: Try to set a low value, such as three seconds. In LAN environments, you can
use a value of 0 to turn off the negative cache.
For more information about this setting, see Settings for minimizing periodic WAN
traffic .
Method 5
Configure the Kerberos registry setting to a value that is safely beyond the time that is
required allow DC connectivity. Use the following settings as guidelines.
7 Note
This setting applies only to Windows XP and Windows Server 2003 or earlier
versions of these systems. Windows Vista and Windows Server 2008 and later
versions use a default value of 0. This value turns off User Datagram Protocol (UDP)
functionality for the Kerberos client.
Registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\Kerberos\Parameter
s
Value name: MaxPacketSize
Data Type: REG_DWORD
Value Data: 1
Default: (depends on the system version)
For more information, see How to force Kerberos to use TCP instead of UDP in
Windows .
Method 6
Disable media sense for TCP/IP by adding the following value to the Tcpip registry
subkey:
Registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
Value Name: DisableDHCPMediaSense
Data Type: REG_DWORD
Value Data: 1
Value Range: Boolean ( 0 =False, 1 =True)
Default: 0 (False)
For more information, see How to disable the Media Sensing feature for TCP/IP in
Windows .
Method 7
Group Policy has policy settings to control the wait time for startup policy processing:
The time it takes Netlogon to acquire a working IP can be the basis for the setting. For
Direct Access scenarios, you can measure the typical delay your user base has until the
connection is established.
Method 8
If DisabledComponents registry setting is in place and has an incorrect value of 0xfffffff,
either delete the key or change it to the intended value of 0xff.
) Important
Internet Protocol version 6 (IPv6) is a mandatory part of Windows Vista and later
versions of Windows. We do not recommend that you disable IPv6 or its
components. If you do, some Windows components may not function. Additionally,
system startup will be delayed for five seconds if IPv6 is disabled incorrectly by
setting the DisabledComponents registry setting to a value of 0xfffffff. The correct
value is 0xff.
Method 9
The behavior may be caused by a race condition between network initialization, locating
a Domain Controller and processing Group Policy. If the network isn't available, a
Domain Controller won't be located, and Group Policy processing will fail. Once the
operating system has loaded and a network link is negotiated and established,
background refresh of Group Policy will succeed.
You can set a registry value to delay the application of Group Policy:
3. On the Edit menu, point to New, and then select DWORD Value.
4. Type GpNetworkStartTimeoutPolicyValue.
7. In the Value data box, type 60, and then select OK.
9. If the Group Policy startup script doesn't run, increase the value of the
GpNetworkStartTimeoutPolicyValue registry entry.
More information
If you can log on to the domain without a problem, you can safely ignore event ID 5719.
Because the Netlogon service may start before the network is ready, the computer may
be unable to locate the logon domain controller. Therefore, event ID 5719 is logged.
After the network is ready, the computer will try again to locate the logon domain
controller. In this situation, the operation should be successful.
Output
Similar errors might be reported by other components that require Domain Controller
connectivity to function correctly. For example, the Group Policy may not be applied at
system startup. In this case, startup scripts don't run. The Group Policy failures may be
related to the failure of Netlogon to locate a domain controller. You can set Group
Policy to be more responsive to late network connectivity arrival.
Feedback
Was this page helpful? Yes No
This article helps resolve the issue in which the network disconnects after configuring
the LLTDIO and RSPNDR group policy objects.
After you configure the LLTDIO and RSPNDR group policy objects (GPOs) and set the
NoGPOListChanges subkey value to apply group policies even if the objects haven't
changed, your network is disconnected. This issue typically occurs after a group policy
update. The disconnection may also cause the following issues:
This is a design limitation. The LLTDIO and RSPNDR-related policies are changed in the
registry. To reapply the policies, the two protocols (the Mapper I/O network protocol
and the Responder network protocol) need to re-bind on the network interface card
(NIC). This action requires an automatic restart of the NIC, which leads to the disruption
of the network connectivity.
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which the Delete user profiles older than a
specified number of days on system restart Group Policy is applied but doesn't take
effect.
The Delete user profiles older than a specified number of days on system restart
Group Policy is under Computer Configuration > Administrative Templates > System >
User Profiles in either the Local Group Policy Editor or some Group Policy Objects
(GPOs). After it's applied, it fails to delete user profiles older than the number of days
specified in the GPO.
This issue occurs because the related settings configured in Windows Management
Instrumentation (WMI) take precedence over the GPO settings. The settings in WMI can
come from either Microsoft System Center Configuration Manager (SCCM) compliance
settings or third-party applications.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\UserState\UserStateTec
hnologies\ConfigurationControls
ノ Expand table
If they aren't controlled by SCCM but by some third-party application, contact the
vendor for how to disable the settings.
For more information, see Create user data and profiles configuration items in
Configuration Manager.
Feedback
Was this page helpful? Yes No
This article helps solve an issue where the changes aren't applied as expected when you
change the password policy.
Symptoms
When you change the password policy, the changes are not applied as expected.
Cause
This issue can occur in either of the following scenarios:
Resolution
To resolve this issue, disable the Block Policy Inheritance option on the Domain
Controllers organizational unit:
Status
This behavior is by design.
More information
In Windows 2000, password policies are read-only at the domain level. The policy must
be applied to the domain controllers for the policy to be applied. If you initiate a
password change for a domain password from anywhere in the domain, the change
actually occurs on a domain controller.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article describes the behavior where the Set roaming profile path for all users
logging onto this computer Group Policy setting applies to all user accounts including
local user accounts because Group Policy will override the local computer policy.
Symptoms
You apply the Set roaming profile path for all users logging onto this computer Group
Policy setting in a domain for member servers. In this case, the Group Policy setting
applies to all user accounts, and this includes the local user accounts.
Cause
This behavior is expected because the Set roaming profile path for all users logging
onto this computer Group Policy setting is present under the Computer Configuration
node in Group Policy. Even if you specify a local computer policy, Group Policy overrides
the local computer policy. So the Group Policy setting applies to all users, and this
includes the local users.
More information
) Important
Consider the following scenario. You set up a profile on a member server. The
profile includes some important settings. In this scenario, if you apply the Set
roaming profile path for all users logging onto this computer Group Policy setting,
you lose your current profile. Additionally, you are assigned a default temporary
profile.
This behavior occurs because the Group Policy setting sets a roaming profile for all users
even though the users are local to the member server. In the Windows registry, a
registry value that is named CentralProfile in the following registry subkey is used to set
the share path of the roaming profile that is mentioned in the Group Policy for local
users:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\
<userSID>\CentralProfile
7 Note
The <userSID> placeholder specifies the security identifier (SID) of the user.
So you're assigned a default temporary profile because you don't have access to the
remote share.
The following roaming profile policy settings are currently available in Windows Server:
By default, RDS stores all user profiles locally on the RDS server. You can use the Set
path for Remote Desktop Services Roaming User Profile Group Policy setting to specify
a network share where user profiles can be centrally stored. When profiles are centrally
stored, users can access the same profile for sessions on all RDS servers that are
configured to use the network share for user profiles.
7 Note
The roaming user profiles that are enabled by the Set path for Remote
Desktop Services Roaming User Profile Group Policy setting apply only to
RDS connections. You may also have a Windows roaming user profile that is
configured. The RDS roaming user profile always takes precedence in a RDS
session.
If you configure the Set path for Remote Desktop Services Roaming User
Profile Group Policy setting, each user who logs on by using a RDS session
uses the path that is specified as the roaming profile location.
Set roaming profile path for all users logging onto this
computer
To use the Set roaming profile path for all users logging onto this computer Group
Policy setting, type the path of the network share in the following form:
\\Computername\Sharename\
If you enable the Set roaming profile path for all users logging onto this computer
Group Policy setting, all users who log on to the computer use the roaming profile path
that is specified in the Group Policy setting. This behavior is by design.
7 Note
You have to make sure that you have set the appropriate security on the
folder to let all users access the profile.
If you use a local user account, the profile path may fail because of lack of
permissions.
There are four ways to configure a roaming profile for a user. Windows reads
profile configuration in the following order, and Windows uses the first
configured setting that it reads:
The RDS roaming profile path that is specified by RDS policy
The RDS roaming profile path that is specified by the user object
A per-computer roaming profile path that is specified in the Set roaming
profile path for all users logging onto this computer Group Policy setting
A per-user roaming profile path that is specified in the user object
If you configure the Set roaming profile path for all users logging onto this
computer Group Policy setting, each user who logs on to the member server
uses the path that is specified as the roaming profile location.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that folder redirection settings are being
applied from the Group Policy settings that are deployed to the user's computer even
though you turn on loopback processing in Group Policy.
Symptoms
When you turn on loopback processing in Group Policy, you may notice that folder
redirection settings are being applied from the Group Policy settings that are deployed
to the user's computer. All the settings that are configured by the loopback policy take
effect except the folder redirection settings.
You notice this problem only when a user already has a Group Policy setting for folder
redirection, and you try to turn on loopback processing on his or her computer. You do
not notice this problem when users have a Group Policy setting applied for folder
redirection, they have loopback processing turned on at the same time, and that
loopback processing is being turned on for the first time.
Cause
This problem occurs when you turn on loopback processing with Replace mode in
Group Policy, but you do not configure any folder redirection settings for that policy.
When you do not configure any folder redirection settings, the default setting for folder
redirection folders, such as the My Documents folder, is No Administrative policy
specified. This setting does not remove or turn off the folder redirection feature if it is
turned on for the user by another Group Policy setting.
Resolution
To resolve this problem, configure the folder redirection settings for the Group Policy
setting.
This points the My Documents folder to the user local profile My Documents folder
path. You can turn on or turn off the Move the contents of My Documents to new
location setting, depending on whether you want to move the copy of the My
Documents folder from the server share.
7 Note
When the Move the contents of My Documents to new location setting is turned
on, the contents of the My Documents folder are redirected every time the user
switches from the computer that is affected by the loopback policy to another
computer. By turning off this setting, you avoid this.
More information
Organizations that use software distribution and folder redirection Group Policy settings
may not want to use those settings for users who have slow Internet connections. Such
organizations can turn on loopback processing so that users have two different Group
Policy settings applied, based on the computer that they use to log on to the network.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where some Group Policy areas are missing
from the Group Policy Editor.
Symptoms
When you open the Group Policy Editor MMC snap-in tool, and focus on a local GPO or
Active Directory-based one, some Group Policy areas that are expected to appear may
not be found. These missing policy areas are different than the ones that are normally
missing when you're focused on a local GPO.
Cause
Each area of policy functionality is implemented by an MMC snap-in DLL that is
registered by default on a standard Windows 2000, 2003 or XP installation. Occasionally
those DLLs can be un-registered or removed and when that happens, the underlying
group policy editing functionality they implement will not appear in the Group Policy
editor UI.
Resolution
To resolve this issue, re-register the appropriate MMC snap-in DLL that implements the
missing functionality by issuing the following command at a Windows command
prompt
Console
By default, all of the Group Policy related MMC snap-in DLLs can be found in
%systemroot%\system32.
The following lists the default Group Policy snap-in DLLs that you can re-register:
Administrative Templates and Scripts: gptext.dll
Folder Redirection: fde.dll
Internet Explorer Maintenance: ieaksie.dll
IP Security: ipsecsnp.dll
Public Key and Software Restriction: certmgr.dll
Remote Installation Services: rigpsnap.dll
Security: wsecedit.dll
Software Installation: appmgr.dll
More information
When you focus on the local GPO with the MMC Group Policy Editor snap-in, it is
normal that some policy areas that you would normally see when editing an Active
Directory-based GPO are not present. This is expected behavior because the local GPO
only supports a subset of the features in an Active Directory-based GPO. However,
sometimes even when focused on Active Directory-based GPOs, some policy areas that
should be present are missing. In that case, the most likely cause is missing registrations
for the MMC snap-in DLLs that implement that functionality, and by re-registering the
missing DLL and restarting the Group Policy Editor, the problem can be resolved.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Microsoft corporation and/or its respective suppliers make no representations about the
suitability, reliability, or accuracy of the information and related graphics contained
herein. All such information and related graphics are provided "as is" without warranty
of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and
conditions with regard to this information and related graphics, including all implied
warranties and conditions of merchantability, fitness for a particular purpose,
workmanlike effort, title and non-infringement. You specifically agree that in no event
shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental,
special, consequential damages or any damages whatsoever including, without
limitation, damages for loss of use, data or profits, arising out of or in any way
connected with the use of or inability to use the information and related graphics
contained herein, whether based on contract, tort, negligence, strict liability or
otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of
damages.
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix common Active
This guide provides you with the fundamental concepts used to troubleshoot Group
Policy. You'll learn:
Troubleshooting checklist
1. Start by reading Group Policy events recorded in the system event log.
Warning events provide further information for you to follow to ensure the
Group Policy service remains healthy.
Error events provide you with information that describes the failure and
probable causes.
Use the More Information link included in the event message.
Use the Details tab to view error codes and descriptions.
Refreshing Group Policy changes the Activity ID in your custom view. Make sure to
update your custom view with the most current Activity ID when troubleshooting.
Use the following procedure to create a custom view of a Group Policy instance. You do
this by using an Event Viewer query. This query creates a filtered view of the Group
Policy operational log for a specific instance of Group Policy processing.
3. Select the XML tab, and then check the Edit query manually check box. The Event
Viewer displays a dialog box explaining that manually editing a query prevents you
from modifying the query using the Filter tab. Select Yes.
4. Copy the Event Viewer query (provided at the end of this step) to the clipboard.
Paste the query into the Query box.
HERE}']</Select></Query></QueryList>
5. Copy the ActivityID you previously saved from the Determine the instance of
Group Policy processing section to the clipboard. In the Query box, highlight
"INSERT ACTIVITY ID HERE" and then press Ctrl+V to paste the ActivityID over the
text.
7 Note
Be sure not to paste over the leading and trailing braces ({ }). You must
include these braces for your query to work properly.
6. In the Save Filter to Custom View dialog box, type a name and description
meaningful to the view you created. Select OK.
7. The name of the saved view appears under Custom Views. Select the name of the
saved view to display its events in the Event Viewer.
) Important
The Group Policy service assigns a unique ActivityID for each instance of policy
processing. For example, the Group Policy service assigns a unique ActivityID when
user policy processing occurs during user logon. When Group Policy refreshes, the
Group Policy service assigns another unique ActivityID to the instance of Group
Policy responsible for refreshing user policy.
Make sure the group policy has all the settings you're looking for and it's correctly
linked. Below are the tabs that you have to go through. If all of them look good, go to
the problematic client machine.
Console
gpresult /h gp.html
2. Verify the gpresult output you have captured and look for the GPO you're having
issues with. It will give an error about why the GPO isn't getting applied.
3. If you have an error in the gpresult output, we can troubleshoot the issue based
on it. Otherwise, go to the next step.
4. Open the Event Viewer and browse to application and system event logs. The
application event log will give you the details on why the group policy update fails
positively.
5. Open the operational event log for more detailed information. There are events
with the list of applied GPOs and a list of denied GPOs with the reason.
Most of the GPO issues can be resolved by using these basic logs.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion
5. Right-click the Diagnostics subkey, select New > DWORD (32-bit) Value.
8. In the Value data box, type 30002 (Hexadecimal), and then select OK.
7 Note
If the usermode folder does not exist, create it under %windir%\debug. If the
usermode folder does not exist under %WINDIR%\debug\, the gpsvc.log file will not
be created.
Event ID 1129
Event ID 1129 is logged when the Group Policy fails to apply due to network
connectivity issues.
In this case, the connectivity to Lightweight Directory Access Protocol (LDAP) port 389 is
blocked on DC. The gpupdate command fails with the following error:
When checking the event log, you may find the following event description:
Output
In this case, enable the gpsvc debug log. In the gpsvc log, you may find the output
"GetLdapHandle: Failed to connect <DC> with 81".
Event ID 1002
Here's the description of Event ID 1002:
Output
This error event is usually resolved when the computer returns from a low-resource
state. Possible resolutions include:
Event ID 1006
Here's the description of Event ID 1006:
Output
The processing of Group Policy failed. Windows could not authenticate to the
Active Directory service on a domain controller. (LDAP Bind function call
failed). Look in the Details tab for error code and description.
This error event is usually resolved after correcting binding to the directory. The Group
Policy service logs an error code, which appears on the Details tab of the error message
in Event Viewer. The error code (displayed as a decimal) and error description fields
further identify the reason for the failure. Evaluate the error code with the list below:
This error code might indicate that the user doesn't have permission to access
Active Directory.
This error code might indicate that the DNS configuration is incorrect. To correct
timeout issues, use the nslookup tool to confirm _ldap._tcp.<domain-dns-name>
records are registered and point to correct servers (where <domain-dns-name> is
the fully qualified domain name of your Active Directory domain).
7 Note
These steps may have varying results if your network constrains or blocks
Internet Control Message Protocol (ICMP) packets.
Event ID 1030
Here's the description of Event ID 1030:
Output
Check if the LDAP ports are open. If not, then make sure the ports are open on the
firewall and locally on the client and the domain controller.
Use portqueryUI tool to determine which ports are blocked. For more information,
see How to use PortQry to troubleshoot Active Directory connectivity issues.
Use telnet for port 389 to check connectivity on the ldap port.
How to configure domain and trust ports.
Configuring the default outbound firewall behavior.
Configure firewall port requirements for Group Policy.
If a client can't resolve a host name, then it's best to verify the Host name
resolution sequence listed above that the client should be using. If the name
doesn't exist in any of the resources that the client uses, then you must decide
which resource to add it. If the name exists in one of the resources, such as a DNS
server or a Windows Internet Name Service (WINS) server, and the client isn't
resolving the name correctly, focus your attention on troubleshooting that specific
resource.
Also, confirm that the client is trying to resolve a host name and not a NetBIOS
name. Many applications have multiple methods that they can utilize to resolve
names. This is especially true of mail and database applications. The application
may be configured to connect to resources using NetBIOS. Depending on the
client configuration, the client may bypass host name resolution. From there, it will
be necessary to either change the connection type to TCP/IP sockets or
troubleshoot the problem as a NetBIOS issue.
Use the following Get-GPPermission PowerShell cmdlet to get the permission level for
all security principals on the specified GPO:
PowerShell
Event ID 1058
Here's the description of Event ID 1058:
Output
The processing of Group Policy failed. Windows attempted to read the file %9
from a domain controller and was not successful. Group Policy settings may
not be applied until this event is resolved. This issue may be transient and
could be caused by one or more of the following:
1. Name Resolution/Network Connectivity to the current domain controller.
2. File Replication Service Latency (a file created on another domain
controller has not replicated to the current domain controller).
3. The Distributed File System (DFS) client has been disabled.
Correct connectivity to the Group Policy template. The Group Policy service logs the
name of the domain controller and the error code, which appears on the Details tab of
the error message in Event Viewer. The error code (displayed as a decimal) and error
description fields further identify the reason for the failure. Evaluate the error code with
the list below:
This error code usually indicates that the client computer cannot find the path
specified in the event. To test client connectivity to the domain controller's sysvol:
1. Identify the domain controller used by the computer. The domain controller
name is logged in the details of the error event.
2. Identify if the failure happens during the user or computer processing. For
user policy processing, the User field of the event will show a valid user
name; for computer policy processing, the User field will show "SYSTEM".
4. Verify that you can read gpt.ini by using the full network path obtained in the
previous step. To do this, open a command prompt window and type
<file_path>, where <file_path> is the path constructed in the previous step,
and press Enter.
7 Note
You must run this command as the user or computer whose credentials
previously failed.
This error code usually indicates that the user or computer doesn't have the
appropriate permissions to access the path specified in the event. On the domain
controller, ensure the user and computer have appropriate permission to read the
path specified in the event. To test computer and user credentials:
1. Log off and restart the computer.
2. Log on the computer with the domain credentials previously used.
This error code usually indicates that the computer cannot resolve the name in the
provided network path. To test network path name resolution:
1. Identify the domain controller used by the computer. The name of the
domain controller is logged in the details of the error event.
2. Try to connect to the netlogon share on the domain controller using the path
\\<dcName>\netlogon where <dcName> is the name of the domain
controller in the error event.
Event ID 1053
Here's the description of Event ID 1053:
Output
The processing of Group Policy failed. Windows could not resolve the user
name. This could be caused by one or more of the following:
1. Name Resolution failure on the current domain controller.
2. Active Directory Replication Latency (an account created on another
domain controller has not replicated to the current domain controller).
The Group Policy service logs the name of the domain controller and the error code.
This information appears on the Details tab of the error message in Event Viewer. The
error code (displayed as a decimal) and error description fields further identify the
reason for the failure. Evaluate the error code with the list below:
Error code 5 (Access is denied): This error code might indicate that the user's
password expired while the user was still logged on the computer. If the user
recently changed their password, the issue might disappear after allowing time for
Active Directory replication to succeed.
This error code might indicate incorrect permissions on the organizational unit.
The user requires read access to the organizational unit that contains the user
object. Similarly, computers require read access to the organizational unit that
contains the computer object.
Error code 1355 (The specified domain either doesn't exist or couldn't be
contacted)
This error code might indicate a fault or improper configuration with name
resolution (DNS). Use nslookup to confirm you can resolve the addresses of the
domain controllers in the user domain.
Error code 1727 (The remote procedure call failed and didn't execute)
This error code might indicate that firewall rules are preventing communication
with a domain controller. If you have third-party firewall software installed, check
the configuration of the firewall or try temporarily disabling it and verifying that
Group Policy processes successfully.
Event ID 1097
Here's the description of Event ID 1097:
Output
The processing of Group Policy failed. Windows could not determine the
computer account to enforce Group Policy settings. This may be transient.
Group Policy settings, including computer configuration, will not be
enforced for this computer.
Verify that the time on the computer is synchronized with the time on the domain
controller.
Account for time zone misconfigurations if the computer is configured in a time
zone different from the domain controller.
A time difference greater than five minutes between the computer and the domain
controller may lead to the computer failing to authenticate with the domain. Force
time synchronization against time service using the w32tm /resync command.
Restart the computer.
ノ Expand table
4016 Informational The Group Policy service logs this event each time a Group Policy client-
side extension begins its processing.
5016 Success The Group Policy service logs this event when a Group Policy client-side
extension completes its processing successfully.
When you go to the Details tab under Event ID 5016, you may find the following return
status:
Output
7 Note
After you receive the return value 2147483658 from Event ID 5016, you can examine the
verbose level events of AuditCSE processing under the Security-Audit-Configuration-
Client > Operational event log. This information is useful to observe the processing of
Advanced Audit group policy settings and thus detect any failures/errors.
1. Audit Client Side Extension (Auditcse.dll) will process the Audit client side
extensions.
2. It has its own logging under Security-Audit-Configuration-Client > Operational
log.
Console
md %windir%\debug\usermode
2. Refresh local and AD-based Group Policy settings by using the gpupdate /force
command.
Tip
3. Save the Resultant Set of Policy (RSoP) report to an HTML file by running the
following command:
Console
gpresult /h %Temp%\GPResult.htm
4. Save the RSoP summary data to a txt file by running the following command:
Console
gpresult /r >%Temp%\GPResult.txt
Console
6. Export the system, application, and Group Policy operational event viewer logs by
running the following commands:
Console
%Temp%\Application.evtx
%Temp%\System.evtx
%Temp%\GroupPolicy.evtx
%Temp%\GPExtensions.reg
%Temp%\GPResult.txt
%Temp%\GPResult.html
%windir%\debug\usermode\gpsvc.log
8. When finished, you can stop Group Policy Service logging by running the following
command:
Console
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article describes how to use Group Policy to add the MaxTokenSize registry entry to
multiple computers.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1
Original KB number: 938118
Introduction
On a domain controller that is running Windows Server 2003, Windows Server 2008,
Windows Server 2008 R2, or Windows Server 2012, you can use Group Policy to add the
following registry entry to multiple computers:
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters
Entry: MaxTokenSize
Data type: REG_DWORD
Value: 48000
This article describes how to do it, so that you can push this setting to all members of
your domains easily. The process is different, depending on the version of Windows
Server that the domain controller is running.
7 Note
More information
How to configure MaxTokenSize by using Group Policy
Object (GPO) in Windows Server 2003
To add the registry entry to multiple computers in a domain that does not have a
Windows Server 2012-based domain controller, follow these steps:
1. Create an Administrative Template (ADM) file for the MaxTokenSize registry entry.
To do it, follow these steps:
a. Start Notepad.
b. Copy the following text, and then paste the text into Notepad:
CLASS MACHINE
CATEGORY !!KERB
KEYNAME "SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters"
POLICY !!MaxToken
VALUENAME "MaxTokenSize"
VALUEON NUMERIC 48000
VALUEOFF NUMERIC 0
END POLICY
END CATEGORY
[strings]
KERB="Kerberos Maximum Token Size"
MaxToken="Kerberos MaxTokenSize"
7 Note
The value of the MaxTokenSize registry entry is set to 48000. This is the
suggested value.
d. Exit Notepad.
2. Import the ADM into a GPO and set the MaxTokenSize registry entry to the desired
value. To do it, follow these steps:
a. Create a new Group Policy Object (GPO) that is linked at the domain level or
that is linked to the organizational unit (OU) that contains your computer
accounts. Or, select a GPO that is already deployed.
b. Open the Group Policy Object Editor. To do it, click Start, click Run, type
gpedit.msc, and then click OK.
d. On the Action menu, point to All Tasks, and then click Add/Remove Templates.
e. Click Add.
f. Click to select the MaxTokenSize.adm file that you created in step 1, and then
click Open.
g. Click Close.
i. Click to clear the Only show policy settings that can be fully managed check
box, and then click OK.
j. Expand Administrative Templates, and then click Kerberos Maximum Token Size.
7 Note
For the GPO take effect, the GPO change must be replicated to all domain
controllers in the domain, and affected computers must be restarted after
the policy is applied to them.
1. Click Start, click Run, type gpmc.msc, and then click OK to open the Group Policy
Management Console.
2. In the Group Policy Management Console, create a new GPO that is linked at the
domain level or that is linked to the OU that contains your computer accounts. Or
you can select a GPO that is already deployed.
3. Right-click the GPO, and then click Edit to open the Group Policy Management
Editor window.
4. Expand Computer Configuration, expand Preferences, and then expand Windows
Settings.
5. Right-click Registry, point to New, and then click Registry Item. The New Registry
Properties dialog box appears.
6. In the Action list, click Create.
7. In the Hive list, click HKEY_LOCAL_MACHINE.
8. In the Key Path list, click
SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters.
9. In the Value name box, type MaxTokenSize.
10. In the Value type box, click to select the REG_DWORD check box.
11. In the Value data box, type 48000.
12. Next to Base, click to select the Decimal check box.
13. Click OK.
7 Note
For the GPO take effect, the GPO change must be replicated to all domain
controllers in the domain, and affected computers must be restarted after they
apply the policy.
1. Open Server Manager, click Tools, and then click Group Policy Management to
open the Group Policy Management console.
2. In the Group Policy Management Console, create a new GPO that is linked at the
domain level or that is linked to the OU that contains your computer accounts. Or,
select a GPO that is already deployed.
3. Right-click the GPO, and then click Edit to open the Group Policy Management
Editor window.
4. Expand Computer Configuration, expand Policies, and then expand Administrative
Templates.
5. Expand System, and then click Kerberos.
6. Right-click Set maximum Kerberos SSPI context token buffer size on the right side
pane, and then click Edit.
7. Click Enabled, and then type 48000 in the Maximum size box.
8. Click OK.
7 Note
For the GPO take effect, the GPO change must be replicated to all domain
controllers in the domain, and affected computers must be restarted after
they apply the policy.
The Set maximum Kerberos SSPI context token buffer size policy setting is
added in Windows Server 2012 and in Windows 8. The policy setting is
supported in Windows XP, in Windows Server 2003, in Windows Vista, in
Windows Server 2008, in Windows 7, and in Windows Server 2008 R2. To use
this Group Policy setting, you must edit the GPO in a version of Windows
Server 2012 or in Windows 8 that has the RSAT tools installed.
References
For more information about the MaxTokenSize registry entry, click the following article
number to view the article in the Microsoft Knowledge Base:
327825 New resolution for problems with Kerberos authentication when users belong
to many groups
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which user-based Group Policy Object (GPO)
settings don't work when signing in using shadow principals.
To resolve this issue, add the shadow principal account or the ShadowPrincipalGroup
group to the "Allowed to authenticate" permission on the krbtgt account in the target
user's domain.
Feedback
Was this page helpful? Yes No
This article provides a solution to issues where computers on your network can't
connect to the Group Policy objects (GPO) in the Sysvol folders on your network domain
controllers.
Summary
You may experience one or many errors and events if Group Policy is applied to the
computers on your network. To determine the cause of the issue, you must troubleshoot
the configuration of the computers on your network. Follow these steps to troubleshoot
the cause of the issue:
1. Examine the DNS settings and network properties on the servers and client
computers.
2. Examine the Server Message Block signing settings on the client computers.
3. Make sure that the TCP/IP NetBIOS Helper service, the Net Logon service, and the
Remote Procedure Call (RPC) service are started on all computers.
4. Make sure that Distributed File System (DFS) is enabled on all computers.
5. Examine the contents and the permissions of the Sysvol folder.
6. Make sure that the Bypass traverse checking right is granted to the required
groups.
7. Make sure that the domain controllers aren't in a journal wrap state.
8. Run the dfsutil /purgemupcache command.
Symptoms
You experience one or more of the following symptoms on a computer that is running
Microsoft Windows Server 2003, Microsoft Windows XP, or Microsoft Windows 2000:
Group Policy settings aren't applied to the computers.
Group Policy replication isn't completed between the domain controllers on the
network.
You can't open Group Policy snap-ins. For example, you can't open the Domain
Controller Security Policy snap-in, or the Domain Security Policy snap-in.
If you try to open a Group Policy snap-in, you receive one of the following error
messages:
Failed to open the Group Policy Object. You may not have the appropriate
rights.
Details: The account is not authorized to log in from this station.
Failed to open the Group Policy Object. You may not have the appropriate
rights.
Details: The system cannot find the path specified.
If you try to access shared files on any domain controller, you receive an error
message. This symptom occurs even if you are logged on to the server, and you try
to access a local share. Specifically, this symptom may affect access to a domain
controller's Sysvol share.
If you try to access a file share, you're repeatedly prompted for a password.
If you try to access a file share, you receive an error message that is similar to one
of the following error messages:
Date: Date
Time:
Time
User:
User_Name
Computer:
Computer_Name
Description: Windows cannot access the file gpt.ini for GPO CN={31B2F340-016D-
11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC= domainname,DC=com .
The file must be present at the location
<\\domainname.com\sysvol\domainname.com\Policies\{31B2F340-016D-11D2-
945F-00C04FB984 F9}\gpt.ini>. (Error_Message). Group Policy processing aborted.
For more information, see Help and Support Center at
https://support.microsoft.com .
The error message that appears in the Error_Message placeholder in Event ID 1058 may
be any of the following error messages:
Access is denied.
Typically, if Event ID 1058 and Event ID 1030 occur, they are logged by client computers
and member servers when the computer starts. Domain controllers log these events
every five minutes.
If you view the Application log in Event Viewer on a Windows 2000-based computer,
you see events that are similar to the following events:
The error code that appears in the Error_Code placeholder in Event ID 1000 may be any
of the following error codes:
5
51
53
1231
1240
1722
Cause
These issues occur if the computers that are on your network can't connect to certain
Group Policy objects. Specifically, these objects are in the Sysvol folders on your
network's domain controllers.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly. So
make sure that you follow these steps carefully. For added protection, back up the
registry before you modify it. Then, you can restore the registry if a problem occurs.
For more information about how to back up and restore the registry, see How to
back up and restore the registry in Windows .
To resolve this issue, you must troubleshoot the configuration of your network to narrow
the cause of the issue, and then correct the configuration. To troubleshoot the possible
cause of this issue, follow these steps:
Additionally, every computer on the network must use DNS servers that can resolve SRV
records and host names for the Active Directory forest where the computer is a member.
Typically, a common configuration error is for the client computers to use the DNS
servers that belong to your Internet service provider (ISP).
On all the computers that have logged the Userenv errors, examine the DNS settings
and network properties. Additionally, check these settings on all domain controllers,
whether or not they log Userenv errors.
To verify DNS settings and network properties on Windows XP-based computers in your
network, follow these steps:
4. On the General tab, click to select the Client for Microsoft Networks check box.
5. If the computer is a domain controller, click to select the File and Printer Sharing
for Microsoft Networks check box.
7 Note
9. Click to select the Register this connection's addresses in DNS check box, and
then select OK three times.
10. Start a command prompt. To do it, select Start, select Run, type cmd in the Open
box, and then select OK.
11. Type ipconfig /flushdns, and then press ENTER. Type ipconfig /registerdns, and
then press ENTER.
1. Select Start, point to Control Panel, and then double-click Network Connections.
3. On the General tab, click to select the Client for Microsoft Networks check box.
4. If the computer is a domain controller, click to select the File and Printer Sharing
for Microsoft Networks check box.
7 Note
6. If Use the following DNS server addresses is selected, make sure that the IP
addresses for the preferred and alternate DNS servers are the IP addresses of DNS
servers that can resolve SRV records and host names in Active Directory.
Specifically, the computer mustn't use the DNS servers that belong to your ISP. If
the DNS server addresses aren't correct, type the IP addresses of the correct DNS
servers in the Preferred DNS server and Alternate DNS server boxes.
8. Click to select the Register this connection's addresses in DNS check box, and
then select OK three times.
9. Start a command prompt. To do it, select Start, select Run, type cmd, and then
select OK.
10. Type ipconfig /flushdns, and then press ENTER. Type ipconfig /registerdns, and
then press ENTER.
If the client computers in your network are configured to obtain their IP addresses
automatically, make sure that the computer that is running the DHCP service assigns the
IP addresses of DNS servers that can resolve SRV records and host names in the Active
Directory.
To determine what IP addresses a computer is using for DNS, follow these steps:
1. Start a command prompt. To do this, select Start, select Run, type cmd in the Open
box, and then select OK.
2. Type ipconfig /all, and then press ENTER.
3. Note the DNS entries that are listed on the screen.
If computers that are configured to obtain IP addresses automatically aren't using the
correct DNS servers, view the documentation for your DHCP server for information
about how to configure the DNS servers option. Additionally, make sure that each
computer can resolve the IP address of the domain. To do it, type ping
Your_Domain_Name.Your_Domain_Root at a command prompt, and then press ENTER.
Instead, type nslookup Your_Domain_Name.Your_Domain_Root, and then press ENTER.
7 Note
It's expected that this host name will resolve to the IP address of one of the domain
controllers on the network. If the computer can't resolve this name, or if the name
resolves to the wrong IP address, make sure that the forward lookup zone for the
domain contains valid (same as parent folder) Host (A) records.
To make sure that the forward lookup zone for the domain contains valid (same as
parent folder) Host (A) records on a Windows 2000-based computer, follow these steps:
1. On a domain controller that is running DNS, select Start, point to Programs, point
to Administrative Tools, and then select DNS.
2. Expand Your_Server_Name, expand Forward Lookup Zones, and then select the
forward lookup zone for your domain.
4. If a (same as parent folder) Host (A) record doesn't exist, follow these steps to
create one:
a. On the Action menu, select New Host.
b. In the IP address box, type the IP address of the domain controller's local
network adaptor.
c. Click to select the Create associated pointer (PTR) record check box, and then
select Add Host.
d. When you receive the following message, select Yes:
(same as parent folder) is not a valid host name. Are you sure you want to
add this record?
7. If the IP address in the IP address box isn't valid, type the correct IP address in the
IP address box, and then select OK.
8. Instead, you can delete the (same as parent folder) Host (A) record that contains
an IP address that isn't valid. To delete the (same as parent folder) Host (A) record,
right-click it, and then select Delete.
9. If the DNS server is a domain controller that is also a Routing and Remote Access
server, see Name resolution and connectivity issues on a Routing and Remote
Access Server that also runs DNS or WINS .
10. On all computers where you add, delete, or modify DNS records, type ipconfig
/flushdns at a command prompt, and then press ENTER.
To make sure that the forward lookup zone for the domain contains valid (same as
parent folder) Host (A) records on a Windows Server 2003-based computer, follow
these steps:
1. On a domain controller that is running DNS, select Start, point to Administrative
Tools, and then select DNS.
2. Expand Your_Server_Name, expand Forward Lookup Zones, and then select the
forward lookup zone for your domain.
4. If the (same as parent folder) Host (A) record doesn't exist, follow these steps to
create one:
a. On the Action menu, select New Host (A).
b. In the IP address box, type the IP address of the domain controller's local
network adaptor.
c. Click to select the Create associated pointer (PTR) record check box, and then
select Add Host.
d. When you receive the following message, select Yes:
(same as parent folder) is not a valid host name. Are you sure you want to
add this record?
7. If the IP address is in the IP address box isn't valid, type the correct IP address in
the IP address box, and then select OK.
8. Instead, you can delete the (same as parent folder) Host (A) record that contains
the IP address that isn't valid. To delete the Host (A) record, right-click (same as
parent folder), and then select Delete.
9. If the DNS server is a domain controller that is also a Routing and Remote Access
server, see Name resolution and connectivity issues on a Routing and Remote
Access Server that also runs DNS or WINS .
10. On all computers where you add, delete, or modify DNS records, type ipconfig
/flushdns at a command prompt, and then press ENTER.
For example, SMB signing may be required by the domain controllers, but SMB signing
may be disabled on the client computers. If this issue occurs, Group Policy can't be
applied correctly. So the client computers log user environment (Userenv) errors in the
Application log. Sometimes, the SMB signing settings for the Server service and the
Workstation service on a domain controller may conflict with each other.
For example, SMB signing may be disabled for the domain controller's Workstation
service, but SMB signing is required for the domain controller's Server service. In this
scenario, you can't open one or more of the domain controller's local file shares if you're
logged on to the server. Additionally, you can't open Group Policy snap-ins if you're
logged on to the server.
For more information about how to troubleshoot this problem on a domain controller,
see You cannot open file shares or Group Policy snap-ins on a domain controller.
If Group Policy errors only occur on client computers and member servers, or if you
determine that You cannot open file shares or Group Policy snap-ins on a domain
controller doesn't apply to your situation, continue to troubleshoot the issue.
By default, SMB signing is enabled but isn't required for client communication on client
computers and member servers that are running Windows XP, Windows 2000, or
Windows Server 2003. We recommend that you use the default configuration because
the client computers can use SMB signing when it's possible, but will still communicate
with servers that have SMB signing disabled.
To configure the client computers and member servers so that SMB signing is enabled
but not required, you must change the values for some registry entries. To make the
registry changes on the client computers, follow these steps:
1. Select Start, select Run, type regedit in the Open box, and then select OK.
2. Expand the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
ers
After you change the registry values, restart the Server and Workstation services. Don't
restart the computers because it may cause group policies to be applied, and the Group
Policy settings may configure conflicting values again.
After you change the registry values and restart the Server and Workstation services on
the affected computers, follow these steps:
1. View the Group Policy settings for the GPO or GPOs that apply to the affected
computer accounts.
2. Make sure that the group policies don't conflict with the required registry settings.
3. Use the Group Policy Object Editor to view the policy settings in the following
folder: Computer Configuration/Windows Settings/Security Settings/Local
Policies/Security Options
On a computer that is running Windows Server 2003, the SMB signing Group Policy
settings have the following names:
On a computer that is running Windows 2000 Server, the SMB signing Group Policy
settings have the following names:
Typically, the SMB signing Group Policy settings are configured as "Not Defined". If you
define the SMB signing Group Policy settings, make sure that you understand how the
settings may affect network connectivity.
For more information about the SMB signing settings, see Client, service, and program
issues can occur if you change security settings and user rights assignments .
If you change the GPO settings on a domain controller that is running Windows 2000
Server, follow these steps:
1. Start a command prompt. To do it, select Start, select Run, type cmd in the Open
box, and then select OK.
2. Type secedit /refreshpolicy machine_policy /enforce, and then press ENTER.
3. Restart the affected client computers.
4. Recheck the SMB signing values in the registry on the client computers to make
sure that they didn't change unexpectedly.
If you change the GPO settings on a domain controller that is running Windows Server
2003, follow these steps:
1. Start a command prompt. To do it, select Start, select Run, type cmd in the Open
box, and then select OK.
2. Type gpupdate /force, and then press ENTER.
3. Restart the affected client computers.
4. Recheck the SMB signing values in the registry on the client computers to make
sure that they did not change unexpectedly.
If the SMB signing values in the registry change unexpectedly after you restart the client
computers, use one of the following methods to view the applied policy settings that
are applied to a client computer:
On a Windows XP-based computer, use the Resultant Set of Policy MMC snap-in
(Rsop.msc). For more information about Resultant Set of Policy, see Resultant Set
of Policy.
On Windows 2000, use the Gpresult.exe command-line tool to examine the Group
Policy results. To do it, follow these steps:
3. In the Applied Group Policy Objects section of the output, note the Group
Policy objects that are applied to the computer account.
4. Compare the Group Policy objects that are applied to the computer account
that has the SMB signing policy settings on the domain controller for these
Group Policy objects.
To verify that the TCP/IP NetBIOS Helper service is running on a Windows Server 2003-
based computer, follow these steps:
To verify that the TCP/IP NetBIOS Helper service is running on a Windows 2000-based
computer, follow these steps:
1. Select Start, point to Programs, point to Administrative Tools, and then select
Services.
2. In the Services list, select TCP/IP NetBIOS Helper Service. Verify that the value
under the Status column is Started. Verify that the value under the Startup Type
column is Automatic. If the Status or the Startup Type values aren't correct, follow
these steps:
a. Right-click TCP/IP NetBIOS Helper Service, and then select Properties.
b. In the Startup type list, select Automatic.
c. In the Service status area, if the service isn't started, select Start.
d. Select OK.
Additionally, make sure that you haven't disabled one or more of the required system
services by using Group Policy objects. View these policy settings by using the Group
Policy Object Editor in the Computer Configuration/Windows Settings/Security
Settings/System Services folder.
On Windows Server 2003 and Windows XP, you can use the Resultant Set of Policy MMC
snap-in (Rsop.msc) to check all applied policy settings that are applied to a computer. To
do it, select Start, select Run, type rsop.msc in the Open box, and then select OK.
On Windows 2000, use the Gpresult.exe command-line tool to examine the Group Policy
results. To do it, follow these steps:
7 Note
If the TCP/IP NetBIOS Helper service is disabled on many desktops, you can use the
following sample Microsoft Visual Basic script to start the TCP/IP NetBIOS Helper
service on all computers in an organizational unit (OU) at the same time.
Microsoft provides programming examples for illustration only, without warranty either
expressed or implied. This includes, but isn't limited to, the implied warranties of
merchantability or fitness for a particular purpose. This article assumes that you're
familiar with the programming language that is being demonstrated and with the tools
that are used to create and to debug procedures. Microsoft support engineers can help
explain the functionality of a particular procedure, but they won't modify these
examples to provide added functionality or construct procedures to meet your specific
requirements.
VB
To make sure that the Distributed File System service is running on Windows Server
2003-based domain controllers, follow these steps:
To make sure that the Distributed File System service is running on Windows 2000
Server-based domain controllers, follow these steps:
1. Select Start, point to Programs, point to Administrative Tools, and then select
Services.
2. In the Services list, select Distributed File System service. Verify that the value
under the Status column is Started. Verify that the value under the Startup Type
column is Automatic. If the Status or the Startup Type values aren't correct, follow
these steps:
a. Right-click Distributed File System, and then select Properties.
b. In the Startup type list, select Automatic.
c. In the Service status area, if the service isn't started, select Start.
d. Select OK.
To make sure that the Distributed File System client is enabled on all client computers,
follow these steps:
1. Select Start, select Run, type regedit in the Open box, and then select OK.
2. Expand the following subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mup
3. Select Mup, and then in the right pane, search for a DWORD value entry that is
named DisableDFS.
4. If the DisableDFS entry exists and the value data is 1, double-click DisableDFS. In
the Value data box, type 0, and then select OK. If the DisableDFS value data is
already 0, or if the DisableDFS entry doesn't exist, don't make any change.
5. Quit Registry Editor.
6. If you changed the DisableDFS value data, restart the computer.
If the permissions on the Sysvol folder or the Sysvol share are too restrictive, group
policies can't be applied correctly, and cause user environment (Userenv) errors.
Additionally, Userenv errors may occur if the Sysvol share or Group Policy objects are
missing.
To make sure that the Sysvol share is available, run the net share command at a
command prompt on each domain controller. To do it, follow these steps:
1. Select Start, select Run, type cmd in the Open box, and then select OK.
2. Type net share, and then press ENTER.
3. Locate SYSVOL and NETLOGON in the list of folders.
If the Sysvol or Netlogon shares are missing from one or more domain controllers, you
must troubleshoot the cause of the problem.
For more information about how to troubleshoot the missing Sysvol and Netlogon
shares in Windows 2000 Server, see Troubleshooting missing SYSVOL and NETLOGON
shares on Windows domain controllers .
For more information about how to rebuild the Sysvol share in Windows Server 2003,
see How to rebuild the SYSVOL tree and its content in a domain .
After you make sure that the Sysvol share is available, make sure that the Sysvol folder,
the Sysvol share, and the root folder of the volume that contains the Sysvol folder are
configured with the correct permissions.
Additionally, on Windows 2000 Server, the Everyone group must be granted Full Control
permission on the root folder of the volume that contains the Sysvol folder. On
Windows Server 2003, the Everyone group must be granted the Read & Execute special
permission to "This folder only," and the domain\Users group must be granted the
following standard permissions:
Additionally, on Windows Server 2003, the domain\Users group must have the following
special permissions:
After you verify the Sysvol permissions, make sure that the Sysvol folder contains the
required Group Policy objects. To look for the required Group Policy objects, use the
Gpotool.exe program from the Windows 2000 or the Windows Server 2003 Resource Kit.
If you run the Gpotool.exe program without any options, it scans for all the Group Policy
objects on all domain controllers in the domain. If you include the /checkacl switch, the
tool also scans the Sysvol access control list (ACL). For detailed output when you run the
Gpotool.exe program, use the /verbose switch.
Instead, you can manually verify the individual GPO in the SYSVOL folder. For example, if
the description in the Userenv 1058 event lists the name of a GPO, you can manually
verify the individual GPO in the SYSVOL folder. You can do this to make sure that it
contains a USER folder, a MACHINE folder, and a Gpt.ini file. To manually verify the
individual GPO in the SYSVOL folder, follow these steps:
1. Start a command prompt. To do it, select Start, select Run, type cmd in the Open
box, and then select OK.
2. Type at Time/interactive/next: cmd.exe, and then press ENTER, where Time is 1 or
2 minutes later than the present time, and is written in 24-hour time format. For
example, 3 minutes after 1:00 p.m. would be 13:03 in 24-hour time format.
3. At the time that you specify in the previous command, a new Command Prompt
window opens. Type net use
j:\\domainname.com\sysvol\domainname.com\Policies\{GUID}, and then press
ENTER, where GUID is the GUID of the GPO that is in the Userenv event
description. For example, if the Userenv 1058 event description says, "The file must
be present at the location
<\\Domain_Name.com\sysvol\Domain_Name.com\Policies\{31B2F340-016D-
11D2-945F-00C04FB984 F9}\gpt.ini>," the GUID that you would use in the
command is 31B2F340-016D-11D2-945F-00C04FB984F9.
4. Type dir j:\*.*, and then press ENTER.
5. Verify that a USER folder, a MACHINE folder, and a Gpt.ini file are listed in the
folder listing for the I drive. If any one of these folders and files are missing, the
computers on the network are likely to log Userenv errors in the Application log.
If one or more Group Policy objects are missing from the Sysvol folder, run the Windows
Server 2003 Default Group Policy Restore Utility (Dcgpofix.exe), or the Windows 2000
Default Group Policy Restore Tool (Recreatedefpol.exe), to re-create the default Group
Policy objects.
The Dcgpofix.exe program is included with Windows Server 2003. For additional
information about the Dcgpofix.exe program, run the dcgpofix /? command at a
command prompt.
Make sure to set the recommended exclusions when you're scanning the Sysvol drive
with antivirus software. Scanning with antivirus software can block access to the
required files, such as the Gpt.ini file. You must configure these exclusions for all real-
time, scheduled, and manual antivirus scans.
Administrators
Authenticated Users
Everyone
Pre-Windows 2000 Compatible Access
To verify that the Bypass traverse checking right has been granted on a Windows Server
2003-based domain controller, follow these steps:
1. Select Start, point to Administrative Tools, and then select Domain Controller
Security Policy.
2. Expand Local Policies, and then select User Rights Assignment.
3. Double-click Bypass traverse checking.
4. Click to select the Define these policy settings check box.
5. Verify that the Administrators, Authenticated Users, Everyone, and Pre-Windows
2000 Compatible Access groups are listed for this policy setting. If any of these
groups are missing, follow these steps:
a. Select Add User or Group.
b. In the User and group names box, type the name of the missing group, and
then select OK.
6. Select OK to close the policy setting.
7. Start a command prompt. To do it, select Start, select Run, type cmd in the Open
box, and then select OK.
8. Type gpupdate /force, and then press ENTER.
To verify that the Bypass traverse checking right has been granted on a Windows 2000
Server-based domain controller, follow these steps:
1. Select Start, point to Programs, point to Administrative Tools, and then select
Domain Controller Security Policy.
2. Expand Security Settings, expand Local Policies, and then select User Rights
Assignment.
3. Double-click Bypass traverse checking.
4. Click to select the Define these policy settings check box.
5. Verify that the Administrators, Authenticated Users, Everyone, and Pre-Windows
2000 Compatible Access groups are listed for this policy setting. If any one of these
groups are missing, follow these steps:
a. Select Add.
b. In the User and group names box, type the name of the missing group, and
then select OK.
6. Select OK to close the policy setting.
7. Start a command prompt. To do it, select Start, select Run, type cmd in the Open
box, and then select OK.
8. Type secedit /refreshpolicy machine_policy /enforce, and then press select.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where User Group Policy Preference (GPP)
Scheduled Task item fails to apply.
Symptoms
You configure the following User Group Policy Preference (GPP) item in a Windows
2008/2008 R2 based Active Directory Domain.
Under the Common Settings tab, select option Run in logged-on user's security
context (user policy option). After the Group Policy is applied to a user, you find
that the preference item doesn't take effect.
Additionally, you see the following event log in the Application log:
Additionally if you enable Group Policy tracing for GPP Scheduled Tasks Client Side
Extension, you'll see the following messages logged in the GPP User log file:
tracing
Cause
The User GPP Scheduled Tasks item wasn't designed to run under the currently logged
on users security context AND must be applied in the default system security context.
Resolution
To avoid this issue, don't enable the Run in logged-on user's security context (user
policy option) Common option when configuring user GPP Scheduled Tasks items.
The security context under which the Scheduled Task will run once it has been deployed
can be specified in the General settings tab when creating the User GPP Scheduled Task
item:
General:
Security Options -> "When running the task, use the following user account:"
It's where the security context under which the scheduled task will run should be
configured.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which Windows Server stops responding on startup
when applying Group Policy if System Monitor (Sysmon) is installed.
Sysmon driver (SysmonDrv.sys) intercepts the transition from user mode to kernel and
then sends work to its user mode process Sysmon64.exe. Most Sysmon64.exe threads are
stuck waiting on a critical section. The critical section owner is waiting on a Local
Security Authority Subsystem Service (LSASS) thread. However, the LSASS owner thread
is trying to acquire a different critical section. Many other LSASS threads are blocked
waiting on this critical section.
The critical section owning thread is blocked in SysmonDrv's kernel to the user mode
communication to process Sysmon64.exe, which is observed to be stuck waiting on the
LSASS thread. This results in a deadlock.
You can resolve this issue by upgrading Sysmon to the latest version, or work around
this issue by disabling FileBlockShredding .
Disable FileBlockShredding
To work around this issue, follow these steps:
PowerShell
PS C:\Sysmon> .\Sysmon64.exe -c
Current configuration:
- Service name: Sysmon64
- Driver name: SysmonDrv
- Config file: .\file-delete.xml
2. Eliminate the following condition:
XML
<FileBlockShredding onmatch="...">
...
</FileBlockShredding>
Feedback
Was this page helpful? Yes No
Symptoms
Consider the following scenario:
You want Group Policy to apply to Windows 8.1 and later versions of Windows.
You create the following WMI filter, based on known build numbers of Windows
versions:
Console
ノ Expand table
9200 Windows 8
10240 Windows 10
In this scenario, although you would expect the WMI filter to cause the Group Policy
setting to apply to build number 9200 and later builds, Windows 10 builds are excluded.
Cause
This issue occurs because the data type for BuildNumber is String and not Integer.
Therefore, 10*** < 9600.
Resolution
To fix this issue, use a filter that resembles the following example.
7 Note
There are several ways to force the string compare to return the result that you
want. You can use any method that you prefer. The example is fully functional.
Console
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
User Experience issues.
Feedback
Was this page helpful? Yes No
This article describes how to configure Group Policies to Set Security for System
Services.
Summary
This article describes how to use Group Policy to set security for system services for an
organizational unit in Windows Server 2003.
When you implement security on system services, you can control who can manage
services on a workstation, member server, or domain controller. Currently, the only way
to change a system service is through a Group Policy computer setting.
If you implement Group Policy as the Default Domain Policy, the policy is applied to all
computers in the domain. If you implement Group Policy as the Default Domain
Controllers policy, the policy applies only to the servers in the domain controller's
organizational unit. You can create organizational units that contain workstation
computers to which policies can be applied. This article describes the steps to
implementing a Group Policy on an organizational unit to change permissions on
system services.
2. Right-click the domain to which you want to add the organizational unit, point to
New, and then click Organizational Unit.
3. Type a name for the organizational unit in the Name box, and then click OK.
4. Right-click the new organizational unit that you created, and then click Properties.
5. Click the Group Policy tab, and then click New. Type a name for the new Group
Policy object (for example, use the name of the organizational unit for which it is
implemented), and then press ENTER.
6. Click the new Group Policy object in the Group Policy Objects Links list (if it is not
already selected), and then click Edit.
8. In the right pane, double-click the service to which you want to apply permissions.
11. Grant the appropriate permissions to the user accounts and groups that you want,
and then click OK.
12. Under Select service startup mode, click the startup mode option that you want,
and then click OK.
13. Close the Group Policy Object Editor, click OK, and then close the Active Directory
Users and Computers tool.
7 Note
You must move the computer accounts that you want to manage into the
organizational unit. After the computer accounts are contained in the
organizational unit, the authorized user or groups can manage the service.
Feedback
Was this page helpful? Yes No
This article provides some information about Group Policy Preferences Events.
Summary
Group Policy Preferences (GPP) allow you to specify computer and user configuration
settings. These settings allow granular configuration not available using regular Group
Policy. GPP also provides filtering of settings using item-level targeting that allows for
granular application of settings to a subset of users or computers.
You may want to know about the possible events that can be logged by a component, in
order to categorize them properly in system management solutions. Below you will find
the list of events for Group Policy Preferences.
More information
Group Policy Preferences events are written to the Application log. Informational events
are only logged when the relevant Group Policy settings are enabled. The path to the
settings per preference area is:
ノ Expand table
MessageId=0x1000 Success The %1 '%2' preference item in the '%3' Group Policy object
(4096) applied successfully.
MessageId=0x1002 Warning The %1 '%2' preference item in the '%3' Group Policy object
(4098) did not apply because it failed with error code
'%4'%%100790273
MessageId=0x1003 Warning The client-side extension could not log RSoP data because it
(4099) failed with error code '%1'.
MessageId=0x1005 Success The %1 '%2' preference item in the '%3' Group Policy object
(4101) was successfully removed.
MessageId=0x1009 Warning The %1 '%2' preference item in the '%3' Group Policy object
(4105) did not apply because a targeting item failed with error code
'%4'%%100790273.
Events Severity Message
MessageId=0x100A Warning The %1 '%2' preference item in the '%3' Group Policy object
(4106) did not apply because its targeting item failed with error code
'%4'%%100790273.
MessageId=0x2000 Warning The %1 '%2' preference item in the '%3' Group Policy object
(8192) did not apply because it failed with error code
'%4'%%100790275.
MessageId=0x2001 Warning The %1 '%2' preference item in the '%3' Group Policy object
(8193) did not apply because its targeting item failed with error code
'%4'%%100790275.
MessageId=0x2002 Warning The client-side extension could not %1 %2 policy settings for
(8194) '%3' because it failed with error code '%4'%%100790275 .
MessageId=0x2006 Warning The %1 '%2' preference item in the '%3' Group Policy object
(8198) was not removed because it failed with error code
'%4'%%100790275 .
MessageId=0x2014 Warning The %1 '%2' preference item in '%3' Group Policy object did
(8212) not apply because a targeting item failed with error code
'%4'%%100790275 .
MessageId=0x201D Warning An error occured while writing to the trace file. Error %1.
(8221)
(61441)
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
Group Policy issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to issues where Distributed File System Replication
(DFSR) SYSVOL fails to migrate or replicate, or SYSVOL isn't shared.
Symptoms
Scenario 1: After starting a SYSVOL migration from File Replication Service (FRS) to DFSR,
no domain controllers enter the Prepared phase, and remain stuck at Preparing. This
issue continues even after you verify that Active Directory (AD) replication has
converged on all domain controllers. The issue continues even on DCs in the same AD
site as the PDCE, where AD replication occurs every 15 seconds and where you have run
DFSRDIAG.EXE POLLAD on all the DCs. Running the /GETMIGRATIONSTATE reporting
command shows:
DFSRMIG.EXE /GETMIGRATIONSTATE
===================================================
2008R2-MIG-01 ('Preparing') - Primary DC
2008R2-MIG-02 ('Preparing') - Writable DC
Migration has not yet reached a consistent state on all Domain Controllers.
State information might be stale due to AD latency.
Examining the DFS Replication event sign in the Primary Domain Controller (PDC)
Emulator shows:
Output
Output
Output
Additional Information:
Object Category: msDFSR-LocalSettings
Object DN: CN=DFSR-LocalSettings,CN=2008-R2-TSPDC2,OU=Domain
Controllers,DC=tailspintoys,DC=com**
Error: 5 (Access is denied.)
Domain Controller: 2008-R2-TSPDC1.tailspintoys.com
Polling Cycle: 60
Output
Output
Cause
The default user rights assignment "Manage Auditing and Security Log"
(SeSecurityPrivilege) has been removed from the built-in Administrators group. Removal
of this user right from Administrators on domain controllers isn't supported. It will cause
DFSR SYSVOL migration to fail. DFSR migration and must be run by a user who is a
member of the built-in Administrators group in that domain. All DCs are automatically
members of the built-in Administrators group.
Resolution
To resolve the issue, follow all steps in the order, using an elevated CMD prompt while
running as a Domain Admin:
Scenario 1:
1. Determine which security group policy is applying this setting to the DCs by
running on the PDCE:
Console
GPRESULT.EXE /H secpol.htm
2. Open secpol.htm in a web browser then select Show All. Search for the entry
Manage Auditing and Security Log. It will list the group policy that is applying this
setting.
3. Using GPMC.MSC, edit that group policy to include the group Administrators.
4. Allow AD and SYSVOL replication to converge on all DCs. On the PDCE, run:
Console
GPUPDATE /FORCE
5. Sign out the PDCE and log back on, to update your security token with the user
right assignment.
6. Run:
Console
DFSRMIG.EXE /CREATEGLOBALOBJECTS
7. Allow AD and SYSVOL replication to converge on all DCs. On the PDCE, run:
Console
DFSRDIAG.EXE POLLAD
DFSRMIG.EXE /GETMIGRATIONSTATE
8. Validate that some or all of the DCs have reached the Prepared state and are ready
to redirect. At this point, you can proceed with your migration normally. See the
More information section below.
Scenario 2:
1. Determine which security group policy is applying this setting to the DCs by
running on the PDCE:
Console
GPRESULT.EXE /H secpol.htm
2. Open secpol.htm in a web browser, then select Show All. Search for the entry
Manage Auditing and Security Log. It will list the group policy that is applying this
setting.
3. Using GPMC.MSC, edit that group policy to include the group Administrators.
4. Allow AD and SYSVOL replication to converge on all DCs. On the affected DC, run:
Console
GPUPDATE /FORCE
6. Validate that the DC now shares SYSVOL and NETLOGON, and replicates SYSVOL
inbound.
The sysvol may not be shared on any of the DCs. Which will prevent you from editing
or applying Group Policy. As a workaround you can manually share the sysvol , edit the
User Right "Manage Auditing and Security Log" and force a GP update.
Steps:
2. Open the policy and add the user or group to the "manage auditing and security
log" user right.
3. Run:
Console
gpupdate force.
7 Note
You may have to share the sysvol again at step 3 as a background process
from SYSVOL migration may unshared it before you're done editing the policy
It's possible for DFSRMIG to successfully update AD but fail to update the Registry. If the
AD updates are done successfully to create the sysvol replication group but the registry
changes the DFSR service aren't made because of missing user rights, you'll only see
events 8010 that the migration is underway.
More information
It's normal for DCs to remain the Preparing state for an extended period of time during
a migration, especially in larger environments where AD replication may take several
hours or days to converge. It isn't normal for them to remain in that state even after AD
replication has reached those DCs and 15 minutes has passed for DFSR AD Polling.
Don't share SYSVOL and NETLOGON manually to work around this issue. Don't set
SYSVOLREADY=1 to work around this issue. Doing so will cause the DC to contact itself for
group policy. Since it can't populate its SYSVOL , any changes to fix the user rights won't
be applied.
For more information on lowering the AD Replication convergence time using Inter-site
Change Notification, see Appendix B - Procedures Reference.
For more information on SYSVOL migration from FRS to DFSR, see Migrate SYSVOL
replication to DFS Replication .
Feedback
Was this page helpful? Yes No
This article provides help to fix errors that occur when you run Group Policy
Management Console (GPMC).
Symptoms
When you run GPMC in a Microsoft Windows Server domain, and then you click either
Default Domain Policy or Default Domain Controllers Policy, you receive one of the
following messages:
If you have permissions to modify security on the Group Policy objects (GPOs), you
receive the following message:
The permissions for this GPO in the sysvol folder are inconsistent with those in
Active Directory. It is recommended that these permissions be consistent. To
change the permissions in SYSVOL to those in Active Directory, click OK
If you do not have permission to modify security on the Group Policy objects
(GPOs), you receive the following message:
The permissions for this GPO in the sysvol folder are inconsistent with those in
Active Directory. It is recommended that these permissions be consistent.
Contact an administrator who has rights to modify security on this GPO.
Cause
This issue occurs because the access control list (ACL) on the Sysvol portion of the
Group Policy object is set to inherit permissions from the parent folder.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section of this article.
Workaround
If you have permissions to modify security on the default GPOs, click OK in response to
the message that is described in the "Symptoms" section. This action modifies the ACLs
on the Sysvol portion of the Group Policy object and makes them consistent with the
ACLs on the Active Directory component. In this case, Group Policy will remove the
inheritance attribute in the Sysvol folder
More information
Each Group Policy object (GPO) is stored partly in the Sysvol folder on the domain
controller and partly in the Active Directory directory service. GPMC, Group Policy Object
Editor, and the old Group Policy user interface that is provided in the Active Directory
snap-ins present and manage a GPO as a single unit. For example, when you set
permissions on a GPO in GPMC, GPMC sets permissions on objects both in Active
Directory and in the Sysvol folder. For each GPO, the permissions in Active Directory
must be consistent with the permissions in the Sysvol folder. You must not change these
separate objects outside GPMC and Group Policy Object Editor. If you do so, this may
cause Group Policy processing on the client to fail, or certain users who generally have
access may no longer be able to edit a GPO.
Additionally, file system objects and directory service objects do not have the same
available permissions because they are different types of objects. When permissions
mismatch, it may not be easy to make them consistent. To help you make sure that the
security for the Active Directory and for the Sysvol components of a GPO is consistent,
GPMC automatically checks the consistency of the permissions of any GPO when you
click the GPO in GPMC. If GPMC detects a problem with a GPO, you receive one of the
messages that is described in the "Symptoms" section, depending on whether or not
you have permissions to modify security on that GPO.
Feedback
Was this page helpful? Yes No
Provide product feedback
How to force authoritative and non-
authoritative synchronization for DFSR-
replicated sysvol replication
Article • 12/26/2023
Summary
Consider the following scenario:
Console
msDFSR-Enabled=FALSE
2. Force Active Directory replication throughout the domain.
3. Run the following command from an elevated command prompt on the same
servers that you set as non-authoritative:
Console
DFSRDIAG POLLAD
4. You'll see Event ID 4114 in the DFSR event log indicating sysvol replication is no
longer being replicated.
7. Run the following command from an elevated command prompt on the same
servers that you set as non-authoritative:
Console
DFSRDIAG POLLAD
8. You'll see Event ID 4614 and 4604 in the DFSR event log indicating sysvol
replication has been initialized. That domain controller has now done a D2 of
sysvol replication.
2. In the ADSIEDIT.MSC tool, modify the following DN and two attributes on the
domain controller you want to make authoritative (preferably the PDC Emulator,
which is usually the most up-to-date for sysvol replication contents):
Console
3. Modify the following DN and single attribute on all other domain controllers in
that domain:
Console
msDFSR-Enabled=FALSE
4. Force Active Directory replication throughout the domain and validate its success
on all DCs.
5. Start the DFSR service on the domain controller that was set as authoritative in
Step 2.
6. You'll see Event ID 4114 in the DFSR event log indicating sysvol replication is no
longer being replicated.
8. Force Active Directory replication throughout the domain and validate its success
on all DCs.
9. Run the following command from an elevated command prompt on the same
server that you set as authoritative:
Console
DFSRDIAG POLLAD
10. You'll see Event ID 4602 in the DFSR event log indicating sysvol replication has
been initialized. That domain controller has now done a D4 of sysvol replication.
11. Start the DFSR service on the other non-authoritative DCs. You'll see Event ID 4114
in the DFSR event log indicating sysvol replication is no longer being replicated on
each of them.
12. Modify the following DN and single attribute on all other domain controllers in
that domain:
Console
msDFSR-Enabled=TRUE
13. Run the following command from an elevated command prompt on all non-
authoritative DCs (that is, all but the formerly authoritative one):
Console
DFSRDIAG POLLAD
14. Return the DFSR service to its original Startup Type (Automatic) on all DCs.
More information
If setting the authoritative flag on one DC, you must non-authoritatively synchronize all
other DCs in the domain. Otherwise you'll see conflicts on DCs, originating from any DCs
where you did not set auth/non-auth and restarted the DFSR service. For example, if all
logon scripts were accidentally deleted and a manual copy of them was placed back on
the PDC Emulator role holder, making that server authoritative and all other servers
non-authoritative would guarantee success and prevent conflicts.
If making any DC authoritative, the PDC Emulator as authoritative is preferable, since its
sysvol replication contents are most up to date.
The use of the authoritative flag is only necessary if you need to force synchronization of
all DCs. If only repairing one DC, make it non-authoritative and don't touch other
servers.
This article is designed with a 2-DC environment in mind, for simplicity of description. If
you had more than one affected DC, expand the steps to include ALL of them as well. It
also assumes you have the ability to restore data that was deleted, overwritten,
damaged, and so on. previously if it's a disaster recovery scenario on all DCs in the
domain.
Feedback
Was this page helpful? Yes No
Summary
For domains with many policies, and domain controllers with slow wide area network
(WAN) lines, replicating the SYSVOL share can take a long time. It's most noticeable
when you promote a new domain controller at a location with slow connectivity or when
you run a non-authoritative restore of SYSVOL. To speed up the process, reduce the
number of files and amount of data that must be replicated in the SYSVOL share.
Because Administrative Templates (that is, .adm files) take up the most space in policies,
remove them to significantly reduce the size of SYSVOL. For example, with the default
Administrative Templates, each policy takes up 870 kilobytes (KB) of disk space. If you
have 1,300 policies, you can reduce the size of SYSVOL from 1,100 megabytes (MB) to
35 MB (or 27 KB per policy).
You can use Group Policy settings to change the behavior of Group Policy Editor about
.adm files in Microsoft Windows Server 2003. For more information, see
Recommendations for managing Group Policy administrative template (.adm) files .
More information
Only the computer that you target with Group Policy Object Editor has to have the
Administrative Templates. By default, it's the Primary Domain Controller (PDC) emulator.
Removing the ADM files from the SYSVOL replication is a three-step process.
After running this command to remove ADM file from the policies in the SYSVOL, the
change will be replicated to all other DCs in the domain. Wait for file replication to
complete before proceeding to step 2.
7 Note
Backup your Sysvol before making any changes to the file structure
2. In the properties for the object, select fRSFileFilter in Select a property to view.
The value appears in the Value line.
5. Select Set.
6. Select OK.
An example of the command to copy the Administrative Template folders back to the
guid folders is the following one:
robocopy c:\sysvol-adm-backup\\mydom-pdc\sysvol\mydom.com\policies /s
Technically, if you don't have any custom Administrative Templates, you don't have to
add the Administrative Template folders back to the PDC emulator. The folders will be
automatically regenerated by using the local Administrative Templates whenever
someone edits the Group Policy object (GPO).
If you move the PDC emulator role, you may also want to move the Administrative
Templates. For best results, use the Robust File Copy utility. The command syntax is:
robocopy old_PDC_SYSVOL PDC_SYSVOL *.adm /s /mov
An example of the command to move the Administrative Templates is the following one:
robocopy \\mydom-pdc\sysvol\mydom.com\policies \\mydom-res-
If you have custom Administrative Templates, make sure they have unique file names
across policies. You can then distribute these Administrative Templates to all the
computers that run Group Policy Object Editor. Copy the Administrative Template files to
the NT\Inf folder.
Unless you have specific Administrative Template requirements (for example, you use
certain Administrative Templates only for certain policies), a good idea is to combine
these approaches to have a complete set of Administrative Templates for editing a GPO.
Windows 2000, Windows 2003, Windows 2003 R2, and Windows XP use ADM files.
Windows 2008 and later OSs use ADMX files and can also use custom ADM files. For
more information on ADMX files, see Managing Group Policy ADMX Files Step-by-Step
Guide.
Feedback
Was this page helpful? Yes No
The article describes how to use the Burflags registry entry to rebuild each domain
controller's copy of the system volume (SYSVOL) tree on all domain controllers in a
common Active Directory directory service domain.
Introduction
The term SYSVOL refers to a set of files and folders that reside on the local hard disk of
each domain controller in a domain and that are replicated by the File Replication
service (FRS). Network clients access the contents of the SYSVOL tree by using the
following shared folders:
NETLOGON
SYSVOL
We recommend the procedure that is described in this article as a last resort to restore a
domain's SYSVOL tree and its contents. Use this procedure only if you can't make the
FRS functional on individual domain controllers in the domain. Use this procedure only if
the bulk restart can be performed more quickly than troubleshooting and resolving
replication inconsistencies, and time to resolution is a critical factor.
) Important
Domain controllers will not service authentication request during the procedure.
Only when the SYSVOL and NETLOGON folders are shared again will the domain
controller authenticate requests. This procedure should not be performed during
peak hours.
7 Note
See the How to temporarily stabilize the domain SYSVOL tree section of this
article for information about how to temporarily stabilize the domain SYSVOL tree
until you can complete all the steps in the How to rebuild the domain SYSVOL
replica set across enterprise environments section.
We strongly recommend that you monitor FRS performance and health by using
monitoring tools. By using monitoring tools, you may prevent the need for replica set
authoritative and non-authoritative restores. Also, by using monitoring tools, you may
provide insight into the root cause of FRS failures.
Ultrasound is a powerful tool that measures the functioning of FRS replica sets by
providing health ratings and historical information of these sets. The Ultrasound tool is a
sophisticated monitoring system that uses Windows Management Instrumentation
(WMI) providers, a data collection service, a Microsoft SQL Server Desktop Engine
(MSDE) database, and a powerful user interface.
Guidelines
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
If you start the FRS with the Burflags registry entry set to D4, the FRS initially treats
the files and folders on its local copy of the SYSVOL tree as authoritative for the
replica set. Only one member of an FRS replica set should be initialized with the D4
setting.
If you start the FRS with the Burflags registry entry set to D2, the FRS performs a
full synchronization of files and folders from a direct or transitive replication
partner that is hosting the authoritative copy of files and folders in the replica set.
When you start the FRS with the Burflags registry entry set to D4, the configuration
is referred to as an "authoritative restore" for the contents of an FRS replica set,
even though no actual restore of the system state occurred. Think of the D4 setting
as rebuilding the FRS part of the first domain controller in a new domain.
When you start the FRS with the Burflags registry entry set to D2, the configuration
is referred to as a non-authoritative restore, even though no restore of the system
state occurred. Think of the D2 setting as rebuilding the FRS part of the replica
domain controller as if the domain controller were new.
If you set Burflags to D4 on a single domain controller and set Burflags to D2 on all
other domain controllers in that domain, you can rebuild the SYSVOL tree in that
domain. This bulk rebuild process is known as a hub, branch, or bulk FRS restart.
The following section lists the valid uses of a bulk restart of the SYSVOL replica set:
The members of an FRS replica set that are currently inconsistent can perform a
full synchronization of all files and folders in the SYSVOL tree faster than the
members can process the backlog of changes that reside in the outgoing logs of
upstream replication partners.
Most of the members in an FRS replica set have errors, such as journal_wrap errors.
For more information about journal_wrap errors, see How to troubleshoot
journal_wrap errors on Sysvol and DFS replica sets.
The ID table on most of the members of the replica set contains an incomplete
description of the files that should be hosted in the replica set.
The FRS database files are compromised because of accidental deletion, file system
errors, or database file errors, including corruption that is identified by JET
Database validation tools.
Most of the members in an FRS replica set cannot replicate files and folders, and a
bulk D4 or D2 configuration is a way to reinitialize all members as new members.
7 Note
If the FRS is in an error state on a single member, you can set BurFlags to D2
only on that single member.
If you rebuild the SYSVOL tree because of environmental problems, or if a
problematic topology has affected the consistency of files and folders in an
FRS replica set, you may see only temporary benefits. For example, this
scenario occurs when too many downstream partners exist or excessive
changes have occurred on the replicated content. In this case, we recommend
that you address the root cause of any underlying problem. Otherwise,
problems that first caused you to rebuild the SYSVOL tree may happen again.
To rebuild the SYSVOL tree, we recommend that all Windows 2000-based
domain controllers in the domain have Windows 2000 Service Pack 3 (SP3) or
a later version of the NTFRS.exe file installed. If your version of the NTFRS.exe
file is older than Windows 2000 Service Pack 3, install the latest Windows 2000
service pack.
2. Move all files and folders that should reside in the SYSVOL tree to a temporary
folder on the reference domain controller. The temporary folder should be located
on the same partition the SYSVOL tree is located.
When you move files within a partition, the files are not altered. Therefore, they
retain their original security settings. Files or Folders that are moved partitions or
copied within or between partitions inherit the security of the destination parent
directory. Therefore, any custom delegations of GPO management may be lost as a
result. Additionally, the access control list (ACL) on the SYSVOL part of the Group
Policy object is set to inherit permissions from the parent folder. Therefore, you
may receive the following error message when you open a GPO by using GPMC:
The Permissions for This GPO in the SYSVOL Folder Are Inconsistent with Those
in Active Directory
If you have permissions to modify security on the GPO, select OK when you receive
this error message. This action modifies the ACLs on the Sysvol part of the Group
Policy object and makes them consistent with the ACLs on the Active Directory
component. In this case, Group Policy removes the inheritance attribute in the
Sysvol folder.
3. Verify junction points and required folders on each domain controller in the
domain.
4. Restart the FRS on the reference domain controller with the D4 registry entry set.
5. Restart the FRS on all other domain controllers in the domain with the D2 registry
entry set.
6. On the reference domain controller, move all files and folders to the root folder of
the replica set. By default, this folder is the C:\Windows\Sysvol\Domain folder.
7. Monitor the consistency of files and folders for all domain controllers in the
domain.
7 Note
If a member of any replica set has been restarted with the Burflags registry entry
set to D4, restart the FRS on all other members of the replica set with the Burflags
registry entry set to D2. This configuration prevents morphed folders.
When the Burflags registry entry is set to D2 or to D4, and the FRS is restarted, the
originator GUID (OrigGUID) changes. If you want to track the source of a specific
activity, you can run the File Replication Service Diagnostics Tool (FRSDiag) to obtain
GUID2Name before you set the Burflags registry entry.
1. On all domain controllers in the domain, stop the FRS, and then set the service
startup type value for the FRS to Disabled.
b. Locate and then select the BurFlags entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NtFrs\Parameters\Cumul
GUID is the GUID of the domain system volume replica set that is shown in the
following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NtFrs\Parameters\Repli
ca Sets\GUID
d. Type D4 in the Value Data field (HexaDecimal), and then select OK.
3. On all domain controllers in the domain, verify that the file structure and junction
points are correct. You can follow these steps:
\SYSVOL
\SYSVOL\domain
\SYSVOL\staging\domain
\SYSVOL\staging areas
\SYSVOL\domain\Policies
\SYSVOL\domain\scripts
\SYSVOL\SYSVOL
The default path for the SYSVOL tree is under the \WINDOWS or \WINNT folder
on the partition where the operating system is installed. However, the SYSVOL
tree may be installed on any partition that is formatted by using the NTFS file
system.
Verify that each domain controller in the domain has all the required folders and
that the reparse points exists. Re-create any missing folders as needed. Don't
use Windows Explorer to move or copy contents of the SYSVOL tree, or the
reparse points may be damaged.
The SYSVOL tree contains reparse points to other folders in the SYSVOL tree. These
reparse points are in the NTFS file system. Think of a reparse point as a source folder
that maps or points to a destination folder when the source folder is accessed. The
contents of the reparsed folders appear as mirror images of each other.
The following two reparse points for a SYSVOL tree are installed in the
C:\WINNT\SYSVOL folder:
3. Type ntfrsutl ds |findstr /i "root stage" , and then press ENTER. The
NTFRSUTIL command returns the current root directory for the SYSVOL replica set
that is referred to as the "replica set root" and the staging folder. For example, this
command returns:
Output
Root: C:\WINNT\SYSVOL\domain
Stage: C:\WINNT\SYSVOL\staging\domain
Output
Source DNS Domain Name is linked to %systemroot%\SYSVOL\domain
Output
7 Note
The path that is reported by the LINKD command varies depending on the
location of the SYSVOL\SYSVOL\DNS Domain Name folder. If the SYSVOL
folder is in the default location in the %systemroot%\SYSVOL folder, use the
commands that are listed. Otherwise, type the actual path of the SYSVOL
folders.
For example, if the NTFRSUTL and LINKD commands are run on a domain
controller in the contoso.com domain, and the SYSVOL folder is in the
C:\Windows\SYSVOL folder, the command syntax and results for the SYSVOL and
Staging folders will appear similar to the following output:
Console
Output:
Output
Root: C:\windows\sysvol\domain
Stage: C:\windows\\sysvol\staging\domain
Console
C:\>Linkd %systemroot%\SYSVOL\SYSVOL\Contoso.com
Output:
Output
Source domain.com is linked to C:\WINDOWS\SYSVOL\domain
Console
Output:
Output
To re-create the junction points if the LINKD command reports missing or invalid
junction points, follow these steps:
a. Type linkd C:\WINNT\SYSVOL\sysvol\DNS_Domain_Name Source , where Source is
the root path that is determined by using the NTFRSUTL command.
b. Type C:\linkd "C:\WINNT\SYSVOL\staging areas\DNS_Domain_Name" Source , where
Source is the stage path that is determined by using the NTFRSUTL command.
6. On all domain controllers in the domain, verify that enough staging space is
available. The ratio of staging area size to data set size depends upon a range of
factors.
To determine the size of the replica set root, right-click the replica set root that
uses the Winnt\SYSVOL\domain folder in Windows Explorer, and then select
Properties.
7. On the reference domain controller, build a good set of policies and scripts, and
then put them in a temporary folder outside the SYSVOL replica set folders on the
FRS reference domain controller.
To complete this step, examine Active Directory to determine the group policies
that are still used and that contain orphaned data. Policy information is located in
the Group Policies container. To view this container, follow these steps:
c. Expand the domain container, expand the System container, and then expand
the Policies container.
In the right pane of Active Directory Users and Computers, all the Group Policy
objects (GPOs) in Active Directory are listed. There should be a one-to-one
mapping between valid GPOs in Active Directory with Group Policy folders in
the SYSVOL tree.
If the SYSVOL folder contains a folder name that has a GUID that is not
listed in Active Directory, the file system contains an orphaned GPO, and
you can safely delete the folder from the file system.
If Active Directory contains a Group Policy GUID that does not map to a
GUID in the SYSVOL\domain\policies folder on any domain controller in
the domain, you can safely delete that policy setting from Active Directory.
7 Note
d. On the reference domain controller, delete any files or folders that are in the
FRS replica set root or in the replica set stage folders.
For default SYSVOL replica sets, delete files and folders under the following two
folders:
C:\WINNT\SYSVOL\domain
C:\WINNT\SYSVOL\staging\domain
7 Note
e. On the reference domain controller, move the policies and scripts folders and
the folder contents from the temporary location that you used in step c to the
FRS replica set root folder. For the SYSVOL folder, the default location for the
replica set root is the folder: C:\WINNT\SYSVOL\domain.
f. On all domain controllers except the reference domain controller, configure the
FRS to be non-authoritative. You can follow these steps:
ii. Locate and then select the BurFlags entry under the following registry
subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NtFrs\Parameters\Cu
mulative Replica Sets\GUID
GUID is the GUID of the domain system volume replica set that is shown in
the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NtFrs\Parameters\Re
plica Sets\GUID
iii. On the Edit menu, point to New, and then select DWORD Value.
iv. Type D2 for the name of the DWORD, and then press ENTER.
7 Note
For domain controllers that are not participating in Distributed File System
(DFS) replication, set the DWORD to D2 in the registry subkey for bulk
modifications:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NtFrs\Parameters\
Backup/Restore\Process atStartup\BurFlags .
The FRS is instructed to reinitialize its database and to overwrite the contents of
the SYSVOL tree with data from an upstream partner.
In large sites, we recommend that you use a staggered approach to rebuilding the
SYSVOL tree. This approach helps avoid overloading a single domain controller or
causing the FRS to source its contents from a domain controller that has not
completed its own re-sourcing of the system volume. This process involves setting
the Burflags registry entry to D2 on all hub site domain controllers before
proceeding to branch office or to satellite sites.
Use the Replica Set Parent registry entry to specify a source domain controller for
the D2 setting:
Path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NtFrs\Parameters\SY
7 Note
If this registry entry does not exist, you must create it.
We don't recommend that a single domain controller becomes the source for
more than 10 to 15 domain controllers at the same time. If you must source more
than 15 domain controllers off a single source, start the FRS on only 15
downstream partners of any particular source domain controller, and then wait for
them to complete sourcing the SYSVOL tree before the FRS service is started on
the next group of 15 computers.
7 Note
8. On all domain controllers in the domain except the reference domain controller,
delete any files or folders under the FRS replica set root and the replica set stage
directories. For example, for default SYSVOL replica sets, delete files and folders in
the following two locations:
C:\WINNT\SYSVOL\domain
C:\WINNT\SYSVOL\staging\domain
7 Note
This step enables faster replication of the SYSVOL tree for the given source. This
step eliminates the need for the FRS server to move the existing contents before
replicating the new data. This step is not required but it is recommended.
9. On all domain controllers in the hub site, except the reference domain controller,
restart FRS, and then verify that SYSVOL and NETLOGON are shared.
7 Note
The service startup type for the FRS should be set to Automatic.
10. On all non-reference domain controllers in the branch sites, start the FRS service
and verify that SYSVOL and NETLOGON are shared.
2. Manually copy the full set of policies to the following folder on each domain
controller:
7 Note
You may have to copy additional policies depending on Group Policy
requirements for the environment.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where events 6804 and 2843 are logged when
read-only domain controllers (RODC) don't replicate inbound the system volume
(SYSVOL) shared directory.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2,
Windows Server 2008 R2 Service Pack 1
Original KB number: 3212965
Symptoms
One or more read-only domain controllers (RODC) do not replicate inbound the system
volume (SYSVOL) shared directory. This issue occurs even though multiple inbound
Active Directory connections are listed when Active Directory Sites and Services
(Dssite.msc) is pointed at an affected RODC.
When this issue occurs, the following entry is logged in the DFSR event log:
Additionally, the following entry is logged in the Directory Service event log:
Additional Data
Option: 64
User Action
Restore the original replication connection for the local directory service instance on
a writable directory service instance.
When this issue occurs, new RODCs that are promoted work correctly. Also, demoting
and promoting an affected RODC fixes the issue.
7 Note
Outbound replication also does not occur. However, this behavior is by design on
an RODC.
Cause
This issue occurs because an administrator has deleted the automatically generated
"RODC Connection (FRS)" objects for these affected RODCs. This action may have been
done for one of the following reasons:
A customer notices that the connections are named "FRS" and, therefore, believes
that the connections are no longer required because DFSR is replicating SYSVOL.
The administrator created manual connection objects per local processes.RODCs
require a special flag on their connection objects in order for SYSVOL replication to
work. If the flag is not present, SYSVOL does not work for FRS or DFSR.
Resolution
To resolve this issue, follow these steps:
2. Start Dssite.msc.
3. Navigate to an affected RODC within its site, and scroll down to the NTDS Settings
object.
7 Note
4. Create a connection object, and give it the same name as the default object. For
example, name the object RODC Connection (FRS).
5. Edit the new connection in Adsiedit .msc or by using the Dssite.msc Attribute
Editor tab. Navigate to the options attribute, and then enter 0x40 in the Value
field.
6. Repeat steps 4 and 5 to create more connections, as necessary.
7. Force Active Directory replication outbound from this DC to the RODCs, or wait for
convergence to occur. When the DFSR service on the RODC sees these
connections, SYSVOL begins to replicate again.
About RT (NTDSCONN_OPT_RODC_TOPOLOGY,
0x00000040)
The NTDSCONN_OPT_RODC_TOPOLOGY bit in the options attribute indicates whether
the connection can be used for DRS replication (MS-DRDM). When the connection is set,
it should be ignored by DRS replication and used only by FRS replication.
7 Note
The 0x40 value is required for both DFSR and FRS. Other connections for Active
Directory replication are still required separately, and they exist on the RODC
locally.
References
7.1.1.2.2.1.2.1.3 RODC NTFRS Connection Object
Feedback
Was this page helpful? Yes No
This article describes troubleshooting steps to use on Windows 2000 domain controllers
that are missing netlogon and sysvol shares.
7 Note
This article applies to Windows 2000. Support for Windows 2000 ends on July 13,
2010. The Windows 2000 End-of-Support Solution Center is a starting point for
planning your migration strategy from Windows 2000. For more information, see
the Microsoft Support Lifecycle Policy.
Summary
The File Replication Service (FRS) is a multi-threaded, multi-master replication engine
that replaces the LMREPL service in Windows NT 3.x and 4.0. Windows 2000 domain
controllers and servers use FRS to replicate system policy and login scripts for Windows
2000 and down-level clients.
FRS can also replicate content between Windows 2000 servers hosting the same fault-
tolerant DFS roots or child node replicas.
More information
Missing netlogon and sysvol shares typically occur on replica domain controllers in an
existing domain, but may also occur on the first domain controller in a new domain. The
following steps are directed more at the replica domain controller scenario, but can be
applied to the first domain controller in the domain by ignoring the replication-specific
steps.
Use the "Sites and Services" (Dssite.msc) snap-in to examine the connection
objects that exist between the problem computer and existing domain controllers.
For replication to occur between computer \\M1 and \\M2, \\M1 should have an
inbound connection object from \\M2, and \\M2 an inbound connection object
from \\M1. Use the "Connect to Domain Controller..." command in Dssite.msc to
view and compare each domain controllers perspective of the intra-domain
connection objects.
If no connection objects exist for the new replica member, use the Check
Replication Topology command in Dssite.msc to force KCC to build the necessary
automatic connection objects (press F5 to refresh the view afterwards).
2. Active Directory replication is taking place between the new and existing domain
controllers in the domain.
Console
3. The server used to source the Active Directory and SYSVOL folder should have
created NETLOGON and SYSVOL shares itself.
After the Dcpromo.exe program has restarted the computer, FRS first attempts to
source the SYSVOL from the computer identified in the "Replica Set Parent"
registry key under:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTFRS\Parameters\SysVol\D
omainName
7 Note
The 2195 release of Ntfrs.exe prevents replication from this initial source server,
delaying SYSVOL replication until FRS can attempt replication from an inbound
replication partner in the domain over an automatic or manual NTDS connection
object.
All potential source domain controllers in the domain should themselves have
shared the NETLOGON and SYSVOL shares and applied default domain and
domain controllers policy.
domain
DO_NOT_REMOVE_NtFrs_PreInstall_Directory
Policies
{GUID}
Adm
MACHINE
USER
{GUID}
Adm
MACHINE
USER
{etc.,}
scripts
staging
staging areas
MyDomainName.com
scripts
sysvol(sysvol share)
MyDomainName.com
DO_NOT_REMOVE_NtFrs_PreInstall_Directory
Policies
{GUID}
Adm
MACHINE
USER
{GUID}
Adm
MACHINE
USER
{etc.,}
scripts(NETLOGON share)
4. The "Enterprise Domain Controllers" group should be granted the "access this
computer from network" right in the default domain controllers policy on the
domain controllers OU.
Replication of the Active Directory during the use of the Dcpromo.exe program
uses the credentials that are specified in the Active Directory Installation Wizard.
Upon restart, replication occurs in the context of the domain controller's computer
account. All source domain controllers in the domain must successfully replicate
and apply the policy granting the "Enterprise Domain Controllers" group "Access
this computer from network" right. For quick verification, look for event 1704s in
the application log of potential source domain controllers. For detailed verification,
run security configuration analysis against the Basicdc.inf template (requires
defining environment variables for SYSVOL, DSLOG, and DSIT, and examine the
resulting log output.
The "access this computer from network" right is often missing on Windows NT 4.0
domains that are upgraded to Windows 2000. This issue causes active directory
and FRS replication to be unsuccessful with "access denied" error messages.
5. Each domain controller must be able to resolve (ping) the fully qualified computer
names (%computer name%.<domain name>) of computers participating in the
replica set.
For SYSVOL, this step means pinging the FQ computer name of all domain
controllers in the domain. Confirm the address returned by the ping command
matches the IP address returned by IPCONFIG at the console of each replica set
partner.
Run NTFRSUTL DS [COMPUTERNAME] on all replica set members. Confirm that all
domain controllers in the domain show up under the "SET: DOMAIN
SYSTEMVOLUME (SYSVOL SHARE)" portion of the NTFRSUTL output. The SYSVOL
Replica set and its members can also be displayed under cn="domain system
volume",cn=file replication service,cn=system,dc=<FQDN> in the User and
Computers (Dsa.msc) snap-in when "Advanced Features" is enabled under the
View menu.
Output
11. Check the destination folder and the staging folder (displayed in "NTFRSUTL DS")
of the new replica to see if files are replicating. Files in the staging folder should be
in the process of being moved to the final location. That the number of files in the
staging or destination folder is constantly changing is a good sign as either files
are being replicated in, or transitioned to the destination folder.
7 Note
Feedback
Was this page helpful? Yes No
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve High Availability-related issues. The topics are divided into
subcategories. Browse the content or use the search feature to find relevant content.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that the Active route is removed when you
add a static persistent route to a network adapter.
Symptoms
When you add a static persistent route to a network adapter that is on a Windows
Server 2008 Failover Cluster and take a clustered IP Address offline (or move it to
another node), the "Active" route is removed and no connections can be made using
this route even though it still shows as persistent when running the ROUTE PRINT
command. Once you bring the Clustered IP Address back online, the active route is
returned.
Cause
When a clustered IP Address goes offline, it takes down the "active" route that was
added as a persistent route as well. This will only occur when both of the following are
true:
Resolution
When using the ROUTE.EXE command, the most common command to add a persistent
would be this:
More information
In Windows 2008 and above, the supported method for adding a persistent route is to
also include the network card interface. There are two methods to determine the
interface number of the network card. When executing the ROUTE PRINT or NETSH
command, it will give you the interfaces at the top first. Something similar to this:
Console
C:\>route print
IPv4 Route Table
========================================
Interface List
23 ...00 15 5d 4a ac 06 ...... Local Gigabit Controller
19 ...00 15 5d 4a ac 01 ...... Local Gigabit Controller #2
18 ...00 15 5d 4a ac 00 ...... Local Gigabit Controller #3
========================================
-or-
Console
Feedback
Was this page helpful? Yes No
Troubleshooting checklist
1. Review the system and the cluster log to find the exact errors or warnings that
prevent the network name from coming online. Usually, in addition to Event ID
1069, Event ID 1207 is also logged:
Event ID 1069
Event ID 1207
2. Ensure that the Virtual Computer Object (VCO) or Cluster Name Object (CNO) has
appropriate permissions in Active Directory. For more information, see Prestage
Cluster Computer Objects in Active Directory Domain Services.
3. If CNO is affected, after adjusting the permissions, you can run the Repair option
to sync the AD password for the CNO again. For more information, see
Understanding the Repair Active Directory Object Recovery Action .
4. You can run a cluster validation (without the storage section) to check the
supportability of the cluster and see if there are any misconfigurations.
5. The CNO or VCO might not be able to come online because of DNS issues. The
permissions for the CNO or VCO records need to be checked as well. Network
traces will show the cause of the issue.
Event ID 1050
Cluster network name resource '%1' cannot be brought online because name '%2'
matches this cluster node name. Ensure that network names are unique.
Event ID 1051
Cluster network name resource '%1' cannot be brought online.
Event ID 1052
Cluster Network Name resource '%1' cannot be brought online because the name
could not be added to the system.
This event indicates that the cluster couldn't locate a writeable domain controller.
Event ID 1212
Cluster network name resource '%1' cannot be brought online.
In a cluster, a Network Name resource can be important because other resources
depend on it. A Network Name resource can come online only if it is configured
correctly, and is supported correctly by available networks and network
configurations.
This event indicates that the cluster couldn't locate a writeable domain controller.
Event ID 1218
Cluster network name resource '%1' failed to perform a name change operation
(attempting to change original name '%3' to name '%4')
This event indicates that the cluster couldn't find the CNO in Active Directory. The next
time you try to bring the cluster online, it will try to recreate the CNO.
Event ID 1219
Cluster network name resource '%1' failed to perform a name change operation
This event indicates that the cluster couldn't contact a domain controller.
7 Note
Console
7 Note
3. Generate a fresh cluster log and review it. To generate a fresh cluster log,
reproduce the issue and open an elevated PowerShell prompt. At the elevated
PowerShell prompt, run the following cmdlet:
If you identify an issue that you can fix, fix it and try to start the affected clustered
resource again.
Feedback
Was this page helpful? Yes No
Troubleshooting checklist
1. Review the system and the cluster log to find the exact errors or warnings that
prevent the IP address from coming online.
2. Check the IP address for this resource and ensure that the status of the
corresponding cluster network is UP under Networks in Failover Cluster Manager.
3. If you create a new IP address within an empty group from the same cluster
network, does it come online?
4. Check the output of the ipconfig /all command and compare the information of
the affected network with a working one.
5. Disable or enable the Network Interface Card (NIC) that's corresponding to the
cluster network for the affected IP address.
For Event ID 1046, 1047, 1048, 1049, 1078, and 1223, check the role that is
configured for a cluster network.
For Event ID 1360, 1361, and 1362, review the logs to find more information about
the issue.
Event ID 1046
Cluster IP address resource '%1' cannot be brought online because the subnet mask
value is invalid.
Event ID 1047
Cluster IP address resource '%1' cannot be brought online because the address
value is invalid.
Event ID 1048
Cluster IP address resource '%1' failed to come online.
Event ID 1049
Cluster IP address resource '%1' cannot be brought online because a duplicate IP
address '%2' was detected on the network.
Event ID 1078
Cluster IP address resource '%1' cannot be brought online because WINS
registration failed on interface '%2' with error '%3'.
Event ID 1223
Cluster IP address resource '%1' cannot be brought online because the cluster
network '%2' is not configured to allow client access.
Cluster networks are automatically created for all logical subnets connected to all
nodes in the Cluster. Each network adapter card connected to a common subnet will
be listed in Failover Cluster Manager. Cluster networks can be configured for
different uses.
1. In Failover Cluster Manager, if the cluster you want to configure isn't displayed, in
the console tree, right-click Failover Cluster Manager, select Manage a Cluster,
and then select or specify the cluster that you want.
2. If the console tree is collapsed, expand the tree under the cluster that you want to
configure.
3. Expand Networks.
4. Right-click the network that you want to check settings for and select Properties.
5. If you want to use this network for the cluster, make sure that the Allow the cluster
to use this network option is selected. If you select this option and want the
network to be used by clients (not just the nodes), make sure that the Allow clients
to connect through this network option is selected.
If you change any of the settings, try to bring the resource online again before you
proceed.
Event ID 1360
Cluster IP address resource '%1' failed to come online.
A failover cluster requires network connectivity among nodes and between clients
and nodes. Problems with a network adapter or other network device (either
physical problems or configuration problems) can interfere with connectivity.
Event ID 1361
IPv6 Tunnel address resource '%1' failed to come online because it does not depend
on an IP Address (IPv4) resource.
This event indicates that the correct dependencies aren't configured for the IPv6 Tunnel
Address resource.
Event ID 1362
Cluster IP address resource '%1' failed to come online because the '%2' property
could not be read.
7 Note
2. To search for information about an error code, use one of the following methods:
See system error codes.
Console
7 Note
3. Generate a fresh cluster log and review it. To generate a fresh cluster log,
reproduce the issue and open an elevated PowerShell prompt. At the elevated
PowerShell prompt, run the following cmdlet:
If you identify an issue that you can fix, fix it and try to start the affected clustered
resource again.
Feedback
Was this page helpful? Yes No
Troubleshooting checklist
1. Review the system and the cluster log to find the exact errors or warnings that
prevent the physical disk from coming online.
2. Set the cluster log to a detail level of 5 to have verbose information from the
online attempt:
Set-ClusterLog -Level 5
3. Capture a performance monitor log or a Storport trace to check for poor disk
performance, which might delay the online process.
4. Cluster validation is useful in this scenario also. You can create a new cluster disk
from the same SAN and point the cluster validation to that disk.
5. If the cluster Resource Hosting Subsystem (Rhs.exe) process crashes during the
failed online attempt, then you need to configure the server to generate a full
memory dump and set the following registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Failover
Clusters\DebugBreakOnDeadlock to DWORD 3.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClusSvc\Parameters\
DebugBreakOnDeadlock to DWORD 3.
7 Note
After the registry key is configured, the server on which the RHS deadlock
occurs displays a blue screen and generates a stop 0x9E memory dump. You
can then analyze it and address the cause.
Possible solutions
If disks read or write response times are slow (slow disk performance), contact the
storage vendor.
If the antivirus interferes with the online attempt, uninstall and reboot the server to
remove the filter drivers.
7 Note
Event ID 1035
While disk resource '%1' was being brought online, access to one or more volumes
failed with error '%2'.
In a failover cluster, most clustered services or applications use at least one disk,
also called a disk resource, that you assign when you configure the clustered service
or application. Clients can use the clustered service or application only when the
disk is functioning correctly.
7 Note
Console
7 Note
3. Generate a fresh cluster log and review it. To generate a fresh cluster log,
reproduce the issue and open an elevated PowerShell prompt. At the elevated
PowerShell prompt, run the following cmdlet:
If you identify an issue that you can fix, fix it and try to bring the cluster resource online
again before you proceed.
7 Note
If you change the storage configuration, we recommend that you use the Validate a
Configuration wizard to validate the storage configuration.
Event ID 1183
Cluster disk resource '%1' contains an invalid mount point.
In a failover cluster, most clustered services or applications use at least one disk,
also called a disk resource, that you assign when you configure the clustered service
or application. Clients can use the clustered service or application only when the
disk is functioning correctly.
Confirm that the mounted disk is configured according to the following guidelines:
Clustered disks can only be mounted onto clustered disks (not local disks).
The mounted disk and the disk it's mounted onto must be part of the same
clustered service or application. The disks can't be in two different clustered
services or applications, and they can't be in the general pool of available storage
in the cluster.
For more information, see Use Cluster Shared Volumes in a failover cluster.
If you identify an issue that you can fix, fix it and try to bring the resource online again
before you proceed.
Event ID 5394
The Cluster service encountered some storage errors while trying to bring storage
pool online.
) Important
Be aware that the clustered service or application remains offline for the duration of
the storage validation testing.
1. In the Failover Cluster Manager snap-in, select Failover Cluster Management >
Management > Validate a Configuration.
2. Follow the instructions in the wizard to specify the cluster you want to test.
4. On the Test Selection page, clear all check boxes except those for the Storage and
Inventory tests that appear to be relevant to your situation.
Feedback
Was this page helpful? Yes No
This article provides help to solve an issue where the disk resource fails to come online
when the name of the cluster disk resource has an invalid character.
Symptoms
If the name of a Cluster disk resource has an invalid character in it from an NTFS
perspective '\' '/' character and there is some file on the root of the drive where the
cluster doesn't have READ permission or if the file is in use, then the disk resource fails
to come online.
Cause
The name of the 'Physical Disk' resource has a backslash or forward slash character in
the resource name. Example: "Disk G:\" and 'Local System' cannot open a handle to a file
at root of drive (whether because it's in use or permissions).
Resolution
To fix this issue, install hotfix 3033918 .
Workaround
To work around this issue, either remove the invalid character(s) in resource names for
'Physical Disk' resource types OR have 'Local System' account at least Read permission
to files at the root of the drive. After making the changes, you should be able to bring
the disk resource online.
7 Note
It is not recommended to store files at the root of a clustered disk as the cluster
needs to open handles to files and folders as part of the health detection
mechanism used to determine possible access issues to storage. Since the cluster
service runs in the context of the 'Local System' account, if that account does not
have permission to files at the root of a drive, the health check may fail.
More information
Cluster tries to enumerate files on the disk during an Online event and if it is not able to
enumerate files on the root of the cluster disk, it would fail the disk.
The disk gets marked as dirty as the name had an invalid character and would run
chkdsk before the disk is brought online successfully next time. Following events may be
noted in the system event log after you correct the problem and online the disk for the
first time.
This does not indicate actual corruption on the disk. What happened is that cluster set
the dirty bit on the disk so chkdsk is run to verify an intact file system.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where cluster fileshare resource fails on a
failover cluster node.
Symptoms
Consider the following scenario:
In Windows Server 2008, 2008 R2 or 2012 you set up a Windows failover cluster
with a highly available file server.
The cluster nodes are configured with a disjointed namespace in which the
computer's primary DNS suffice does not match the DNS domain of which it is a
member.
In this scenario, you may notice that the highly available file server works fine on some
of the cluster nodes but consistently fails on others. In examining the cluster log, you
see something similar to the following entries with the first entry referring to "status 5.
Tolerating...":
Cause
One or more nodes of the failover cluster may contain mismatched entries in the DNS
suffix search list.
Resolution
To resolve the issue, verify all cluster nodes are configured with the same DNS suffix
search list and the entries are listed in the same order. The DNS suffix search list can be
modified using the following steps:
More information
For additional information on the setup and use of a disjointed namespace, refer to the
following link:
Feedback
Was this page helpful? Yes No
Summary
Microsoft Cluster Server (MSCS) provides the ability to define an IP address resource
within a cluster, and for it to failover from one node to another.
Ability to update the network address translation caches of other systems attached
to the subnet on which an address is registered.
Dynamic address registration and deregistration are already implemented within the
Microsoft Windows NT operating system to support the lease of IP addresses using the
Dynamic Host Configuration Protocol (DHCP).
Microsoft Cluster Server uses existing features within Windows NT for IP address
registration and deregistration. When the cluster component attempts to bring an IP
Address resource online, the software sends a command to the TCP/IP driver to register
the specified address. A similar command exists to unregister an address when the
corresponding resource is taken offline.
The cluster software updates the translation caches of other systems on the LAN
through the Address Resolution Protocol (ARP) specification (RFC 826), which is
implemented by Windows NT. The specification states that all systems receiving an ARP
request must update their IP Address to physical address mapping for the source of the
request (the source IP and physical network addresses are contained within the request).
Further, as part of the IP address registration process, the Windows NT TCP/IP driver
broadcasts an ARP request on the appropriate LAN several times. The request asks the
owner of the specified IP address to respond with its physical network address. By
sending these requests for the IP address being registered, Windows NT may detect IP
address conflicts; if a response is received, the address cannot be safely used.
When the driver sends these requests, Windows NT specifies the IP address being
registered as the source of the request. Thus, all systems on the network will update
their ARP cache entries for the specified address. Therefore, the registering system
becomes the new owner of the address.
7 Note
If an address conflict occurs, the responding system may send out another ARP
request for the same address, forcing the other systems on the subnet to update
their caches again. Windows NT does this when it detects a conflict with an address
that it has successfully registered.
More information
For additional information about related information, click the article number below to
view the article in the Microsoft Knowledge Base:
MAC Address Changes for Virtual Server During a Failover with Clustering
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2016, all editions, Windows Server 2012 R2 Datacenter
Symptoms
In a failover clustering environment, when you run the cluster validation process,
Windows creates a new user account. After this occurs, you might notice security events
or messages that describe this account. The account is temporary. Windows removes
the account when the cluster validation process ends.
More information
During the cluster validation process, Windows creates a user account that has the
following properties:
The cluster validation process uses this account to connect to clustered shares across
cluster nodes. When the cluster validation process ends, Windows deletes the account.
Feedback
Was this page helpful? Yes No
This article describes how to resolve the error messages when you try to bring a cluster
group online after a cluster stops.
Symptoms
After you manually turn off a cluster, or after a cluster fails, a group and all of its
resources may fail over if the cluster suffers a loss of a node. However, the group may
also go into an offline state. If you try to bring either the group or the resource online,
you may receive the following error message:
If you try to bring an individual resource in the group online, you may receive either of
the following error messages:
The cluster resource cannot be brought online. The owner node cannot run this
resource.
-or-
No possible owners are specified for this resource. This means that this resource
cannot be brought online on any node in the cluster.
Cause
If you use the Move Group functionality to manually move a group from one node to
another, or if the cluster fails, a Possible Owners list is built for the entire group and for
all of the resources in the group. The behavior that is described in the "Summary"
section of this article can occur if one of the resources in the group that does not come
online does not have an online node listed in the Possible Owners list.
Resolution
To work around this behavior, bring the node that was taken offline back online. Move
the group back to the node that you just brought online, and then check the Possible
Owners list of each resource to verify that the node on which the group did not come
online is listed.
If you can't bring the node online because the node truly failed, add the proper node to
the Possible Owners list:
1. In Cluster Administrator, open the General properties of each resource and review
the Possible Owners list.
After you find the resource that has a blank Possible Owners list and a dimmed
Modify button, note the name of this resource
2. Open a command prompt, and type the following command. name of resource is
the name of the resource that you noted in step 1:
3. From the command prompt, run the following command to add the other node to
the Possible Owners list, where missing node is the node that is down:
cluster res name of resource /addowner: missing node
4. In Cluster Administrator, bring the group that was previously in the offline state
online again.
7 Note
After the group comes online, if you have problems reviewing the resources in
Cluster Administrator, quit Cluster Administrator, and then reconnect to the cluster.
Status
This behavior is by design.
More information
The Possible Owners list isn't useful on a cluster that has fewer than three nodes. The
Cluster service builds a list of possible owners for a group. The location on which the
group that contains that resource is hosted is affected if you change the Possible
Owners list for a resource. Internally, an ordered list is maintained for the location on
which the group is hosted. If you remove a possible owner for a resource, you remove
that node from the Possible Owners list.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error (Error 0x8000ffff: Catastrophic failure) that
occurs when you change Shadow Copy settings for a drive.
Symptoms
Consider the following scenario:
In Windows Server 2008, you open Windows Explorer, you right-click a drive, and
then you click Properties.
On the Shadow Copies tab, you select a drive letter and then click the Settings
button.
Log Name: Application Source: VSS Event ID: 12311 Task Category: None Level: Error
Description: Volume Shadow Copy Service error: Unexpected error pResource-
>get_Disk(&pDisk): hr = 0x80070490.
Cause
This problem occurs if there are disk resources in the failover cluster that don't have a
physical disk resource associated with them. This behavior may occur if you take a disk
resource offline and remove the associated disk from the server, but you don't delete
the disk resource in the failover cluster.
Resolution
In the failover cluster, delete the disk resource that no longer has a physical disk
associated with it.
Feedback
Was this page helpful? Yes No
This article lists the Failover Clustering events from the Windows Server System log (viewable in
Event Viewer). These events all share the event source of FailoverClustering and can be helpful when
troubleshooting a cluster.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Azure Stack HCI,
versions 21H2 and 20H2
Critical events
Cluster service failed a validity check on line %1 of source module %2. '%3'
Cluster service was halted due to incomplete connectivity with other cluster
nodes.
The cluster database could not be loaded. The file may be missing or corrupt.
Automatic repair might be attempted.
The Cluster service was halted to prevent an inconsistency within the failover
cluster. The error code was '%1'.
The Cluster service failed to update the cluster database (error code '%1').
Possible causes are insufficient disk space or file system corruption.
Failed to form cluster '%1' with error code '%2'. Failover cluster will not be
available.
The Cluster service cannot identify node '%1' as a member of failover cluster
'%2'. If the computer name for this node was recently changed, consider
reverting to the previous name. Alternatively, add the node to the failover
cluster and if necessary, reinstall clustered applications.
Event 1105: CS_EVENT_RPC_INIT_FAILED
Output
Cluster node '%1' was removed from the active failover cluster membership. The
Cluster service on this node may have stopped. This could also be due to the
node having lost communication with other active nodes in the failover cluster.
Run the Validate a Configuration wizard to check your network configuration. If
the condition persists, check for hardware or software errors related to the
network adapters on this node. Also check for failures in any other network
components to which the node is connected such as hubs, switches, or bridges.
The cluster Resource Hosting Subsystem (RHS) process was terminated and will be
restarted. This is typically associated with cluster health detection and
recovery of a resource. Refer to the System event log to determine which
resource and resource DLL is causing the issue.
The Cluster service is shutting down because quorum was lost. This could be due
to the loss of network connectivity between some or all nodes in the cluster, or
a failover of the witness disk.
Cluster resource '%1' cannot be brought online because the associated service
failed to start. The service return code is '%2'. Please check for additional
events associated with the service and ensure the service starts correctly.
Event 1247: CLUSTER_EVENT_INVALID_SERVICE_SID_TYPE
Output
The Security Identifier (SID) type for the cluster service is configured as '%1'
but the expected SID type is 'Unrestricted'. The cluster service is
automatically modifying its SID type configuration with the Service Control
Manager (SCM) and will restart in order for this change to take effect.
The Security Identifier (SID) '%1' associated with the cluster service is not
present in the process token. The cluster service will automatically correct
this problem and restart.
Security Handshake between local and remote endpoints '%2' did not complete in
'%1' seconds, node terminating the connection
The restore request for the cluster configuration data has failed. This restore
failed during the 'pre-restore' stage usually indicating that some nodes
comprising the cluster are not currently operational. Ensure that the cluster
service is running successfully on all nodes comprising this cluster.
The restore operation of the cluster configuration data has failed. This restore
failed during the 'post-restore' stage usually indicating that some nodes
comprising the cluster are not currently operational. It is recommended that you
replace the current cluster configuration data file (ClusDB) with '%1'.
Node '%1' attempted to join a failover cluster but failed due to incompatibility
between versions of the cluster service software. If node '%1' or a different
node in the cluster has been recently upgraded, please verify that the changed
cluster deployment with different versions of the cluster service software is
supported.
This cluster node has lost all network connectivity. It cannot participate in the
cluster until connectivity is restored. The cluster service on this node
will be terminated.
Event 1556:
SERVICE_UNHANDLED_EXCEPTION_IN_WORKER_THREAD
Output
The cluster service encountered an unexpected problem and will be shut down. The error
code was '%2'.
Guidance
Attempt to start the cluster service on all nodes in the cluster so that nodes with the latest copy of
the cluster configuration data can first form the cluster. This node will then be able join the cluster
and will automatically obtain the updated cluster configuration data. If there are no nodes available
with the latest copy of the cluster configuration data, run the Start-ClusterNode -FQ Windows
PowerShell cmdlet. Using the ForceQuorum (FQ) parameter will start the cluster service and mark this
node's copy of the cluster configuration data to be authoritative. Forcing quorum on a node with an
outdated copy of the cluster database may result in cluster configuration changes that occurred
while the node was not participating in the cluster to be lost.
File share witness resource '%1' failed to arbitrate for the file share '%2'.
Please ensure that file share '%2' exists and is accessible by the cluster.
Node '%1' failed to establish a communication session while joining the cluster.
This was due to an authentication failure. Please verify that the nodes are
running compatible versions of the cluster service software.
Node '%1' failed to establish a communication session while joining the cluster.
This was due to an authorization failure. Please verify that the nodes are
running compatible versions of the cluster service software.
Node '%1' failed to join the cluster because it could not send and receive
failure detection network messages with other cluster nodes. Please run the
Validate a Configuration wizard to ensure network settings. Also verify the
Windows Firewall 'Failover Clusters' rules.
The failover cluster database could not be unloaded. If restarting the cluster
service does not fix the problem, please restart the machine.
An attempt to forcibly start the cluster service has failed because the cluster
configuration data on this node is either missing or corrupt. Please first start
the cluster service on another node that has an intact and valid copy of the
cluster configuration data. Then, reattempt the start operation on this node
(which will attempt to obtain updated valid configuration information
automatically). If no other node is available, please use WBAdmin.msc to perform
a System State Restore of this node in order to restore the configuration data.
The failover cluster database could not be unloaded and any potentially
incorrect changes in memory could not be discarded. The cluster service will
attempt to repair the database by retrieving it from another cluster node. If
the cluster service does not come online, restart the cluster service on this
node. If restarting the cluster service does not fix the problem, please restart
the machine. If the cluster service fails to come online after a reboot, please
restore the cluster database from the last backup. The current database was
copied to '%1'. If no backups are available, please copy '%1' to '%2' and
attempt to start the cluster service. If the cluster service then comes online
on this node, some cluster configuration changes may be lost and the cluster may
not function properly. Run the Validate a Configuration wizard to check your
cluster configuration and verify that the hosted Services and Applications are
online and functioning correctly.
Cluster node '%1' has been quarantined. The node experienced '%2' consecutive
failures within a short amount of time and has been removed from the cluster to
avoid further disruptions. The node will be quarantined until '%3' and then the
node will automatically attempt to re-join the cluster.
Refer to the System and Application event logs to determine the issues on this
node. When the issue is resolved, quarantine can be manually cleared to allow
the node to rejoin with the 'Start-ClusterNode -ClearQuarantine' Windows
PowerShell cmdlet.
Node Name : %1
Error events
The registry checkpoint for cluster resource '%1' could not be restored to
registry key HKEY_LOCAL_MACHINE\%2. The resource may not function correctly.
Make sure that no other processes have open handles to registry keys in this
registry subtree.
Cluster physical disk resource '%1' cannot be brought online because the
associated disk could not be found. The expected signature of the disk was '%2'.
If the disk was replaced or restored, in the Failover Cluster Manager snap-in,
you can use the Repair function (in the properties sheet for the disk) to repair
the new or restored disk. If the disk will not be replaced, delete the
associated disk resource.
While disk resource '%1' was being brought online, access to one or more volumes
failed with error '%2'. Run the Validate a Configuration wizard to check your
storage configuration. Optionally you may want to run Chkdsk to verify the
integrity of all volumes on this disk.
The file system for one or more partitions on the disk for resource '%1' may be
corrupt. Run the Validate a Configuration wizard to check your storage
configuration. Optionally, you may want to run Chkdsk to verify the integrity of
all volumes on this disk.
Event 1038: RES_DISK_RESERVATION_LOST
Output
Ownership of cluster disk '%1' has been unexpectedly lost by this node. Run the
Validate a Configuration wizard to check your storage configuration.
Generic application '%1' could not be brought online (with error '%2') during an
attempt to create the process. Possible causes include: the application may not
be present on this node, the path name may have been specified incorrectly, the
binary name may have been specified incorrectly.
Generic service '%1' could not be brought online (with error '%2') during an
attempt to open the service. Possible causes include: the service is either not
installed or the specified service name is invalid.
Generic service '%1' could not be brought online (with error '%2') during an
attempt to start the service. Possible cause: the specified service parameters
might be invalid.
Generic service '%1' failed with error '%2'. Please examine the application
event log.
Cluster IP address resource '%1' cannot be brought online because the subnet
mask value is invalid. Please check your IP address resource properties.
Cluster IP address resource '%1' cannot be brought online because the address
value is invalid. Please check your IP address resource properties.
Cluster IP address resource '%1' failed to come online. Configuration data for
the network adapter corresponding to cluster network interface '%2' could not be
determined (error code was '%3'). Please check that the IP address resource is
configured with the correct address and network properties.
Cluster network name resource '%1' cannot be brought online because name '%2'
matches this cluster node name. Ensure that network names are unique.
Cluster network name resource '%1' cannot be brought online. Ensure that the
network adapters for dependent IP address resources have access to at least one
DNS server. Alternatively, enable NetBIOS for dependent IP addresses.
Event 1052: RES_NETNAME_CANT_ADD_NAME_STATUS
Output
Cluster Network Name resource '%1' cannot be brought online because the name
could not be added to the system. The associated error code is stored in the
data section.
Cluster File Share '%1' cannot be brought online because the share could not be
created.
Health check for file share resource '%1' failed. Retrieving information for
share '%2' (scoped to network name %3) returned error code '%4'. Ensure the
share exists and is accessible.
Health check for file share resource '%1' failed. Retrieving information for
share '%2' (scoped to network name %3) indicated that the share does not exist
(error code '%4'). Please ensure the share exists and is accessible.
Based on the failure policies for the resource and role, the cluster service may try to
bring the resource online on this node or move the group to another node of the
cluster and then restart it. Check the resource and group state using Failover
Cluster Manager or the Get-ClusterResource Windows PowerShell cmdlet.
Cluster resource '%1' of type '%3' in clustered role '%2' failed. The error code
was '%5' ('%4').
Based on the failure policies for the resource and role, the
cluster service may try to bring the resource online on this node or move the
group to another node of the cluster and then restart it. Check the resource and
group state using Failover Cluster Manager or the Get-ClusterResource Windows
PowerShell cmdlet.
Cluster resource '%1' of type '%3' in clustered role '%2' failed. The error code
was '%4'.
Based on the failure policies for the resource and role, the
cluster service may try to bring the resource online on this node or move the
group to another node of the cluster and then restart it. Check the resource and
group state using Failover Cluster Manager or the Get-ClusterResource Windows
PowerShell cmdlet.
Cluster resource '%1' of type '%3' in clustered role '%2' failed due to an
attempt to block a required state change in that cluster resource.
Health check for IP interface '%1' (address '%2') failed (status is '%3'). Run
the Validate a Configuration wizard to ensure that the network adapter is
functioning properly.
Encrypted settings for cluster resource '%1' could not be successfully applied
to the container name '%2' on this node.
Cluster network interface '%1' for cluster node '%2' on network '%3' failed. Run
the Validate a Configuration wizard to check your network configuration. If the
condition persists, check for hardware or software errors related to the network
adapter. Also check for failures in any other network components to which the
node is connected such as hubs, switches, or bridges.
Cluster network '%1' is partitioned. Some attached failover cluster nodes cannot
communicate with each other over the network. The failover cluster was not able
to determine the location of the failure. Run the Validate a Configuration
wizard to check your network configuration. If the condition persists, check for
hardware or software errors related to the network adapter. Also check for
failures in any other network components to which the node is connected such as
hubs, switches, or bridges.
Cluster network '%1' is down. None of the available nodes can communicate using
this network. Run the Validate a Configuration wizard to check your network
configuration. If the condition persists, check for hardware or software errors
related to the network adapter. Also check for failures in any other network
components to which the node is connected such as hubs, switches, or bridges.
Cluster file share resource '%1' cannot be brought online. Creation of DFS
namespace root failed with error '%3'. This may be due to failure to start the
'DFS Namespace' service or failure to create the DFS-N root for share '%2'.
Cluster file share resource '%1' for DFS Namespace cannot be brought online due
to error '%2'.
Cluster resource '%1' cannot be brought online because the associated service
failed an attempted restart. The error code is '%2'. The service required a
restart in order to update parameters. However, the service failed before it
could be stopped and restarted. Please check for additional events associated
with the service and ensure the service is functioning correctly.
Cluster disk resource '%1' contains an invalid mount point. Both the source and
target disks associated with the mount point must be clustered disks, and must
be members of the same group.
Cluster network name resource '%1' failed to delete its associated computer
object in domain '%2'. The error code was '%3'.
Please have a domain administrator manually delete the computer object from the Active
Directory domain.
Event 1192:
RES_NETNAME_DELETE_COMPUTER_ACCOUNT_FAILED
Output
Cluster network name resource '%1' failed to delete its associated computer
object in domain '%2' for the following reason: %3.
Please have a domain administrator manually delete the computer object from the Active
Directory domain.
Event 1193:
RES_NETNAME_ADD_COMPUTER_ACCOUNT_FAILED_STATUS
Output
Cluster network name resource '%1' failed to create its associated computer
object in domain '%2' for the following reason: %3.
- The cluster identity '%4' can create computer objects. By default all computer
objects are created in the 'Computers' container; consult the domain
administrator if this location has been changed.
- The quota for computer objects has not been reached.
- If there is an existing computer object, verify
the Cluster Identity '%4' has 'Full Control' permission to that computer object
using the Active Directory Users and Computers tool.
Cluster network name resource '%1' failed to create its associated computer
object in domain '%2' during: %3.
- The cluster identity '%5' has Create Computer Objects permissions. By default all
computer
objects are created in the same container as the cluster identity '%5'.
- The quota for computer objects has not been reached.
- If there is an existing computer object, verify the Cluster Identity '%5' has 'Full
Control' permission
to that computer object using the Active Directory Users and Computers tool.
Cluster network name resource '%1' failed registration of one or more associated
DNS name(s). The error code was '%2'. Ensure that the network adapters
associated with dependent IP address resources are configured with access to at
least one DNS server.
Cluster network name resource '%1' failed registration of one or more associated
DNS name(s) for the following reason: %2.
Ensure that the network adapters associated with dependent IP address resources are
configured with at least one accessible DNS server.
The Cluster service failed to bring clustered role '%1' completely online or
offline. One or more resources may be in a failed state. This may impact the
availability of the clustered role.
Event 1206:
RES_NETNAME_UPDATE_COMPUTER_ACCOUNT_FAILED_STATUS
Output
The computer object associated with the cluster network name resource '%1' could not be
updated in domain '%2'. The error code was '%3'. The cluster identity '%4' may lack
permissions required to update the object. Please work with your domain administrator
to ensure that the cluster identity can update computer objects in the domain.
Event 1207:
RES_NETNAME_UPDATE_COMPUTER_ACCOUNT_FAILED
Output
The computer object associated with the cluster network name resource '%1' could
not be updated in domain '%2' during the %3 operation.
The cluster identity '%5' may lack permissions required to update the object. Please
work with your domain administrator to ensure that the cluster identity can update
computer objects in the domain.
Cluster disk resource '%1' contains an invalid mount point. Both the source and
target disks associated with the mount point must be clustered disks, and must
be members of the same group.
Mount point '%2' for volume '%3' references an invalid target disk. Please ensure that
the target disk is also a clustered disk and in the same group as the source disk
(hosting the mount point).
Cluster network name resource '%1' cannot be brought online. Attempt to locate a
writeable domain controller (in domain %2) in order to create or update a
computer object associated with the resource failed. The error code was '%3'.
Ensure that a writeable domain controller is accessible to this node within the
configured domain. Also ensure that the DNS server is running in order to
resolve the name of the domain controller.
Cluster network name resource '%1' cannot be brought online. Attempt to locate a
writeable domain controller (in domain %2) in order to create or update a
computer object associated with the resource failed for the following
reason: %3.
Cluster network name resource '%1' could not completely rename the associated
computer object on domain controller '%2'. Attempting to rename the computer
object from new name '%3' back to its original name '%4' has also failed. The
error code was '%5'. This may affect client connectivity until the network name
and its associated computer object name are consistent. Contact your domain
administrator to manually rename the computer object.
Run nbtstat for the network name to ensure that the name is not already registered with
Netbios.
Cluster network name resource '%1' failed a health check. Network name '%2' is
no longer registered on this node. The error code was '%3'. Check for hardware
or software errors related to the network adapter. Also, you can run the
Validate a Configuration wizard to check your network configuration.
Event 1218:
RES_NETNAME_ONLINE_RENAME_RECOVERY_MISSING_ACCOUNT
Output
Cluster network name resource '%1' failed to perform a name change operation
(attempting to change original name '%3' to name '%4'). The computer object
could not be found on the domain controller '%2' (where it was created). An
attempt will be made to recreate the computer object the next time the resource
is brought online. Additionally, please work with your domain administrator to
ensure that the computer object exists in the domain.
The computer account for resource '%1' failed to be renamed from %2 to %3 using
Domain Controller %4. The associated error code is stored in the data section.
The computer account for this resource was in the process of being renamed and
did not complete. This was detected during the online process for this resource.
In order to recover, the computer account must be renamed to the current value
of the Name property, i.e., the name presented on the network.
The Domain Controller where the renamed was attempted might not be available; if this
is
the case, wait for the Domain Controller to be available again. The Domain
Controller could be denying access to the account; after resolving access, try
to bring the name online again.
If this is not possible, disable and re-enable Kerberos Authentication and an attempt
will be made to find the computer account on a different DC. You need to change the
Name property to %2
in order to use the existing computer account.
Cluster IP address resource '%1' cannot be brought online because the cluster
network '%2' is not configured to allow client access. Please use the Failover
Cluster Manager snap-in to check the configured properties of the cluster
network.
Network Name resource '%1' (with associated network name '%2') has Kerberos
Authentication support enabled. Failed to add required credentials to the LSA -
the associated error code '%3' indicates insufficient privileges normally
required for this operation. The required privilege is 'Trusted Computing Base'
and must be locally enabled on each node comprising the cluster.
Cluster network name resource '%1' encountered an error enabling the network
name on this node. The reason for the failure was: '%2'.
You may take the network name resource offline and online again to retry.
Cluster network name resource '%1' was unable to identify any IP addresses to
register with a DNS server. Ensure that there is one or more networks that are
enabled for cluster use with the 'Allow clients to connect through this network'
setting, and that each node has a valid IP address configured for the networks.
A component on the server did not respond in a timely fashion. This caused the
cluster resource '%1' (resource type '%2', DLL '%3') to exceed its time-out
threshold. As part of cluster health detection, recovery actions will be taken.
The cluster will try to automatically recover by terminating and restarting the
Resource Hosting Subsystem (RHS) process that is running this resource. Verify
that the underlying infrastructure (such as storage, networking, or services)
that are associated with the resource are functioning correctly.
A component on the server did not respond in a timely fashion. This caused the
cluster resource '%1' (resource type '%2', DLL '%3') to exceed its time-out
threshold while processing control code '%4;'. As part of cluster health
detection, recovery actions will be taken. The cluster will try to automatically
recover by terminating and restarting the Resource Hosting Subsystem (RHS)
process that is running this resource. Verify that the underlying infrastructure
(such as storage, networking, or services) that are associated with the resource
are functioning correctly.
Event 1231: RES_NETNAME_LOGON_FAILURE
Output
Entry point '%2' in cluster generic script resource '%1' did not complete
execution in a timely manner. This could be due to an infinite loop or other
issues possibly resulting in an infinite wait. Alternatively, the specified
pending timeout value may be too short for this resource. Please review the '%2'
script entry point to ensure all possible infinite waits in the script code have
been corrected. Then, consider increasing the pending timeout value if deemed
necessary.
Cluster generic script resource '%1': request to perform the '%2' operation will
not be processed. This is due to a previously failed attempt to execute the '%3'
entry point in a timely fashion. Please review the script code for this entry
point to ensure there does not exist any infinite loop or other issues possibly
resulting in an infinite wait. Then, consider increasing the resource pending
timeout value if deemed necessary.
The Cluster service has detected that its service account is missing one or more
of the required privileges. The missing privilege list is: '%1' and is not
currently granted to the service account. Use the 'sc.exe qprivs clussvc' to
verify the privileges of the Cluster service (ClusSvc). Additionally check for
any security policies or group policies in Active Directory Domain Services that
may have altered the default privileges. Type the following command to grant the
Cluster service the necessary privileges to function correctly:
sc.exe privs
clussvc
SeBackupPrivilege/SeRestorePrivilege/SeIncreaseQuotaPrivilege/SeIncreaseBasePriorityPri
vilege/SeTcbPrivilege/SeDebugPrivilege/SeSecurityPrivilege/SeAuditPrivilege/SeImpersona
tePrivilege/SeChangeNotifyPrivilege/SeIncreaseWorkingSetPrivilege/SeManageVolumePrivile
ge/SeCreateSymbolicLinkPrivilege/SeLoadDriverPrivilege
Lease of IP address '%2' associated with cluster IP address resource '%1' has
expired or is about to expire, and currently cannot be renewed. Ensure that the
associated DHCP server is accessible and properly configured to renew the lease
on this IP address.
Cluster IP address resource '%1' failed to renew the lease for IP address '%2'.
Ensure that the DHCP server is accessible and properly configured to renew the
lease on this IP address.
Cluster resource '%1' in clustered role '%2' has received a critical state
notification. For a virtual machine this indicates that an application or
service inside the virtual machine is in an unhealthy state. Verify the
functionality of the service or application being monitored within the virtual
machine.
Clustered role '%1' has exceeded its failover threshold. It has exhausted the
configured number of failover attempts within the failover period of time
allotted to it and will be left in a failed state. No additional attempts will
be made to bring the role online or fail it over to another node in the cluster.
Please check the events associated with the failure. After the issues causing
the failure are resolved the role can be brought online manually or the cluster
may attempt to bring it online again after the restart delay period.
Cluster resource '%1' in clustered role '%2' has received a critical state
notification. For a virtual machine this indicates that a critical network of
the virtual machine is in an unhealthy state. Verify the network connectivity of
the virtual machine and the virtual networks that the virtual machine is
configured to use.
Event 1256:
RES_NETNAME_DNS_REGISTRATION_FAILED_DYNAMIC_DNS_ZONE
Output
Cluster network name resource failed registration of one or more associated DNS
names(s) because the corresponding DNS Zone does not accept dynamic
updates.
Guidance
Ensure that the DNS is configured as a Dynamic DNS zone. If the DNS server does not accept
dynamic updates uncheck the 'Register this connection's' addresses in DNS' in the properties of the
network adapter.
Event 1257:
RES_NETNAME_DNS_REGISTRATION_FAILED_SECURE_DNS_ZONE
Output
Cluster network name resource failed registration of one or more associated DNS
names(s) because the access to update the secure DNS Zone was denied.
Event 1258:
RES_NETNAME_DNS_REGISTRATION_FAILED_TIMEOUT
Output
Cluster network name resource failed registration of one or more associated DNS
name(s) because the a DNS server could not be reached.
Event 1259:
RES_NETNAME_DNS_REGISTRATION_FAILED_CLEANUP
Output
Cluster network name resource failed registration of one or more associated DNS
name(s) because the cluster service failed clean up the existing records
corresponding to the network name.
Guidance
Ensure that the network adapters associated with dependent IP address resources are configured
with access to at least one DNS server.
Event 1261:
RES_NETNAME_DNS_REGISTRATION_MODIFY_FAILED_STATUS
Output
Guidance
Ensure that the network adapters associated with dependent IP address resources are configured
with access to at least one DNS server.
Event 1262:
RES_NETNAME_DNS_REGISTRATION_PUBLISH_PTR_FAILED
Output
Cluster network name resource failed to publish the PTR record in the DNS
reverse lookup zone.
Guidance
Ensure that the network adapters associated with dependent IP address resources are configured
with access to at least one DNS server and that the DNS reverse lookup zone exists.
Event 1264:
RES_NETNAME_DNS_REGISTRATION_PUBLISH_PTR_FAILED_STATUS
Output
Cluster network name resource failed to publish the PTR record in the DNS
reverse lookup zone.
Guidance
Ensure that the network adapters associated with dependent IP address resources are configured
with access to at least one DNS server and that the DNS reverse lookup zone exists.
Cluster resource type '%1' timed out while processing the control code %2. The
cluster will try to automatically recover by terminating and restarting the
Resource Hosting Subsystem (RHS) process that was processing the call.
The Cluster Service was unable to access network adapter '%1'. Verify that other
network adapters are functioning properly and check the device manager for
errors associated with adapter '%1'. If the configuration for adapter '%1' has
been changed, it may become necessary to reinstall the failover clustering
feature on this computer.
Cluster IP address resource '%1' failed to come online. Ensure the network
property '%2' matches a cluster network name or the address property '%3'
matches one of the subnets on a cluster network. If this is an IPv6 Address
type, please verify that the cluster network matching this resource has at least
one IPv6 prefix that is not link-local or tunnel.
IPv6 Tunnel address resource '%1' failed to come online because it does not
depend on an IP Address (IPv4) resource. Dependency on at least one IP Address
(IPv4) resource is required.
Cluster IP address resource '%1' failed to come online because the '%2' property
could not be read. Please ensure that the resource is correctly configured.
IPv6 tunnel address resource '%1' failed to come online. Cluster network '%2'
associated with dependent IP address (IPv4) resource '%3' does not support
ISATAP tunneling. Please ensure that the cluster network supports ISATAP
tunneling.
The backup operation for the cluster configuration data has been aborted because
quorum for the cluster has not yet been achieved. Please retry this backup
operation after the cluster achieves quorum.
The restore operation for the cluster configuration data has failed. This was
due to insufficient privileges associated with the user account performing the
restore. Please ensure that the user account has local administrator privileges.
Cluster service failed to update the cluster configuration data on the witness
resource. Please ensure that the witness resource is online and accessible.
File share '%1' associated with the file share witness resource is currently
hosted by server '%2'. This server '%2' has just been added as a new node within
the failover cluster. Hosting of the file share witness by any node comprising
the same cluster is not recommended. Please choose a file share witness that is
not hosted by any node within the same cluster and modify settings of the file
share witness resource accordingly.
Cluster file share resource '%1' has detected shared folder conflicts. As a
result, some of these shared folders may not be accessible. To rectify this
situation, ensure multiple shared folders do not have the same share name.
File share witness resource '%1' failed to come online. Please ensure that file
share '%2' exists and is accessible by the cluster.
Cluster network name resource '%1' cannot be brought online. The network name
resource was terminated by the resource host subsystem because it did not
complete an operation in an acceptable time. The operation timed out while
performing: '%2'
Event 1567: SERVICE_FAILED_TO_CHANGE_LOG_SIZE
Output
Cluster service failed to change the trace log size. Please verify the
ClusterLogSize setting with the 'Get-Cluster \| Format-List \*' PowerShell
cmdlet. Also, use the Performance Monitor snap-in to verify the event trace
session settings for FailoverClustering.
Health check for IP interface '%1'(address '%2') failed (status is '%3'). Check
for hardware or software errors related to the physical or virtual network
adapters.
Event 1568:
RES_CLOUD_WITNESS_CANT_COMMUNICATE_TO_AZURE
Output
Cluster resource: %1
Cluster node: %2
Guidance
This could be due to network communication between the cluster node and the Microsoft Azure
service being blocked. Verify the node's internet connectivity to Microsoft Azure. Connect to the
Microsoft Azure portal and verify that the storage account exists.
Network '%1' which has been disabled for failover cluster use, was found to be
the only currently possible network that node '%2' can use to communicate with
other nodes in the cluster. This may impact the node's ability to participate in
the cluster. Please verify network connectivity of node '%2' and enable at least
one network for cluster communication. Run the Validate a Configuration wizard
to check your network configuration.
Cluster resource: %1
Guidance
The storage account's access key may no longer be valid. Use the Configure Cluster Quorum Wizard
in the Failover Cluster Manager or the Set-ClusterQuorum Windows PowerShell cmdlet, to configure
the Cloud witness resource with the updated storage account access key.
Node '%1' failed to form a cluster. This was because the witness was not
accessible. Please ensure that the witness resource is online and available.
Event 1580:
RES_NETNAME_DNS_REGISTRATION_SECURE_ZONE_FAILED
Output
Cluster network name resource '%1' failed to register the name '%2' over adapter
'%4' in a secure DNS zone. This was due to an existing record with this name and
the cluster identity does not have the sufficient privileges to update that
record. The error code was '%3'. Please contact your DNS server administrator to
verify the cluster identity has permissions on DNS record '%2'.
Cluster file server resource '%1' failed a health check. This was due to the
Server service not being started. Please use Server Manager to confirm the state
of the Server service on this cluster node.
Event 1586:
RES_FILESERVER_FSCHECK_SCOPED_NAME_NOT_REGISTERED
Output
Cluster file server resource '%1' failed a health check. This was because some
of its shared folders were inaccessible. Verify that the folders are accessible
from clients. Additionally, confirm the state of the Server service on this
cluster node using Server Manager and look for other events related to the
Server service on this cluster node. It may be necessary to restart the network
name resource '%2' in this clustered role.
Cluster file server resource '%1' failed a health check. This was because some
of its shared folders were inaccessible. Verify that the folders are accessible
from clients. Additionally, confirm the state of the Server service on this
cluster node using Server Manager and look for other events related to the
Server service on this cluster node.
Cluster file server resource '%1' cannot be brought online. The resource failed
to create file share '%2' associated with network name '%3'. The error code was
'%4'. Verify that the folders exist and are accessible. Additionally, confirm
the state of the Server service on this cluster node using Server Manager and
look for other related events on this cluster node. It may be necessary to
restart the network name resource '%3' in this clustered role.
Cluster service failed to set the permissions on the cluster computer object
'%1'. Please contact your network administrator to check the cluster security
descriptor of the computer object in Active Directory, verify that the DACL is
not too big, and remove any unnecessary extra ACE(s) on the object if necessary.
File Server could not start because expected dependency on 'Network Name'
resource was not found or it was not configured properly. Error=0x%2.
Cluster disk resource '%1' contains a BitLocker-protected volume, '%2', but for
this volume, the Active Directory cluster name account (also called the cluster
name object or CNO) is not a BitLocker protector for the volume. This is
required for BitLocker-protected volumes. To correct this, first remove the disk
from the cluster. Next, use the Manage-bde.exe command-line tool to add the
cluster name as an ADAccountOrGroup protector, using the format
domain\ClusterName$ for the cluster name. Then add the disk back to the
cluster. For more information, see the documentation for Manage-bde.exe
Cluster disk resource '%1' was unable to unlock the BitLocker-protected volume
'%2'. The cluster name object (CNO) is not set to be a valid BitLocker protector
for this volume. To correct this, remove the disk from the cluster. Then use the
Manage-bde.exe command-line tool to add the cluster name as an ADAccountOrGroup
protector, using the format domain\ClusterName$, and add the disk back to the
cluster. For more information, see the documentation for Manage-bde.exe.
File Server could not start because expected dependency on 'Network Name'
resource was not found or it was not configured properly. Error=0x%2.
Scale Out File Server could not start because expected dependency on
'Distributed Network Name' resource was not found or it was not configured
properly. Error=0x%2.
The creation of the cluster failed. Unable to create the cluster name object
'%1' in active directory organizational unit '%2'. The object already exists in
organizational unit '%3'. Verify that the specified distinguished name path and
the cluster name object are correct. If the distinguished name path is not
specified, the existing computer object '%1' will be used.
Cluster node '%1' failed to join the cluster. A UDP connection could not be
established to node(s) '%2'. Verify network connectivity and configuration of
any network firewalls.
Cluster node '%1' failed to join the cluster. A TCP connection using the
Microsoft Failover Cluster Virtual Adapter could not be established to node(s)
'%2'. Verify network connectivity and configuration of any network firewalls.
Cluster node '%1' failed to join the cluster because it could not communicate
over the network with any other node in the cluster. Verify network connectivity
and configuration of any network firewalls.
Failed to add the IP Address '%2' for Disjoint IP address resource '%1' (error
code was '%3'). Check for hardware or software errors related to the physical or
virtual network adapters.
Upgrading the functional level of the cluster failed. Check that all nodes of
the cluster are currently running and are the same version of Windows Server,
then run the Update-ClusterFunctionalLevel Windows PowerShell cmdlet again.
Local cluster node has been quarantined by '%1'. The node will be quarantined
until '%2' and then the node will automatically attempt to re-join the cluster.
Refer to the System and Application event logs to determine the issues on
this node. When the issue is resolved, quarantine can be manually cleared to
allow the node to rejoin with the 'Start-ClusterNode -ClearQuarantine' Windows
PowerShell cmdlet.
QuarantineType : Quarantined by %1
Time quarantine will be automatically cleared: %2
The cluster service was unable to reach any available domain controller on the
domain. This may impact functionality that is dependent on Cluster network name
authentication.
DC Server: %1
Guidance
Verify that domain controllers are accessible on the network to the cluster nodes.
Event 1684:
RES_NETNAME_COMPUTER_OBJECT_VCO_NOT_FOUND
Output
Cluster network name resource failed to find the associated computer object in
Active Directory. This may impact functionality that is dependent on Cluster
network name authentication.
Network Name: %1
Organizational Unit: %2
Guidance
Restore the computer object for the network name from the Active Directory recycle bin. Alternately,
offline the cluster network name resource and run the Repair action to recreate the computer object
in Active Directory.
Event 1685:
RES_NETNAME_COMPUTER_OBJECT_CNO_NOT_FOUND
Output
Cluster network name resource failed to find the associated computer object in
Active Directory. This may impact functionality that is dependent on Cluster
network name authentication.
Network Name: %1
Organizational Unit: %2
Guidance
Restore the computer object for the network name from the Active Directory recycle bin.
Cluster network name resource found the associated computer object in Active
Directory to be disabled. This may impact functionality that is dependent on
Cluster network name authentication.
Network Name: %1
Organizational Unit: %2
Guidance
Enable the computer object for the network name in Active Directory.
Cluster network name resource found the associated computer object in Active
Directory to be disabled. This may impact functionality that is dependent on
Cluster network name authentication.
Network Name: %1
Organizational Unit: %2
Guidance
Enable the computer object for the network name in Active Directory. Alternately, offline the cluster
network name resource and run the Repair action to enable the computer object in Active Directory.
Cluster network name resource detected that the associated computer object in
Active Directory was disabled and failed in its attempt to enable it. This may
impact functionality that is dependent on Cluster network name
authentication.
Network Name: %1
Organizational Unit: %2
Guidance
Enable the computer object for the network name in Active Directory.
Cluster service failed to retrieve the list of clustered disks while destroying
the cluster. The error code was '%1'. If these disks are not accessible, execute
the 'Clear-ClusterDiskReservation' PowerShell cmdlet.
Event 4611:
NODECLEANUP_RELEASE_CLUSTERED_DISKS_FROM_PARTMGR_FAILED
Output
Clustered disk with ID '%2' was not released by the Partition Manager while
destroying the cluster. The error code was '%1'. Restarting the machine will
ensure the disk is released by the Partition Manager.
The cluster service failed to properly cleanup a clustered disk with ID '%2'
while destroying the cluster. The error code was '%1'. You may unable to access
this disk until cleanup has been successfully completed. For manual cleanup,
delete the 'AttachedDisks' value of the
'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClusDisk\Parameters'
key in the Windows registry.
The cluster service has been stopped and set as disabled as part of cluster node
cleanup.
Event 4616:
NODECLEANUP_DISABLE_CLUSTER_SERVICE_TIMEOUT
Output
Termination of the cluster service during cluster node cleanup has not completed
within the expected time period. Please restart this machine to ensure the
cluster service is no longer running.
Event 4618:
NODECLEANUP_RESET_CLUSTER_REGISTRY_ENTRIES_FAILED
Output
Resetting cluster service registry entries during cluster node cleanup failed.
The error code was '%1'. You may be unable to create or join a cluster with this
machine until cleanup has been successfully completed. For manual cleanup,
execute the 'Clear-ClusterNode' PowerShell cmdlet on this machine.
Event 4620: NODECLEANUP_UNLOAD_CLUSTER_HIVE_FAILED
Output
Unloading the cluster service registry hive during cluster node cleanup failed.
The error code was '%1'. You may be unable to create or join a cluster with this
machine until cleanup has been successfully completed. For manual cleanup,
execute the 'Clear-ClusterNode' PowerShell cmdlet on this machine.
The Cluster service encountered an error during node cleanup. You may be unable
to create or join a cluster with this machine until cleanup has been
successfully completed. Use the 'Clear-ClusterNode' PowerShell cmdlet on this
node.
Resetting the IPSec security association timeout registry value failed during
cluster node cleanup. The error code was '%1'. For manual cleanup, execute the
'Clear-ClusterNode' PowerShell cmdlet on this machine. Alternatively, you may
reset the IPSec security association timeout by deleting the '%2' value and the
'%3' value from HKEY_LOCAL_MACHINE in the Windows registry.
Deletion of clustered tasks during node cleanup failed. The error code was '%1'.
Use Windows Task Scheduler to delete any remaining clustered tasks.
During node cleanup, the local user account that is managed by the cluster was
not deleted. The error code was '%1'. Open Local Users and Groups (lusrmgr.msc)
to delete the account.
Volume shadow copy service task resource '%1' failed. The error code was '%2'.
This is because the associated task could not be stopped as part of an offline
operation. You may need to stop it manually using the Task Scheduler snap-in.
Volume shadow copy service task resource '%1' failed. The error code was '%2'.
This is because the associated task could not be deleted as part of an offline
operation. You may need to delete it manually using the Task Scheduler snap-in.
Volume shadow copy service task resource '%1' failed. The error code was '%2'.
This is because the associated task could not be added as part of an online
operation. Please use the Task Scheduler snap-in to ensure your tasks are
properly configured.
Cluster service failed to start the cluster log trace session. The error code
was '%2'. The cluster will function properly, but supplemental logging
information will be missing. Use the Performance Monitor snap-in to verify the
event channel settings for '%1'.
User mode health monitoring has detected that the system is not being
responsive. The Failover cluster virtual adapter has lost contact with the '%1'
process with a process ID '%2', for '%3' seconds. Please use Performance Monitor
to evaluate the health of the system and determine which process may be
negatively impacting the system.
Event 4870: NETFT_WATCHDOG_PROCESS_TERMINATED
Output
User mode health monitoring has detected that the system is not being
responsive. The Failover cluster virtual adapter has lost contact with the '%1'
process with a process ID '%2', for '%3' seconds. Recovery action will be taken.
The cluster service failed to start. This was because the failover cluster
virtual adapter failed to initialize the miniport adapter. The error code was
'%1'. Verify that other network adapters are functioning properly and check the
device manager for errors. If the configuration was changed, it may be necessary
to reinstall the failover clustering feature on this computer.
The failover cluster virtual adapter failed to generate a unique MAC address.
Either it was unable to find a physical Ethernet adapter from which to generate
a unique address or the generated address conflicts with another adapter on this
machine. Please run the Validate a Configuration wizard to check your network
configuration.
Cluster service failed to create the Cluster Shared Volumes root directory '%2'.
The error message was '%1'.
Cluster Shared Volume '%1' ('%2') is no longer accessible from this cluster node
While adding the disk ('%1') to Cluster Shared Volumes, setting explicit
snapshot diff area association for volume ('%2') failed with error '%3'. The
only supported software snapshot diff area association for Cluster Shared
Volumes is to self.
Cluster disk resource '%1' failed to delete a software snapshot. The diff area
on volume '%3' could not be dissociated from volume '%2'. This may be caused by
active snapshots. Cluster Shared Volumes requires that the software snapshot be
located on the same disk.
Move of the Cluster Shared Volume resource '%1' is vetoed because one
of the volumes belonging to the resource is in dismounted state. Please retry
the action after the dismount operation is completed.
Move of the Cluster Shared Volume resource '%1' is vetoed because one of the
volumes belonging to the resource is in dismounted state. Please retry the
action after the dismount operation is completed.
Event 5148:
DCM_VETO_RESOURCE_MOVE_DUE_TO_IO_MODE_CHANGE
Output
Move of the Cluster Shared Volume resource '%1' is vetoed because an IO mode
change operation (Direct IO to Redirected IO or vice versa) is in progress on
one of the volumes belonging to the resource. Please retry the action after the
operation is completed.
Cluster physical disk resource '%1' failed. The Cluster Shared Volume was put in
failed state with the following error: '%2'
Cluster service failed to create a cluster identity token for Cluster Shared
Volumes. The error code was '%1'. Ensure the domain controller is accessible and
check for connectivity issues. Until connection to the domain controller is
recovered, some operations on this node against the Cluster Shared Volumes might
fail.
Software snapshot creation on Cluster Shared Volume '%1' ('%2') failed with
error %3. The resource must be online to support snapshot creation. Please check
the state of the resource.
Software snapshot creation on Cluster Shared Volume(s) ('%1') with snapshot set
id '%2' failed with error '%3'. Please check the state of the CSV resources and
the system events of the resource owner nodes.
Cluster service failed to register the Cluster Shared Volumes snapshot provider
with the Volume Shadow Service (VSS). This may be due to the VSS service
shutting down or may be a problem with the VSS service having a problem that
causes it to not accept incoming requests.
Error: %1
The Cluster service on this node is shutting down because it has detected that
there are other cluster nodes that have quorum. This occurs when the Cluster
service detects another node that was started with the Force Quorum switch
(/fq). The node which was started with the Force Quorum Switch will remain
running. Use Failover Cluster Manager to verify that this node automatically
joined the cluster when the cluster service restarted.
The cluster resource '%1' could not create or modify the replicated local user
account '%2' on this node. Check the cluster logs for more information.
Cluster failed to start. The latest copy of cluster configuration data was not
available within the set of nodes attempting to start the cluster. Changes to
the cluster occurred while the set of nodes were not in membership and as a
result were not able to receive configuration data updates.
Guidance
Attempt to start the cluster service on all nodes in the cluster so that nodes with the latest copy of
the cluster configuration data can first form the cluster. The cluster will be able to start and the
nodes will automatically obtain the updated cluster configuration data. If there are no nodes
available with the latest copy of the cluster configuration data, run the Start-ClusterNode -FQ
Windows PowerShell cmdlet. Using the ForceQuorum (FQ) parameter will start the cluster service and
mark this node's copy of the cluster configuration data to be authoritative. Forcing quorum on a
node with an outdated copy of the cluster database may result in cluster configuration changes that
occurred while the node was not participating in the cluster to be lost.
Warning events
No matching network interface found for resource '%1' IP address '%2' (return
code was '%3'). If your cluster nodes span different subnets, this may be
normal.
Cluster disk resource '%1' indicates corruption for volume '%2'. Chkdsk is being
run to repair problems. The disk will be unavailable until Chkdsk completes.
Chkdsk output will be logged to file '%3'.
Cluster file share resource '%1' cannot be brought online. Creation of file
share '%2' (scoped to network name %3) failed due to error '%4'. This operation
will be automatically retried.
Event 1071:
RCM_RESOURCE_ONLINE_BLOCKED_BY_LOCKED_MODE
Output
The operation attempted on cluster resource '%1' of type '%3' in clustered role
'%2' could not be completed because the resource or one of its providers has
locked status.
Event 1071:
RCM_RESOURCE_OFFLINE_BLOCKED_BY_LOCKED_MODE
Output
The operation attempted on cluster resource '%1' of type '%3' in clustered role
'%2' could not be completed because the resource or one of its dependents has
locked status.
The cluster common property SecurityLevel cannot be changed on this cluster. The
cluster security level cannot be changed because the cluster is currently
configured for no authentication mode.
Cluster network name resource '%1' failed to register DNS name '%2' over adapter
'%4' for the following reason: '%3'
Cluster network interface '%1' for cluster node '%2' on network '%3' is
unreachable by at least one other cluster node attached to the network. The
failover cluster was not able to determine the location of the failure. Run the
Validate a Configuration wizard to check your network configuration. If the
condition persists, check for hardware or software errors related to the network
adapter. Also check for failures in any other network components to which the
node is connected such as hubs, switches, or bridges.
The DNS Host (A) and Pointer (PTR) records associated with Cluster resource '%1'
were not removed from the resource's associated DNS server. If necessary, they
can be deleted manually. Contact your DNS administrator to assist with this
effort.
The removal of the DNS Pointer (PTR) record '%2' for host '%3' which is
associated with the cluster network name resource '%1' failed with error '%4'.
If necessary, the record can be deleted manually. Contact your DNS administrator
for assistance.
The removal of the DNS Host (A) record '%2' associated with the cluster network
name resource '%1' failed with error '%3'. If necessary, the record can be
deleted manually. Contact your DNS administrator for assistance.
The pending move for the role '%1' did not complete.
Cluster network name resource '%1' failed to delete or disable its associated
computer object '%2' during resource deletion. The error code was '%3'.
Please check if the site is Read-Only. Ensure that the cluster name object has the
appropriate permissions on the '%2' object in Active Directory.
Cluster network name resource '%1' failed to delete computer object with guid
'%2'. The error code was '%3'.
Please check if the site is Read-Only. Ensure that the cluster name object has the
appropriate permissions on the '%2' object in Active Directory.
Event 1216: SERVICE_NETNAME_CHANGE_WARNING
Output
A name change operation on the cluster core netname resource has failed.
Attempting to revert the name change operation back to the original name has
also failed. The error code was '%1'. You may not be able to remotely manage the
cluster using the cluster name until this situation has been manually corrected.
Event 1221:
RES_NETNAME_RENAME_OUT_OF_SYNCH_WITH_COMPOBJ
Output
Cluster network name resource '%1' has a name '%2' which does not match the
corresponding computer object name '%3'. It is likely that a previous name
change of the computer object has not replicated to all domain controllers in
the domain. You will be unable to rename the network name resource until the
names become consistent. If the computer object has not been recently changed,
please contact your domain administrator to rename the computer object and
thereby make it consistent. Also, ensure that replication across domain
controllers has been successfully completed.
The computer object associated with cluster network name resource '%1' could not
be updated.
The cluster identity '%3' may lack permissions required to update the object. Please
work
with your domain administrator to ensure that the cluster identity can update
computer objects in the domain.
Cluster IP address resource '%1' failed to release the lease for IP address
'%2'.
Clustered role '%2' was taken offline. This role was preempted by the higher
priority clustered role '%1'. The cluster service will attempt to bring
clustered role '%2' online later when system resources are available.
The backup operation for the cluster configuration data has been canceled. The
cluster Volume Shadow Copy Service (VSS) writer received an abort request.
Node '%1' established communication with node '%2' and detected that it is
running a different, but compatible, version of the operating system. We
recommend that all nodes run the same version of the operating system. After all
nodes have been upgraded, run the Update-ClusterFunctionalLevel Windows
PowerShell cmdlet to complete upgrading the cluster.
Node '%1' established a communication session with node '%2' without performing
a version compatibility check because version compatibility checking is
disabled. Disabling version compatibility checking is not supported.
Attempting to use IPv4 for '%1' network adapter failed. This was due to a
failure to disable IPv4 auto-configuration and DHCP. This may be expected if the
DHCP Client service is already disabled. IPv6 will be used if enabled, otherwise
this node may not be able to participate in a failover cluster.
The cluster service detected a problem with the witness resource. The witness
resource will be failed over to another node within the cluster in an attempt to
reestablish access to cluster configuration data.
File share witness resource '%1' failed a periodic health check on file share
'%2'. Please ensure that file share '%2' exists and is accessible by the
cluster.
Event 1576:
RES_NETNAME_DNS_REGISTRATION_SECURE_ZONE_REFUSED
Output
Cluster network name resource '%1' failed to register the name '%2' over adapter
'%4' in a secure DNS zone. This was due to an existing record with this name and
the cluster identity does not have the sufficient privileges to update that
record. The error code was '%3'. Please contact your DNS server administrator to
verify the cluster identity has permissions on DNS record '%2'.
Event 1577:
RES_NETNAME_DNS_SERVER_COULD_NOT_BE_CONTACTED
Output
Cluster network name resource '%1' failed to register the name '%2' over adapter
'%4'. The DNS server could not be contacted. The error code was '%3.' Ensure
that a DNS server is accessible from this cluster node. The DNS registration
will be retried later.
Event 1578:
RES_NETNAME_DNS_TEST_FOR_DYNAMIC_UPDATE_FAILED
Output
Cluster network name resource '%1' failed to register dynamic updates for name
'%2' over adapter '%4'. The DNS server may not be configured to accept dynamic
updates. The error code was '%3'. Please contact your DNS server administrator
to verify that the DNS server is available and configured for dynamic
updates.
Cluster network name resource '%1' failed to update the DNS record for name '%2'
over adapter '%4'. The error code was '%3'. Ensure that a DNS server is
accessible from this cluster node and contact your DNS server administrator to
verify the cluster identity can update the DNS record '%2'.
The restore request for the cluster configuration data failed to make a copy of
the existing cluster configuration data file (ClusDB). While attempting to
preserve the existing configuration, the restore operation was unable to create
a copy at location '%1'. This might be expected if the existing configuration
data file was corrupt. The restore operation has continued but attempts to
revert to the existing cluster configuration may not be possible.
Event 1582:
CLUSSVC_UNABLE_TO_MOVE_RESTORED_HIVE_TO_CURRENT
Output
Cluster Service failed to move the restored cluster hive at '%1' to '%2'. This
may prevent the restore operation from succeeding successfully. If the cluster
configuration was not properly restored, please retry the restore action.
Event 1583:
CLUSSVC_NETFT_DISABLE_CONNECTIONSECURITY_FAILED
Output
Event 1589:
RES_NETNAME_DNS_RETURNING_IP_THAT_IS_NOT_PROVIDER
Output
Cluster network name resource '%1' found one or more IP addresses associated
with DNS name '%2' that are not dependent IP address resources. The additional
addresses found were '%3'. This may affect client connectivity until the network
name and its associated DNS records are consistent. Please contact your DNS
server administrator to verify the records associated with name '%2'.
Cluster disk resource '%1' detected corruption for volume '%2'. Spotfix Chkdsk
is required to repair problems.
Cluster disk resource '%1' completed running ChkDsk.exe /spotfix on volume '%2'.
The return code was '%4'. Output from the ChkDsk has been logged to file '%3'.
Check the application event log for additional information from ChkDsk.
Event 1671:
RES_DISK_ONLINE_SET_ATTRIBUTES_COMPLETED_FAILURE
Output
Cluster physical disk resource cannot be brought online.
Guidance
Run the Validate a Configuration wizard to check your storage configuration. If the error code was
ERROR_CLUSTER_SHUTDOWN then the Online Pending state was canceled by an administrator. If
this is a replicated volume, then this could be the result of a failure to set the disk attributes. Review
the Storage Replication events for additional information.
Cluster node '%1' has been quarantined by '%2' and cannot join the cluster. The
node will be quarantined until '%3' and then the node will automatically attempt
to re-join the cluster.
Node Name: %1
QuarantineType: Quarantine by %2
Time quarantine will be automatically cleared: %3
Virtual machines on node '%1' have entered an unmonitored state. The virtual
machines health will be monitored again once the node returns from an isolated
state or may failover if the node does not return. The virtual machine no longer
being monitored are: %2.
The cluster service detected a service which is not compatible with Failover
Clustering. The service has been disabled to avoid possible problems with the
Failover Cluster.
Resetting the IPSec security association timeout registry value failed during
cluster node cleanup. This is because the IPSec security association timeout was
modified after this machine was configured to be a member of a cluster. For
manual cleanup, execute the 'Clear-ClusterNode' PowerShell cmdlet on this
machine. Alternatively, you may reset the IPSec security association timeout by
deleting the '%1' value and the '%2' value from HKEY_LOCAL_MACHINE in the
Windows registry.
Event 4873:
NETFT_CLUSSVC_TERMINATE_BECAUSE_OF_WATCHDOG
Output
The cluster service has detected that the failover cluster virtual adapter has
stopped. This is expected when hot replace CPU is performed on this node.
Cluster service will stop and should automatically restart after the operation
is complete. Please check for additional events associated with the service and
ensure that the cluster service has been restarted on this node.
Cluster Shared Volume '%1' ('%2') has entered a paused state because of '%3'.
All I/O will temporarily be queued until a path to the volume is reestablished.
Cluster Shared Volumes root directory '%1' already exists. The directory '%1'
was renamed to '%2'. Please verify that applications accessing data in this
location have been updated as necessary.
Cluster Shared Volume '%1' ('%3') has identified one or more active filter
drivers on this device stack that could interfere with CSV operations. I/O
access will be redirected to the storage device over the network through another
Cluster node. This may result in degraded performance. Please contact the filter
driver vendor to verify interoperability with Cluster Shared Volumes.
Cluster Shared Volume '%1' ('%3') has identified one or more active volume
drivers on this device stack that could interfere with CSV operations. I/O
access will be redirected to the storage device over the network through another
Cluster node. This may result in degraded performance. Please contact the volume
driver vendor to verify interoperability with Cluster Shared Volumes.
Physical disk resource '%1' does not allow disabling short name generation. This
may cause application compatibility issues. Please use 'fsutil 8dot3name set 2'
to allow disabling short name generation and then offline/online the resource.
Physical disk resource '%1' does not allow disabling short name generation. This
may cause application compatibility issues. Please use 'fsutil 8dot3name set 2'
to allow disabling short name generation and then offline/online the resource.
Cluster Disk '%1' has been removed and placed back in the 'Available Storage'
cluster group. During this process an attempt to restore the original drive
letter(s) has taken longer than expected, possibly due to those drive letters
being already in use.
Cluster service failed to set the permissions (ACL) on the Cluster Shared
Volumes root directory '%1'. The error was '%2'.
Cluster Shared Volume '%1' ('%2') redirected access was turned on. Access to the
storage device will be redirected over the network from all cluster nodes that
are accessing this volume. This may result in degraded performance. Turn off
redirected access for this volume to resume normal operations.
Cache size resized to '%1' based on populated memory, user setsize is too high.
Event 5156:
DCM_VOLUME_AUTO_PAUSE_AFTER_SNAPSHOT_FAILURE
Output
Cluster Shared Volume '%1' ('%2') has entered a paused state because of '%3'.
This error is encountered when the volsnap snapshots underlying the CSV volume
are deleted outside of a user request. Possible causes of the snapshots getting
deleted are lack of space in the volume for the snapshots to grow, or IO failure
while trying to update the snapshot data. All I/O will temporarily be queued
until the snapshot state is synchronized with volsnap.
Event 5157:
DCM_VOLUME_AUTO_PAUSE_AFTER_FAILURE_EXPECTED
Output
Cluster Shared Volume '%1' ('%2') has entered a paused state because of '%3'.
All I/O will temporarily be queued until a path to the volume is reestablished.
This error is usually caused by an infrastructure failure. For example, losing
connectivity to storage or the node owning the Cluster Shared Volume being
removed from active cluster membership.
The Cluster service encountered some storage errors while trying to bring
storage pool online. Run cluster storage validation to troubleshoot the issue.
Cluster is moving the group for storage pool '%1' because current node '%3' does
not have optimal connectivity to the storage pool physical disks.
Informational events
Event 1592:
CLUSSVC_TCP_RECONNECT_CONNECTION_REESTABLISHED
Output
Cluster node '%1' lost communication with cluster node '%2'. Network
communication was reestablished. This could be due to communication temporarily
being blocked by a firewall or connection security policy update. If the problem
persists and network communication are not reestablished, the cluster service on
one or more nodes will stop. If that happens, run the Validate a Configuration
wizard to check your network configuration. Additionally, check for hardware or
software errors related to the network adapters on this node, and check for
failures in any other network components to which the node is connected such as
hubs, switches, or bridges.
Functional Level: %1
Upgrade Version: %2
The Cluster service has changed the password of account '%1' on node '%2'.
Event 1682:
CLUSTER_GROUP_MOVED_NO_LONGER_UNMONITORED
Output
Virtual machine '%2' which was unmonitored on the isolated node '%1' has been
failed over to another node. The health of the virtual machine is once again
being monitored.
Event 1682:
CLUSTER_MULTIPLE_GROUPS_NO_LONGER_UNMONITORED
Output
Node '%1' has rejoined the cluster and the following virtual machines running on
that node are once again having their health state monitored: %2.
Cluster Shared Volume '%1' ('%2') is no longer directly accessible from this
cluster node. I/O access will be redirected to the storage device over the
network to the node that owns the volume. If this results in degraded
performance, please troubleshoot this node's connectivity to the storage device
and I/O will resume to a healthy state once connectivity to the storage device
is reestablished.
Cluster physical disk resource '%1' deleted a software snapshot. The software
snapshot on Cluster Shared Volume '%2' was deleted because it was older than
'%3' day(s). The snapshot ID was '%4' and it was created from node '%5' at '%6'.
It is expected that snapshots are deleted by a backup application after a backup
job is completed. This snapshot exceeded the time that is expected for a
snapshot to exist. Verify with the backup application that backup jobs are
completing successfully.
Reference
Detailed event info for Failover Clustering components in Windows Server 2008
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you provision a shared
folder on a cluster physical disk resource.
Beta Information
This article discusses a beta release of a Microsoft product. The information in this
article is provided as-is and is subject to change without notice.
No formal product support is available from Microsoft for this beta product. For
information about how to obtain support for a beta release, see the documentation that
is included with the beta product files, or check the Web location where you
downloaded the release.
Symptoms
In Windows Server 2008, you can use the following tools to provision a shared folder on
a cluster physical disk resource:
However, when you use these tools to share a folder in a Windows Server 2008 failover
cluster, you may experience the following symptoms.
Symptom 1
When you right-click a folder in Windows Explorer, and then you click Share, you may
receive the following warning message:
An error occurred which trying to share folder_name. The cluster resource could not
be found. The shared resource was not created at this time.
Symptom 3
When you try to use the Provision a Shared Folder Wizard in the Failover Cluster
Management snap-in or in the Share and Storage Management snap-in to share a
folder, you may receive the following warning message:
The shared folder resides on a highly available volume, but no highly available
network server name is associated with the volume. A cluster resource can be
created for the shared folder, but clients can only access the shared folder through
the local server name server_name. Are you sure you want to use this specified
located?
If you click the Details tab that is associated with this error message, you receive the
following error message:
7 Note
Both the Failover Cluster Management snap-in and the Share and Storage
Management snap-in use the Provision a Shared Folder Wizard to provision a
shared folder. Therefore, provisioning a shared folder in the Failover Cluster
Management snap-in is basically the same as provisioning a shared folder in the
Share and Storage Management snap-in.
Cause
These problems occur because you are trying to provision a shared folder on a cluster
physical disk resource that is not a member of the Highly Available Application or
Service group. Cluster physical disk resources are listed in the Available Storage group.
To view this group, click Storage in the Failover Cluster Management snap-in.
Resolution
To resolve this issue, make sure that the physical disk resource is a member of the
Highly Available Application or Services group in the cluster that already has a Client
Access Point (CAP) configured. Also, make sure that the status of the physical disk
resource is "Online."
Feedback
Was this page helpful? Yes No
This article provides a workaround for the issue that Local SAS Disks getting added in
Windows Server Failover Cluster.
Symptoms
On a Windows Server 2012 or Windows Server 2012 R2 Failover Cluster, local SAS drives
may be clustered. After adding the Physical Disk resource, they may fail to come online.
Additionally, you may receive the following error message:
Looking at the event logs you may notice the following event getting logged in the
system event log:
Cause
A local SAS drive may be clustered due to changes in the default behavior of cluster-
able disk criteria introduced in Windows Server 2012.
Workaround
To work around this problem, remove the disk resource from Failover Cluster Manager
(FCM) if you do not want them to be part of Cluster. Additionally, you need to bring
these drives online in Disk Management once you remove them from Failover Cluster
Manager.
Identify non-shared disk signature on Cluster Nodes (For example use f6f6806f Disk
Signature that is highlighted by validation report in the More information section).
Method 1
1. Open an elevated PowerShell prompt (right-click the tile or the icon and it's an
option at the bottom bar).
2. Copy and paste below command to identify only the SAS drives
$signature = @{Label="Signature";Expression={[System.Convert]::ToString($.signature,
16) }} Get-Disk |?{$.bustype -eq "SAS"} | ft Number, $signature, Bustype -a
Method 2
1. Open the Windows run box using keyboard, press Windows logo key +R
4. Reading Disk Signature from above registry is little tricky, you need to read key in
reverse order
5. Repeat same steps on all the nodes of the cluster.Note: If you are not aware of the
drive letter, then you may need to compare all volume GUIDs and read data in the
reverse order as mentioned in step 4 above.
More information
A new feature enhancement in Failover Clustering for Windows Server 2012 and
Windows Server 2012 R2 is that it supports an Asymmetric Storage Configuration. In
Windows Server 2012 a disk is considered clusterable if it is presented to one or more
nodes, and is not the boot / system disk, or contain a page file. In previous releases a
disk had to be presented to all nodes in the cluster. This type of configuration is more
common in multi-site clusters. Failover Cluster Manager (FCM) would automatically add
these SAS drives that are exposed to one or more nodes during Adding Node in Cluster.
For more explicit control of which disks are clustered users can disable clustering from
automatically clustering disks by unchecking "Add all eligible Storage to the Cluster"
during creating wizard or Add desired disk later by using "Add Disk" in FCM.
Use Cluster Validation to determine if Disk can be used in Cluster. In below example,
validation clearly depicts that disk is only visible on one node that usually can happen if
the disks are local SAS to the node.
Physical disk f6f6806f is visible from only one node and will not be tested. Validation
requires that the disk be visible from at least two nodes. The disk is reported as visible at
node:<Node Name>
Under the possible causes section you will find the following warning message: *The
cluster does not use shared storage. A cluster must use a hardware solution based either
on shared storage or on replication between nodes. If your solution is based on
replication between nodes, you do not need to rerun Storage tests. Instead, work with
the provider of your replication solution to ensure that replicated copies of the cluster
configuration database can be maintained across the nodes.
Failover Cluster would not add SAS drives if they contain the following information:
Boot Files
System File or Page file
Pass through for Hyper-V
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Network Name resource fails to come
online in a Windows Server 2008 R2-based failover cluster.
Symptoms
In a Windows Server 2008 R2 Service Pack 1-based cluster, when you attempt to bring
Network Name resources for the Services and Applications online, the Network Name
go into the failed state. However, the Cluster Network Name is online. Checking the
event logs, you may see some events logged.
Additionally, when you generate the cluster log on the failure node, you may see the
following entries:
Resolution
Edit the C:\Windows\System32\drivers\etc\hosts file and remove the entry for the
Cluster node.
Feedback
Was this page helpful? Yes No
This article helps solve an issue where a physical disk resource doesn't come online on a
cluster node.
Symptoms
On a cluster node that is running Windows Server, a physical disk resource may enter
the Failed state when you try to move a group that contains the physical disk resource.
If you restart the cluster node that has the physical disk resource that did not come
online, the problem is temporarily resolved.
When this problem occurs, the following entries are logged in the Cluster log for the
physical disk resource that entered the failed state:
Additionally, the following events are logged in the System Event log:
Similarly, on a Windows Server cluster node you may see following entries are logged in
the Cluster log:
Cause
This problem is known to occur when antivirus software that is not cluster-aware is
installed, upgraded, or reconfigured. For example, this problem is known to occur after
you install or migrate to Symantec Endpoint Protection 11.0 Release Update 5 (RU5) on
the cluster nodes.
Resolution
To resolve this problem, follow these steps:
1. Verify that this problem is caused by Symantec Endpoint Protection (SEP) 11.0
Release Update 5 (RU5). To do this, run the Handle.exe utility immediately after the
issue occurs on the cluster node where the physical disk resource did not come
online.
At an elevated command prompt, type the following command, and then press
ENTER: Handle.exe -a -u drive_letter .
7 Note
The drive_letter placeholder is the drive designation for the cluster drive that
did not come online.
For example, assume that the drive designation for the cluster drive that did not
come online is drive Q. To run the Handle.exe utility in this scenario, type the
following command, and then press ENTER: Handle.exe -a -u Q: .
The problem is caused by the Symantec application if you receive the following
message that identifies the Smc.exe process as the process that owns the handle:
Handle v3.42
Copyright (C) 1997-2008 Mark Russinovich
Sysinternals - www.sysinternals.com
More information
For more information about the Handle.exe utility, see Handle v4.22.
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article describes how to recover a deleted computer object that supports a Network
Name resource in a failover cluster.
Summary
By default, the new security model in Windows Server 2008 or Windows Server 2008 R2
failover clustering includes Kerberos authentication. To create this security model, every
Client Access Point (CAP) that is created in a Windows Server 2008 or Windows Server
2008 R2 failover cluster contains a Network Name resource. The Network Name
resource has a corresponding Computer Account that is created in the Active Directory
directory service when the resource is online for the first time.
By default, the Computer Account is created in the Computers container. However, the
Computer Account can be relocated to another organizational unit (OU). The Computer
Account can also be pre-staged in an OU before the CAP is created. If these Computer
Accounts are deleted from Active Directory, availability of the Network Name resource
will be reduced.
The computer accounts that are created in Active Directory represent the Network
Name resources in a failover cluster. These accounts have the following distinct types:
The computer account that represents the name of the cluster is called the Cluster
Name Object (CNO). This account is the primary security context for a cluster.
Other computer accounts that belong to Network Name resources in the same
cluster are called Virtual Computer Objects (VCOs). These accounts are created by
the CNO. If either of these accounts is deleted from Active Directory, the next time
that the Network Name tries to go online, the Network Name fails, and the
following error message is logged in the System log: Event ID: 1207
The text for the associated error code is: There is no such object on the server.
The cluster identity CNO$Name may lack permissions required to update the object.
Work with your domain administrator to ensure the cluster identity can update
computer objects in the domain.
WARN [RES] Network Name <FSCAP01>: Trying to remove credentials for LocalSystem
returned status C0000225, STATUS_NOT_FOUND is a non-critical failure for a remove
operation INFO [RES] Network Name <FSCAP01>: Initiating the Network Name
operation: 'Verifying computer object associated with network name resource FSCAP01'
INFO [RES] Network Name <FSCAP01>: Trying to find computer account FSCAP01
object GUID(d66e09dd8857e84da1f3a26fb1903e38) on any available domain controller.
WARN [RES] Network Name <FSCAP01>: Search for existing computer account failed.
status 80072030 WARN [RES] Network Name <FSCAP01>: Search for existing computer
account failed. status 80072030 INFO [RES] Network Name <FSCAP01>: Trying to find
object d66e09dd8857e84da1f3a26fb1903e38 on a PDC. WARN [RES] Network Name
<FSCAP01>: Search for existing computer account failed. status 80072030 INFO [RES]
Network Name <FSCAP01>: Unable to find object
d66e09dd8857e84da1f3a26fb1903e38 on a PDC. INFO [RES] Network Name
<FSCAP01>: GetComputerObjectViaGUIDEx() failed, Status 80072030. WARN [RES]
Network Name <FSCAP01>: Trying to remove credentials for LocalSystem returned
status C0000225, STATUS_NOT_FOUND is a non-critical failure for a remove operation
WARN [RHS] Resource FSCAP01 has indicated that it cannot come online on this node.
WARN [RCM] HandleMonitorReply: ONLINERESOURCE for 'FSCAP01', gen(8) result 5015.
However, problems will occur even before the Network Name resource is cycled offline
and online. For example, a user or a highly available application may be unable to access
resources when a security token that represents the cluster computer object in Active
Directory cannot be obtained.
To recover from the deletion of a Computer Object that is associated with a cluster
Network Name resource is different for a CNO than recovering from the deletion of a
Computer Object for a VCO.
To recover a deleted computer object that corresponds to the CNO, follow these steps:
2. Verify that the Computer Object has been restored to the correct location, and
then enable the account.
3. Force domain replication to occur, or wait for the configured replication interval.
7 Note
The user who follows these steps in the Failover Cluster Management MMC snap-in
must also have the "Reset Passwords" permission in the domain.
To recover a deleted computer object that corresponds to a VCO, follow these steps:
References
For more information, visit the following Microsoft Web sites:
Recovering a Deleted Cluster Name Object (CNO) in a Windows Server 2008 Failover
Cluster
Feedback
Was this page helpful? Yes No
This article helps to resolve the error "The parameter is incorrect" that occurs when
cluster validation fails against the Validate Resource status.
Symptoms
When you check the Active Directory organizational unit (OU), cluster validation fails
against the "Validate Resource" status, and you receive the following error message:
An error occurred while executing the test. The operation has failed. An error
occurred while checking the Active Directory organizational unit for the cluster
name resource. The parameter is incorrect.
If you try to create the client access points, the process can still fail if the IP address used
is the same as the address in the error message.
This problem can also occur after you grant CNO permission to the cluster OU, and the
user also has full control permissions on the CNO object.
Cause
The parameter error is caused when authenticated users don't have default Read
permissions on the default Computers container.
Resolution
To resolve this problem, grant the Read permission to authenticated users.
Authenticated users require Read permissions to objects that are in the Computers
container, even if the computer objects aren't there.
Status
A test has been added to cluster validation to specifically check for the CNO permission.
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix common issues when
This guidance is designed to get you started on troubleshooting issues where clustered
resources can't be brought online in a Windows-based cluster environment.
Troubleshooting checklist
1. When a resource fails to come online, Event ID 1069 is logged on the server that's
hosting the resource of concern:
2. Check the System event log for the Event ID, and then check if other errors or
warnings are logged. For example:
If a physical disk resource can't come online, check for disk-related errors or
warnings. For example, Event ID 129 (bus reset) or Event ID 153 (IO retried).
If a network name resource can't come online, check for DNS-related entries.
3. If nothing except Event ID 1069 is logged, review the cluster log for further
troubleshooting. Open an elevated PowerShell prompt and run the following
cmdlet:
PowerShell
7 Note
This cmdlet will generate the cluster logs on all cluster members and copy
them to the C:\temp folder on the server where the cmdlet was executed.
4. Search for strings in the cluster log that might correlate with Event ID 1069:
Output
[RCM] rcm::RcmResource::HandleFailure
[RHS] Online for resource
OnlineThread: Error <Code> bringing resource online.
[RHS] RhsCall::DeadlockMonitor: Call ONLINERESOURCE
7 Note
The placeholder <Code> represents the error code and can differ depending
on the issue.
Data collection
Before contacting Microsoft Support, you can gather information about the issue.
Prerequisites
1. TSS must be executed in the context of an account with admin rights on the
local system, and EULA must be accepted (once EULA is accepted, TSS won't
prompt it again).
7 Note
In case the current PowerShell execution policy doesn't allow running TSS, the
following actions could be taken:
Set RemoteSigned for the Process level and run the following cmdlet:
Verify if the change has taken effect, run the following cmdlet:
Since the Process level permissions only apply to the current PowerShell session,
once the given PowerShell window in which TSS runs is closed, the assigned
permission for the Process level will also go back to the previously configured state.
2. Open an elevated PowerShell prompt and change the directory to the C:\tss_tool
folder.
3. Start the trace by running the cmdlet on the source and destination nodes.
PowerShell
.\Get-psSDP.ps1
Feedback
Was this page helpful? Yes No
This article describes new features of the Server Message Block (SMB) 3.0 protocol.
Applies to: Windows 8.1 - all editions, Windows Server 2012 R2 and later versions of
Windows
Original KB number: 2709568
Summary
Windows Server introduces new server message block (SMB) file server features. To take
advantage of these new features, the SMB client and SMB server must support SMB 3.0.
The SMB 2.x protocol was introduced in Windows Server 2008 and in Windows Vista.
The SMB 3.0 protocol was introduced in Windows Server 2012 and in Windows 8.
SMB 1.0- and SMB 2.x-capable clients will be able to connect to, and access, shares that
are configured to use the Continuously Available property. However, SMB 1.0 and SMB
2.x clients won't benefit from the SMB Transparent Failover feature. If the currently
accessed cluster node becomes unavailable, or if the administrator makes administrative
changes to the clustered file server, the SMB 1.0 or SMB 2.x client will lose the active
SMB session and any open handles to the clustered file server. The user or application
on the SMB client computer must take corrective action to reestablish connectivity to
the clustered file share.
7 Note
SMB Transparent Failover is incompatible with volumes enabled for short file name
(8.3 file name) support or with compressed files (such as NTFS-compressed files).
SMB 1.0 clients don't contain the required client functionality to access SMB scale-out
file shares and will receive an Access Denied error message when they try to connect to
a scale-out file share.
SMB scale-out file shares are always configured so that the Continuously Available
property is set. SMB 2.x clients will be able to connect to SMB scale-out file shares but
won't benefit from the SMB Transparent Failover functionality.
SMB Multichannel
Both the SMB client and SMB server must support SMB 3.0 to take advantage of the
SMB Multichannel functionality. SMB 1.0 and SMB 2.x clients will use a single SMB
connection.
SMB Encryption
Both the SMB client and SMB server must support SMB 3.0 to take advantage of the
SMB Encryption functionality.
SMB PowerShell
SMB PowerShell management cmdlets were introduced in Windows Server 2012 and in
Windows 8. Older SMB clients and SMB servers will have to continue using down-level
tools for management (for example, net.exe) and APIs (for example, Win32 APIs).
References
For more information about the common errors you may experience with SMB 3.0, see
/troubleshoot/windows-server/networking/error-messages-smb-connections .
Feedback
Was this page helpful? Yes No
This article describes the hotfixes that are currently available for Windows Server 2012-based failover
clusters and highly recommended to be installed on each server of a failover cluster.
Summary
Failover Cluster Management enables multiple servers to provide a high availability of server roles.
Failover Cluster Management is frequently used for file services, virtual machines, database
applications, and mail applications.
) Important
The process for installing service packs and hotfixes on Windows Server 2012 differs from the
process in earlier versions. In Windows Server 2012, you can use the Cluster-Aware Updating
(CAU) feature. CAU automates the software-updating process on clustered servers while
maintaining availability. For more information, see Cluster-Aware Updating Overview.
Introduction
The following Microsoft Knowledge Base articles describe the currently available fixes that are highly
recommended to be installed on all failover clusters. Most of the updates apply to computers that
are running Windows Server 2012. Some updates, such as KB 976424 , may be needed on
computers that are running Windows Server 2008 R2 or Windows Server 2008 if those operating
systems are present in the environment.
These updates are considered to be important to install to ensure the highest level of reliability.
7 Note
You may substitute a newer monthly rollup in place of KB 4282815. The remainder of the
updates in this list are still needed as some components in those updates released before
September 2016 and are not included in the newer monthly rollup.
ノ Expand table
Date Knowledge Title Component Why we recommend this
when the Base hotfix
hotfix article
was
added
September 3185280 September 2016 update rollup for Clussvc.exe Resolves an issue when a cluster
30, 2016 Windows Server 2012 node sends an Internet Control
Message Protocol (ICMP)
request to a gateway, TCPIP
returns a timeout error (Error
code 11010,
IP_REQ_TIMED_OUT), even if
ICMP doesn't receive a timeout.
Available from Windows Update.
Includes the fixes in 3090343
and 3076953 .
July 22, 3062586 0x000000D1 Stop error on a Windows Netft Prevents a Stop 0xD1 when
2015 Server 2012-based cluster processing a network buffer list
(NBL). Not all 0x000000D1 Stop
errors are caused by this issue.
Available for individual
download.
July 6, 3018489 "No host bus adapter is present" error Storport To receive the updated logging
2015 when querying SAS cable issues in capabilities of storport.sys
Windows Server 2012 R2 or Windows covered in KB 2819476 plus
Server 2012 the fixes in KB 3018489 , KB
2908783 and KB 2867201 .
Available for individual
download.
April 22, 3048474 WMI provider cannot start when you WMI Recovers a WMI provider when it
2015 manage Hyper-V or failover cluster in has hit the WMI memory
Windows 8 or Windows Server 2012 threshold so you can continue to
manage Hyper-V or failover
cluster in Windows 8 or
Windows Server 2012. Available
for individual download.
January 3004098 Memory leak occurs when you create or Csvfs.sys Prevents a memory leak when
13, 2015 delete CSV snapshots by using a VSS you create or delete CSV
hardware provider in Windows snapshots by using a hardware
Volume Shadow Copy Service
(VSS) provider. Available for
individual download.
April 8, 2916993 Stop error 0x9E in Windows Server 2012 Ntoskrnl.exe Prevents a lock contention and
2014 or Windows 8 Stop 0x9e when a large file is
mapped into the system cache,
for instance a backup operation
is copying files from snapshots.
Available for individual
download.
Date Knowledge Title Component Why we recommend this
when the Base hotfix
hotfix article
was
added
March 17, 2929869 CSV snapshot file is corrupted when Csvflt.sys Prevents CSV snapshot file
2014 you create some files on the live volume Csvfs.sys corruption when a file is deleted
Volsnap.sys and recreated on the live
volume. Available for individual
download.
Jan. 2, 2878635 Update is available that improves the Multiple This hotfix prevents a CSV
2014 resiliency of the cloud service provider failover by fixing an underlying
in Windows Server 2012: December issue in NTFS, software
2013 snapshots, and by increasing the
overall resilience of the Cluster
service and CSV during expected
pause states. Available for
individual download.
Nov. 14, 2894464 Error message when you try to schedule Failover This hotfix resolves an error
2013 a shadow copy task in Windows Server Cluster when you try to schedule a
2012 Resource DLL shadow copy task on a shared
disk. Available for individual
download.
June 14, 2838043 Can't access a resource that is hosted Failover This hotfix prevents an error
2013 on a Windows Server 2012-based Cluster when resources that are hosted
failover cluster Resource DLL on a Windows 8-based or
Windows Server 2012-based
failover cluster are accessed
from a Windows XP-based or
Windows Server 2003-based
client computer.
Jan. 23, 2803748 Failover Cluster Management snap-in Failover Resolves a crash in the Failover
2013 crashes after you install update 2750149 Cluster Cluster Management snap-in
on a Windows Server 2012-based Management after update 2750149 is installed
failover cluster snap-in on a Windows Server 2012-
based failover cluster. Available
from Windows Update or the
Microsoft Download Center.
Nov. 13, 2770917 Windows 8 and Windows Server 2012 Multiple Improves clustered server
2012 cumulative update: November 2012 performance and reliability in
Hyper-V and Scale-Out File
Server scenarios. Improves SMB
service and client reliability
under certain stress conditions.
Install update 2770917 by using
Windows Update in order to
receive the cumulative update as
described in KB 2770917.
Nov. 13, 976424 Error code when the kpasswd protocol KDCSVC Install on every domain
2012 fails after you perform an authoritative controller that is running
restore: Windows Server 2008 Service
"KDC_ERROR_S_PRINCIPAL_UNKNOWN" Pack 2 or Windows Server 2008
R2 in order to add a Windows
Server 2012 failover cluster.
Otherwise, Create Cluster may
fail with error message:
CreateClusterNameCOIfNotExists
(6783): Unable to set password
on <ClusterName$> when it
tries to set the password for the
cluster computer object. This
hotfix is included in Windows
Server 2008 R2 Service Pack 1.
More information
For more information about the recommended hotfixes and updates for Windows Server 2012-
based Hyper-V servers and Windows Server 2012 R2-based failover clusters, see the following
resources:
Recommended hotfixes and updates for Windows Server 2012 R2-based failover clusters
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where a corrupted memory dump file is
generated when you try to obtain a full memory dump file from a virtual machine.
Symptoms
You have a virtual machine that is running in a cluster environment in Windows Server
2012 or Windows Server 2008 R2. When you try to obtain a full memory dump file from
the virtual machine, a corrupted memory dump file is generated. While the memory
dump file is loading, you may receive the following message:
Additionally, you may notice that writing a full memory dump file does not finish and
that the virtual machine is restarted on another node in the cluster.
Cause
This issue occurs because the Enable heartbeat monitoring for the virtual machine
option is selected for the virtual machine. This option resets the clustered virtual
machine after one minute (the default value), and the clustered virtual machine requires
longer that one minute to finish writing the memory dump.
7 Note
Heartbeats between the virtual machine and Virtual Machine Manager occur every
few seconds. It can require up to one minute to detect that the virtual machine is
down because the virtual machine resource checks the heartbeat status from
Virtual Machine Manager in its isAlive entry-point function. By default, isAlive
occurs one time every minute. However, the heartbeats may stop 30 seconds
before the one-minute interval. In this case, the cluster can restart the virtual
machine on the same server or fail it over to another node.
Resolution
To resolve this issue, disable the Enable heartbeat monitoring for the virtual machine
option.
2. Check the virtual machine name. To do this, type the following Windows
PowerShell command:
PowerShell
PS C:\> Get-ClusterResource
3. Check whether the Enable heartbeat monitoring for the virtual machine and
Enable automatic recovery for application health monitoring options are
selected. To do this, type the following Windows PowerShell command:
PowerShell
4. When the CheckHeartbeat value is 1, both options are selected. To cancel both
options, change this value to 0. To do this, type the following Windows PowerShell
command:
PowerShell
If you want to cancel only the Enable automatic recovery for application health
monitoring option, you should run the following Windows PowerShell command:
PowerShell
More information
Mini and kernel memory dump files are written successfully. This occurs because the
time that is required to write these files doesn't exceed the one-minute threshold.
Feedback
Was this page helpful? Yes No
This article lists all the available switches that can be used as startup parameters to start
the Cluster service.
Summary
This is a list of all the available switches that can be used as startup parameters to start
the Cluster service.
To do this, go to the properties of the service, put the appropriate switch in the Start
Parameters box, and then click Start.
You can also use the switches when you start the Cluster service from the command line.
For example:
Console
7 Note
Include a dash (-) before the switch for Microsoft Windows 2000 Server and earlier
versions.
The debug switch has special startup parameters. See the Debug section later in
this article for correct usage.
Windows Server 2003 includes abbreviations for each switch. This simplifies using
Cluster service startup switches. For example, you can start the service with the
/FixQuorum switch or the /FQ switch.
ノ Expand table
Switch Function Windows 2003
Abbreviation
ノ Expand table
Windows Server 2003 and later only switches include the following.
ノ Expand table
ForceQuorum or Force a majority node set with the node list N1, FO
<N1,N2,...> N2, and so forth. (Applicable only for Majority
Node Set quorum.)
Description of switches
The following is a description of some of the switches:
Debug
Function: Cluster logging may not contain any helpful information in diagnosing Cluster
service to start failures. This is because the Cluster service may fail prior to the
Cluster.log starting. Starting the Cluster service with this switch displays the initialization
of the Cluster service and can help you identify these early occurring problems.
Requirements: Use this switch for temporary diagnostic purposes only. If the Cluster
service fails to start because of a logon error of the service account, or another system-
related error, the service may not have a chance to run. As a result, a cluster.log file may
not be created. This method runs the service outside the normal environment given by
the Service Control Manager. To use this switch, you must be logged on locally with
administrative rights and start the command from the command prompt. Don't use the
debug switch for normal use or for any length of time. The service doesn't run as
efficiently with the option set.
Usage scenarios: This switch must be used only when the Cluster service fails to start up.
This switch will display on the screen the operation of the Cluster service as it tries to
start. This switch can only be used when starting the service from the command prompt,
and you must be in the folder where the Cluster service is installed. By default, this is
%SystemRoot%\Cluster. This is also the only switch that you don't use with the net start
command to start the service.
ノ Expand table
# Description
3 All events, including those not written to the event log, are logged.
Alternatively, you can also use the set command to control the cluster log level when
you use the debug switch. From the command prompt, type the following set
clusterloglevel= x where x is one of the values that is shown in the previous table.
The Cluster service sends output to the window similar to what you would see in the
cluster.log. Alternatively, you can also capture this information to a file by using the
following command syntax:
When the Cluster service is running correctly, press CTRL+C to stop the service.
7 Note
You can use the ClusterLogLevel environment variable to control the output level
when you use the debug switch.
FixQuorum
Function: Lets the cluster service start up despite problems with the quorum device. The
only resources that will be brought online once the service is started is the Cluster IP
Address and the Cluster Name. You can open Cluster Administrator and bring other
resources online manually.
Requirements: This switch MUST be used only in diagnosis mode on a very temporary
basis and not during normal operation. Only one node must be started up using this
switch and a second node must not be attempted to be joined to the node started up
using this switch. Typically, this switch is used alone.
Usage scenarios: If the cluster service is unable to start up in the normal way because of
the failure of the quorum resource, users can start up the cluster service in this mode
and attempt to diagnose the failure.
Operation: After the cluster service is started up, all resources including the quorum
resource remain offline. Users can then manually try to bring the quorum resource
online and monitor the cluster log entries as well as the new event log entries and
attempt to diagnose any problems with the quorum resource. The syntax is as follows:
net start clussvc /fixquorum .
ResetQuorumLog
Function: If the quorum log and checkpoint file isn't found or is corrupt, this can be used
to create files based on the information in the local node's
%SystemRoot%\Cluster\CLUSDB registry hive. If the quorum log file is found to be in
proper order, this switch has no effect.
Requirements: Typically, only one node is started up by using this switch, and this switch
is used alone. It must be used only by experienced users who understand the
consequences of using information that is potentially out of date, to create a new
quorum log file.
Usage scenarios: This switch must be used only when the Cluster service fails to start up
on a Windows 2000 or later machine because of a missing or corrupted quorum log
(Quolog.log) and Chkxxx.tmp files. Windows NT 4.0 will automatically re-create these
files if they don't exist. This functionality was added in Windows 2000 to give more
control over the start of the Cluster service.
7 Note
If the cluster is running Windows 2000 Service Pack 4 (SP4) and the hotfix 872970
has previously been installed, /resetquorumlog is no longer needed. The default
behavior is to create a new log file at startup if the old one is missing or corrupt.
Operation: The Cluster service does an auto-reset of the quorum log file if it's found to
be missing or corrupted by using the information in the currently loaded cluster hive by
using the file %systemroot%\Cluster\CLUSDB. The syntax is as follows:
Console
DebugResMon
Function: Helps you to debug the resource monitor process and, therefore, the resource
dynamic-link libraries (DLLs) that are loaded by the resource monitor. You can use any
standard Windows-based debugger.
Requirements: Can only be used when the cluster service is started from the command
prompt and when using the debug switch. There's no equivalent registry setting that
can be used when Cluster service is run as a service. Debugger must be available for
attaching to the resource monitor when it starts up. Typically, this switch is used alone.
Usage scenarios: Developers can use this switch to debug the resource monitor process
and their custom resource DLLs. This option is extremely useful if a bug in a resource
DLL causes the resource monitor process to quit unexpectedly soon after it's started up
by the Cluster service and before users can manually attach a debugger to the resource
monitor process.
Operation: Just before the resource monitor process is started up, the Cluster service
process waits with a message (Waiting for debugger to connect to the resmon process
X),where X is the Process ID (PID) of the resource monitor process. The Cluster service
does this waiting for all resource monitor processes created by it. After the user attaches
a debugger to the resource monitor process, and the resource monitor process starts
up, the Cluster service continues with its initialization.
NoRepEvtLogging
Function: The norepevtlogging switch prevents replication of those events recorded in
the event log. This switch is useful in reducing the amount of information displayed in
the command window by filtering out events already recorded in the event log. Event
log replication is a feature that was added in Windows 2000.
Usage scenarios: This switch is used to prevent replication of the event logs. If there's a
large number of event log entries, the Cluster service will replicate these, and log these
to the cluster.log. This can cause the cluster.log to wrap quickly. The switch can also be
used to start the Cluster service and log those events that aren't recorded in the event
log to a local file, Debugnorep.log. The syntax is as follows:
Console
Operation: The norepevtlogging command can be set as a start parameter when starting
the Cluster service from the Computer Management console.
Console
This command prevents the node that was started with this switch from replicating its
information to other nodes, but it will still receive information from other nodes that
were started normally.
NoQuorumLogging
Function: Turns off all logging of the cluster registry changes to the quorum disk.
Registry check pointing doesn't affect other resources.
Requirements: This switch must be used only in diagnosis mode to diagnose problems
with the quorum log file (Quolog.log) or the cluster hive checkpoint file (Chkxxx.tmp) in
the \MSCS directory on the quorum drive. If one node is started up by using this switch,
any other node must also be started up by using this switch. Typically, this switch is used
on one node alone.
Usage scenarios: Use this switch when the quorum log file or checkpoint files become
corrupted and you want to manually replace these files with backup copies.
Operation: The Cluster service completely bypasses the logging functionality in this case.
When run in this mode, "partition-in-time" scenarios can occur. If this is the case, cluster
node registry entries can fall out of synchronization, and new changes can be lost. The
syntax is as follows: net start clussvc /noquorumlogging .
ForceQuorum
Function: When you use a Majority Node Set (MNS) quorum model on a Windows
Server 2003 cluster, in some cases a cluster must be allowed to continue to run even if it
doesn't have quorum (majority). Consider the case of a geographically dispersed cluster
with four nodes at the primary site and three nodes at the secondary site. While there
are no failures, the cluster is a seven-node cluster where resources can be hosted on any
node, on any site. If there's a communications failure between the sites or if the
secondary site is taken offline (or fails), the primary site can continue because it will still
have quorum. All resources will be re-hosted and brought online at the primary site.
In the event of a catastrophic failure of the primary site, however, the secondary site will
lose quorum, and, therefore, all resources will be terminated at that site. One of the
primary purposes for having a multi-site cluster is to survive a disaster at the primary
site; however, the cluster software itself can't make a determination about the state of
the primary site. The cluster software can't differentiate between a communications
failure between the sites and a disaster at the primary site. That must be done by
manual intervention. In other words, the secondary site can be forced to continue even
though the Cluster service believes it doesn't have quorum. This is known as forcing
quorum.
Because this mechanism is effectively breaking the semantics associated with the
quorum replica set, it must only be done under controlled conditions. In the example
above, if the secondary site and primary site lose communication and an administrator
forces quorum at the secondary site, resources will be brought online at BOTH sites,
thus allowing the potential for inconsistent data or data corruption in the cluster.
Requirements: Forcing quorum is a manual process that requires that you stop the
Cluster service on ALL the remaining nodes. The Cluster service must be told which
nodes should be considered as having quorum.
Usage scenarios: Special care must be taken if and when the primary site comes back
because the nodes are configured as part of the cluster. While a cluster is running in the
force quorum state, it's fully functional. For example, nodes can be added or removed
from the cluster; new resources, groups, and so forth, can be defined.
7 Note
The Cluster service on all nodes NOT in the force quorum node list must remain
stopped until the force quorum information is removed. Failure to do so can lead to
data inconsistencies OR data corruption.
Operation: Set up the Cluster service startup parameters on ALL remaining nodes in the
cluster. This is done by starting up the Services control panel, selecting the Cluster
service, and then entering the following in the Start parameters option:
Console
For example, if the secondary site contains Node5, Node6, and Node7, and you wanted
to start the Cluster service and have those be the only nodes in the cluster, use the
following command:
Console
7 Note
There should be no spaces in the key (except where there are spaces in the node
names themselves).
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that Cluster Service stops responding on a
Cluster Node when you restart the Active Node.
Symptoms
When you restart the active node of a server cluster that consists of two or more nodes,
you experience all the following symptoms:
If you are running Cluster Administrator on the remaining nodes, you receive the
following error message when you try to connect to the cluster:
When you view the contents of C:\Winnt\ Cluster.log, you see information similar
to:
Cause
This issue occurs if you pause one node of a server cluster and then you restart the
active cluster node. When the active node restarts, the paused node tries to bring
resource groups online. Because this node is paused, the node cannot make additional
connections, and it cannot bring the Quorum disk group online. Error code 70
corresponds to the following error message:
The remote server has been paused or is in the process of being started.
7 Note
These results will also occur in clusters that have more than two nodes. Even
though a non-paused node exists in a working state when the active node is
restarted, if the paused node is the first node that is contacted to take ownership of
the quorum disk. The non-paused node does not have the opportunity to arbitrate
for the quorum disk.
Resolution
To resolve this issue, resume the paused cluster node before you restart the active
cluster node.
7 Note
Before you resume a paused cluster node, you must first determine if a cluster
node is paused.
1. Click Start, click Run, type cmd in the Open box, and then click OK.
2. At the command prompt, type cluster node, and then press ENTER. Output is
similar to:
7 Note
The following sample output is based on a two-node cluster configuration. If
you have more than two nodes, the additional nodes will also appear in the
list.
7 Note
If the only cluster node that is not paused is in the process of restarting, you
receive the following error message:
System error 1753 has occurred. There are no more endpoints available from
the endpoint mapper.
For example, type cluster node cluster-1 /resume, and then press ENTER.
Information appears that is similar to:
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot the Cluster service when it creates or modifies
a computer object in Active Directory for a server cluster (virtual server).
If several clusters are using the same domain account as their Cluster service
account, you may receive this error message before you create ten computer
objects in a given cluster. One way to resolve this issue is to grant the Cluster service
account the Create Computer Objects permission on the Computers container. This
permission overrides the Add Workstations to a Domain user right, which has a
default quota of ten.
To verify that the Cluster service account has the Add Workstations to a Domain user
right:
1. Sign in to the domain controller on which the Cluster service account is stored.
2. Start the Domain Controller Security Policy program from Administrative Tools.
3. Click to expand Local Policies, and then click to expand User Rights Assignments.
4. Double-click Add Workstations to a Domain and note the accounts that are listed.
5. The Authenticated Users group (the default group) should be listed. If it isn't listed,
you must grant this user right to either the Cluster service account or a group that
contains the Cluster service account on the domain controllers.
7 Note
You must grant this user right to the domain controllers because computer
objects are created on the domain controllers.
6. If you explicitly add the Cluster service account to this user right, run gpupdate on
the domain controller (or run secedit for Windows 2000) so that the new user
right is replicated to all domain controllers.
1. Start the Local Security Settings console from the Administrative Tools group.
3. Verify that the Cluster Service account has explicitly been given the following
rights:
Sign in as a service
Act as part of the operating system
Back up files and directories
Adjust memory quotas for a process
Increase scheduling priority
Restore files and directories
7 Note
If the Cluster Service account has been removed from the local Administrators
Group, manually re-create the Cluster service account and give the Cluster
Service the required rights.
If any of the rights are missing, give the Cluster Service account explicit rights for it,
then stop and restart the Cluster Service. The added rights don't take effect until
you restart the Cluster Service. If the Cluster Service account still can't create a
Computer Object, verify that a Group Policy isn't over-writing the Local Policy. To
do it, you can either type gpresult at the Command Prompt if you are in a
Windows 2000 Domain or Resultant Set of Policy (RSOP) from an MMC Snap-in if
you are on a Windows Server 2003 domain.
If you are in a Windows Server 2003 domain, search in Help and Support on
"RSOP" for instructions on using Resultant Set of Policy.
If the Cluster Service account doesn't have the "Act as part of the operating
system" right, the Network Name resource will fail and the Cluster.log will register
the following message:
Use the above steps to verify that the Cluster Service account has all the
required rights. If the local security policies are being over-written by a Domain
or Organizational Unit (OU) Group policy, then there are several options. You
can place the Cluster nodes into their own OU that has the "Allow inheritable
permissions from parent to propagate to this object" de-deselected.
To verify that the Cluster service account has the proper permissions on the computer
object:
1. Start the Active Directory Users and Computers snap-in from Administrative Tools.
3. Locate the computer object that you want the Cluster service account to use.
4. Right-click the computer object, and then select Properties.
6. Add the Cluster service account or a group that the Cluster Service account is a
member of.
Reset Password
Validated Write to DNS Host Name
Validated Write to Service Principal Name
8. Select OK. If there are multiple domain controllers, you may need to wait for the
permission change to be replicated to the other domain controllers (by default, a
replication cycle occurs every 15 minutes).
Feedback
Was this page helpful? Yes No
This article helps you diagnose and resolve Event ID 1135, which may be logged during
the startup of the Cluster service in Failover Clustering environment.
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Azure
Stack HCI, versions 21H2 and 20H2
Try our Virtual Agent - It can help you quickly identify and fix common Active
Start page
Event ID 1135 indicates that one or more Cluster nodes were removed from the active
failover cluster membership. It may be accompanied by the following symptoms:
Having a problem with nodes being removed from active Failover Cluster
membership
Event ID 1069:
A validation and the network tests would be recommended as one of the initial
troubleshooting steps to ensure there are no configuration issues that might be a cause
for problems.
Recommended hotfixes and updates for Windows Server 2012 R2-based failover
clusters
Recommended hotfixes and updates for Windows Server 2012-based failover
clusters
Recommended hotfixes and updates for Windows Server 2008 R2 SP1 failover
clusters
Is the cluster service continuously running and available on all the nodes?
Output
Event ID 1135
Cluster node ' **NODE A** ' was removed from the active failover cluster
membership. The Cluster service on this node may have stopped.
This could also be due to the node having lost communication with other
active nodes in the failover cluster.
Run the Validate a Configuration wizard to check your network configuration.
If the condition persists, check for hardware or software errors related to
the network adapters on this node.
Also check for failures in any other network components to which the node is
connected such as hubs, switches, or bridges.
Scenario A
You're looking at all the Events and all the nodes in the cluster are indicating that NODE
A had lost communication.
It could be possible that when you're seeing the system logs on NODE A, it has events
for all the remaining nodes in the cluster.
Solution
This quite suggests that at the time of issue, either due to network congestion or
otherwise the communication to the NODE A was lost.
You should review and validate the Network configuration and communication issues.
Remember to look for issues pertaining to Node A.
Scenario B
You're looking at the Events on the nodes and let us say that your cluster is dispersed
across two sites. NODE A, NODE B, and NODE C at Site 1 and NODE D & NODE E at Site
2.
On Nodes A,B, and C, you see that the events that are logged are for connectivity to
Nodes D & E. Similarly, when you see the events on Nodes D & E, the events suggest
that we lost communication with A, B, and C.
Solution
If you see similar activity, it is indicative that there was a communication failure, over the
link that connects these sites. We would recommend that you review the connection
across the sites, if this is over a WAN connection, we would suggest that you verify with
your ISP about the connectivity.
Scenario C
You're looking at the Events on the nodes and you see that the names of the nodes
don't tally out with any particular pattern. Let us say that your cluster is dispersed across
two sites. NODE A, NODE B and NODE C at Site 1 and NODE D & NODE E at Site 2.
Solution
Such events are possible when the network channels between the nodes are choked and
the cluster communication messages are not reaching in a timely manner, making the
cluster to feel that the communication between the nodes is lost resulting in the
removal of nodes from the cluster membership.
Configure the real-time scanning component within your antivirus software to exclude
the following directories and files:
Snapshot directories
mms.exe
7 Note
This file may have to be configured as a process exclusion within the antivirus
software.
Vmwp.exe
7 Note
This file may have to be configured as a process exclusion within the antivirus
software.
Additionally, when you use Live Migration together with Cluster Shared Volumes,
exclude the CSV path C:\Clusterstorage and all its subdirectories. If you're
troubleshooting failover issues or general problems with Cluster services and antivirus
software is installed, temporarily uninstall the antivirus software or check with the
manufacturer of the software to determine whether the antivirus software works with
Cluster services. Just disabling the antivirus software is insufficient in most cases. Even if
you disable the antivirus software, the filter driver is still loaded when you restart the
computer.
ノ Expand table
Application Protocol Ports
Cluster Service TCP 3343 (This port is required during a node join
operation.)
Randomly allocated high UDP UDP Random port number between 1024 and 65535
ports** Random port number between 49152 and
65535***
7 Note
For more information, see Creating a Windows Server 2012 Failover Cluster Fails
with Error 0xc000005e.
For more information about how to customize these ports, see the "References"
section in Service overview and network port requirements for Windows.
This is the range in Windows Server 2012, Windows 8, Windows Server 2008 R2,
Windows 7, Windows Server 2008, and Windows Vista.
Besides, run the following command to check for network port configuration in firewall.
For example: This command helps determine port 3343 available\open used for Failover
Cluster:
Console
1. Run the Cluster Validation report for any errors or warnings. For more information,
see Understanding Cluster Validation Tests: Network
2. Verify for warnings and errors for Networks. For more information, see
Understanding Cluster Validation Tests: Network.
Check the List Network Binding Order
This test lists the order in which networks are bound to the adapters on each node.
The Adapters and Bindings tab lists the connections in the order in which the
connections are accessed by network services. The order of these connections reflects
the order in which generic TCP/IP calls/packets are sent on to the wire.
Follow the below steps to change the binding order of network adapters:
1. Select Start, select Run, type ncpa.cpl, and then select OK. You can see the
available connections in the LAN and High-Speed Internet section of the Network
Connections window.
2. On the Advanced menu, select Advanced Settings, and then select the Adapters
and Bindings tab.
3. In the Connections area, select the connection that you want to move higher in
the list. Use the arrow buttons to move the connection. As a general rule, the card
that talks to the network (domain connectivity, routing to other networks, etc.
should be the first bound (top of the list) card).
Cluster nodes are multi-homed systems. Network priority affects DNS Client for
outbound network connectivity. Network adapters used for client communication
should be at the top in the binding order. Non-routed networks can be placed at lower
priority. In Windows Server 2012 and Windows Server 2012 R2, the Cluster Network
Driver (NETFT.SYS) adapter is automatically placed at the bottom in the binding order
list.
This test validates that tested servers can communicate with acceptable latency on all
networks.
For example: Under Validate Network Communication, you may see the following
messages for network latency issues:
Output
For multi-site cluster, you may increase the time-out values. For more information, see
Configure Heartbeat and DNS Settings in a Multi-Site Failover Cluster.
If the packet is lost on the wire somewhere between the nodes, then the
heartbeats will fail. We can easily find out if this is a problem by using Performance
Monitor to look at the "Network Interface\Packets Received Discarded" counter.
Once you have added this counter, look at the Average, Minimum, and Maximum
numbers and if they are any value higher than zero, then the receive buffer needs
to be adjusted up for the adapter.
If you're experiencing network packet lost on VMware virtualization platform, see
the "Cluster installed in the VMware virtualization platform" section.
This issue may occur if the packets are dropped during high traffic bursts. Ensure that
there is no traffic filtering occurring (for example, with a mail filter). After eliminating this
possibility, gradually increase the number of buffers in the guest operating system and
verify.
Check the following articles to verify VMware adapter issues in case of VMware
environment:
If it still doesn't work, please check if you have seen partitioned network in cluster GUI
or you have NIC teaming enabled on the heartbeat NIC.
If you see partitioned network in cluster GUI, see "Partitioned" Cluster Networks to
troubleshoot the issue.
If you have NIC teaming enabled on the heartbeat NIC, check Teaming software
functionality as per teaming vendor's recommendation.
This issue can occurs due to outdated NIC drivers or faulty NIC adapters.
If there are network packets lost between nodes on Physical machines, have your
network adapter driver updates. Old or out-of-date network card drivers and/or
firmware.
At times, a simple misconfiguration of the network card or switch can also cause loss of
heartbeats.
Feedback
Was this page helpful? Yes No
This article describes the basic troubleshooting steps you can use to diagnose Cluster
service startup issues with Windows Server 2003.
Summary
This article describes basic troubleshooting steps you can use to diagnose Cluster
service startup issues with Windows Server 2003. Although this isn't a comprehensive list
of all the issues that can cause the Cluster service not to start, it does address a majority
Windows Server 2003 startup issues. The contents of this article do NOT apply to
Windows Server 2008 or later.
More information
When the Cluster service initially starts, it attempts to join an existing cluster. For this to
occur, the Cluster service must be able to contact an existing cluster node. If the join
procedure doesn't succeed, the cluster continues to the form stage; the main
requirement of this stage is the ability to mount the quorum device.
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
1. Verify that the cluster node that is having problems is able to properly authenticate
the Service account. You can determine this by logging on to the computer with
the Cluster service account, or by checking the System event log for Cluster service
logon problem event messages.
2. Verify that the %SystemRoot%\Cluster folder contains a valid Clusdb file and that
the Cluster service attempted to start. Start Registry Editor (Regedt32.3xe) and
verify that the following registry key is valid and loaded:
HKEY_LOCAL_MACHINE\Cluster
The cluster hive should have a structure that is very similar to Cluster
Administrator. Make note of the network and quorum keys. If the database isn't
valid, you can copy and use the cluster database from a live node.
3. If the node isn't the first node in the cluster, check connectivity to other cluster
nodes across all available networks. Use the Ping.exe tool to verify TCP/IP
connectivity, and use Cluster Administrator to verify that the Cluster service can be
contacted. Use the TCP/IP addresses of the network adapters in the other nodes in
the Connect to dialog box in Cluster Administrator.
4. If it can't contact any other node, the service continues with the form phase. It
attempts to locate information about the quorum in the local cluster database, and
then tries to mount the disk. If the quorum disk can't be mounted, the service
doesn't start. If another node has successfully started and has ownership of the
quorum, the service doesn't start. This is usually caused by connectivity or
authentication issues. If this isn't the case, you can check the status of the quorum
device by starting the service with the -fixquorum switch, and attempt to bring the
quorum disk online, or change the quorum location for the service. Also, check the
System event log for disk errors. If the quorum disk successfully comes online, it's
likely that the quorum is corrupted.
5. Check the attributes of the Cluster.log file to make sure that it's not read-only, and
make sure that no policy is in effect that prevents modification of the Cluster.log
file. If either of these conditions exist, the Cluster service can't start.
If these steps don't resolve the problem, you should take additional troubleshooting
steps. The cluster log file can be valuable in additional troubleshooting. By default,
cluster logging is enabled on Windows 2000-based computers that are running the
Cluster service.
Feedback
Was this page helpful? Yes No
Troubleshooting checklist
Port 135: Remote procedure call (RPC) endpoint mapper or distributed component
object model (DCOM).
Port 135: RPC endpoint mapper over user datagram protocol (UDP).
Ports in the range of 5000 to 5099: If Event ID 1721 is logged when you connect to
a cluster as a cluster administrator, try opening the ports in this range (or other
ports) to RPC traffic. The ports support communication through RPC unless you
just type a period character (.).
This issue can occur because the cluster service uses at least 100 ports for RPC
communication. The number of ports available to the cluster service can become
too small when other services use some of the necessary ports. These services may
include Windows DNS service, Windows Internet Name service (WINS), or
Microsoft SQL Server service.
Ports in the range of 8011 to 8031: If firewalls separate the cluster nodes, the ports
in the range of 8011 to 8031 must be open to internode RPC traffic. Otherwise,
errors in the cluster log indicate that a sponsor node isn't available. These errors
occur because there aren't enough ports available for RPC communication
between a node that tries to join the cluster and a node that can sponsor that
node.
For more information about how to configure a network and network ports for a cluster,
see the following articles:
Enable a network for cluster use
After you change the port settings, try to bring the node online again before you
proceed.
4. Type the name of each node in the cluster and select Add after each one.
5. When all nodes have been added to the Selected servers: list, select Next.
8. Review any tests results that are labeled as Failed or Warning. This information
may help provide actionable steps to fix the issue.
7 Note
7 Note
To access the local security policy settings, select Start, type local security policy,
and then select Local Security Policy.
Make sure that the list of accounts includes the accounts that are responsible for
running the cluster node. For more information, see How to access this computer
from the network and Allow log on locally security policy setting.
Make sure that the list of accounts doesn't include local accounts. For more
information, see How to deny access to this computer from the network.
Make sure the list of accounts and groups doesn't include the "Everyone" group.
For more information, see Deny log on locally security policy setting.
After you change the policy settings, try to bring the node online again before you
proceed.
) Important
Don't leave this change in place after you finish troubleshooting. After you use this
change for testing, return these settings to the original configuration.
Check the network adapter, cables, and network configuration for the networks
that connect the nodes.
If you're teaming the network adapters, make sure that the teaming configuration
is correct.
Check hubs, switches, or bridges in the networks that connect the nodes.
Generate a fresh cluster log for the node. On the server that is running the affected
node, open an elevated PowerShell prompt and run the following cmdlet:
1. At an elevated PowerShell prompt, run the following cmdlet to start the trace:
5. To generate a cluster log from the data, run the following cmdlet:
For more information about tracing and other issues to look out for, see How to
Troubleshoot Create Cluster Failures .
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix common Active
This guidance is designed to help troubleshoot status codes related to Event ID 5120
Cluster Shared Volume.
Troubleshooting checklist
Event ID 5120 indicates that there has been an interruption to communication between
a cluster node and a volume in Cluster Shared Volumes (CSV). This interruption may be
short enough that it isn't noticeable or long enough that it interferes with services and
applications using the volume. If the interruption persists, review other events in the
System or Application event logs for information about communication between the
node and the volume.
1. Verify that the Cluster Shared Volume can come online. To confirm that a Cluster
Shared Volume can come online:
a. To open the failover cluster snap-in, select Start > Administrative Tools >
Failover Cluster Manager. If the User Account Control dialog box appears,
confirm that the action it displays is what you want, and then select Yes.
b. In the Failover Cluster Manager snap-in, check whether the cluster you want to
manage is displayed. If it isn't displayed, then in the console tree, right-click
Failover Cluster Manager, select Manage a Cluster, and then select or specify
the cluster you want.
c. If the console tree is collapsed, expand the tree under the cluster you want to
manage, and then select Cluster Shared Volumes.
d. In the center pane, expand the listing for the volume you're verifying and view
the status of the volume.
e. If a volume is offline, bring it online by right-clicking the volume and then
selecting Bring this resource online.
PowerShell
Get-ClusterSharedVolume
b. If you run the preceding cmdlet without specifying a resource name, the status
is displayed for all Cluster Shared Volumes in the cluster.
4. If you see Event ID 5120 is logged with error codes other than
STATUS_CLUSTER_CSV_AUTO_PAUSE_ERROR, it's a sign of a problem. Make sure to
review the error code in the description of each Event ID 5120 logged. Be careful
not to dismiss the event because of a single event with
STATUS_CLUSTER_CSV_AUTO_PAUSE_ERROR. If you see other errors logged, there
are fixes available that need to be applied.
Status code:
STATUS_BAD_IMPERSONATION_LEVEL(0xC00000A5)
Certain operations, such as renaming that you perform on files or folders on a Cluster
Shared Volume, may fail with the error "STATUS_BAD_IMPERSONATION_LEVEL
(0xC00000A5)". This issue occurs when you perform the operation on a CSV owner node
by using the context of a process that doesn't have administrator permissions.
1. Perform the operation by using the context of a process that has administrator
permissions.
2. Perform the operation by using a node that doesn't have CSV ownership.
Microsoft is working on a resolution and will provide an update in an upcoming release,
as described in February 12, 2019—KB4487020 (OS Build 15063.1631) .
PowerShell
7 Note
In this cmdlet, <integer> is the length of time for the server to verify every
path (in seconds). The default is 30 seconds.
Status code:
STATUS_CLUSTER_CSV_AUTO_PAUSE_ERROR(c0130021)
Make sure that the affected system has the latest versions of network and storage
drivers and firmware installed. Additionally, make sure that Microsoft updates and
hotfixes are up to date.
In particular, make sure that the following update is installed on all Windows Server
2012 R2 and earlier servers.
Update is available that improves the resiliency of the cloud service provider in
Windows: December 2013 (KB2878635)
7 Note
In Windows Server 2016 and later versions, the name of this status code is
STATUS_CLUSTER_CSV_NO_SNAPSHOTS.
Status code:
STATUS_CONNECTION_DISCONNECTED(c000020c)
Communication between a cluster node and a CSV has been interrupted. This
interruption may be short enough that it isn't noticeable or long enough that it
interferes with services and applications that use the volume. If the interruption persists,
review other events in the System or Application event logs for information about
communication between the node and the volume.
In addition, confirm that the CSV can come online by using the following steps:
7 Note
To perform the following procedures, the account you use has to be a domain
account and has to belong to the local Administrators group on each clustered
server, or it has to have the equivalent authority.
To use a PowerShell cmdlet to check the status of a resource in a failover cluster, open a
PowerShell Command Prompt window on a node in the cluster, and run Get-
ClusterSharedVolume .
7 Note
If you run the preceding cmdlet without specifying a resource name, the status is
displayed for all CSVs in the cluster.
For more information, see Event ID 5120 — Cluster Shared Volume Functionality.
Status code:
STATUS_DEVICE_NOT_CONNECTED(c000009d)
This status code indicates that connectivity between the cluster nodes and the storage
has been lost.
1. Check your system event log for events that indicate network connectivity
problems, host bus adapter (HBA) problems, or disk problems.
2. Make sure that the affected system has the latest versions of network and storage
drivers and firmware installed. Additionally, make sure that Microsoft updates and
hotfixes are up to date.
Status code:
STATUS_INSUFFICIENT_RESOURCES(c000009a)
Make sure that the affected system has the latest versions of network and storage
drivers and firmware installed. Additionally, make sure that Microsoft updates and
hotfixes are up to date.
The cause of the timeout varies. It might indicate a software, configuration, or hardware
problem.
1. Check your system event log for events that indicate network connectivity
problems, host bus adapter (HBA) problems, or disk problems.
2. Make sure that the affected system has the latest versions of network and storage
drivers and firmware installed. Additionally, make sure that Microsoft updates and
hotfixes are up to date. In particular, make sure that October 18, 2018—KB4462928
(OS Build 14393.2580) is installed. This update addresses an issue that occurs
when restarting a node after draining the node. Event ID 5120 appears in the log
with a "STATUS_IO_TIMEOUT c00000b5" message. This may slow or stop input and
output (I/O) to the VMs, and sometimes the nodes may drop out of cluster
membership.
Status code:
STATUS_MEDIA_WRITE_PROTECTED(c00000a2)
This status code indicates that there's a connectivity issue. Make sure that the Server
Message Block (SMB) protocol is enabled.
Status code:
STATUS_NETWORK_UNREACHABLE(c000023c)
This status code indicates that either there is a network fault between the node and the
CSV or Disk Control Manager (DCM) has mapped an incorrect path to the volume.
Make sure that the affected system has the latest versions of network and storage
drivers and firmware installed. Additionally, make sure that Microsoft updates and
hotfixes are up to date.
1. Check the network connectivity and the cluster exclusion in the firewall.
2. Make sure that the affected system has the latest versions of network and storage
drivers and firmware installed. Additionally, make sure that Microsoft updates and
hotfixes are up to date.
Status code:
STATUS_UNEXPECTED_NETWORK_ERROR(c00000c4)
Make sure that the affected system has the latest versions of network and storage
drivers and firmware installed. Additionally, make sure that Microsoft updates and
hotfixes are up to date.
In particular, make sure that October 18, 2018—KB4462928 (OS Build 14393.2580) is
installed. This update addresses a problem that generates this status code in the case of
multiple Windows Server 2016 Hyper-V clusters.
Data collection
Before contacting Microsoft Support, you can gather information about your issue.
1. Check the live dump folder (C:\Windows\LiveKernelReports\) for previous live dump
files.
2. Make sure that the live dump feature has been enabled. For more information on
enabling the feature, see Troubleshooting Hangs Using Live Dump .
5. Run the SDP tool to collect the logs from the source and destination nodes.
6. Unzip the file and run the following cmdlet on both nodes:
PowerShell
7. Collect all logs. Zip and attach the live dump files to your support request.
Feedback
Was this page helpful? Yes No
This article provides a solution to fix an issue where a Client Access Point (CAP) in a
failover cluster does not come online as expected.
Symptoms
A CAP in a Windows Server failover cluster does not come online as expected. In this
situation, the following Error event is logged:
Additionally, when you view the cluster log, you see the following error message:
Cause
During a cluster operation, maintenance tasks may be required on computer objects in
Active Directory. For example passwords may have to be created, deleted, enabled,
disabled, and rotated, and SPNs may have to be updated. When servers are located in
perimeter networks (also known as DMZs, demilitarized zones, and screened subnets)
that have access only to Read-Only Domain Controllers (RODC), you can work around
some of these tasks by manually creating and deleting computer objects. Other
operations are forwarded by RODCs to a writeable domain controller elsewhere in the
domain. However, there are some modification operations that the cluster performs in
which a writeable domain controller is explicitly requested.
Resolution
To resolve this problem, provide the failover cluster access to a writeable domain
controller.
To learn more about the Active Directory requirements for failover clustering, visit the
following Microsoft Web site:
Feedback
Was this page helpful? Yes No
This article describes Active Directory configuration validation may fail in a multi-site
cluster scenario.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4025260
Symptoms
When you run a cluster validation test for your multi-site failover cluster, the test may
fail at validating the Active Directory configuration with one of the following error
messages:
Regardless of the errors, the cluster nodes can successfully communicate with some
domain controller and form a failover cluster.
More information
When you start a cluster validation test on a node, the node selects a domain controller
to be used for the test. During the Active Directory configuration validation, all
computers that are selected as part of the validation are pointed to use this domain
controller. In a multi-site cluster scenario, the network communications may be
designed in way where computers are only allowed to communicate with domain
controllers that are in their local site. Therefore, these computers are prevented from
communications with remote domain controllers. In this scenario, computers in other
sites are not able to communicate with the selected domain controller, which leads to
the failure of the cluster validation test.
If the computers can communicate to a domain controller in the domain, and the
domain controllers are successfully replicating, then the functionality of your failover
cluster is not impacted.
In a multi-site cluster scenario, you can safely ignore the failed validation. Meanwhile,
your failover cluster is still supported by Microsoft Technical Support.
Feedback
Was this page helpful? Yes No
This article helps to fix the error "An item with the same key has already been added".
Symptoms
When you run the Validate a Configuration wizard for Windows Server 2008 Failover
Cluster, you may receive the following error:
"An error occurred while executing the test. There was an error verifying the firewall
configuration. An item with the same key has already been added."
Cause
This error is reported if any network adapters have the same Globally Unique Identifier
(GUID) across any nodes in the cluster. This can be determined by running the following
WMI query on each node in the cluster and comparing the results -
7 Note
This scenario typically occurs if an operating system image is being used to deploy
cluster nodes and that image was not correctly prepared for deployment by
running sysprep.
Resolution
To resolve this issue the network interface GUID's on each of the nodes must be unique.
One node can be left unchanged. But the following process must be performed against
the remaining nodes.
1. Download and then install the latest version of the network adapter driver on the
computer.
2. Click Start, click Run, type regedit, and then click OK.
5. Click Start, click Run, type sysdm.cpl, and then click OK.
6. In the Systems Properties dialog box, click the Hardware tab, and then click
Device Manager.
7. In Device Manager, expand Network adapters, right-click the network adapter that
you want, and then click Uninstall.
To verify that the network interface GUID was updated, use one of the following
methods.
Method 1: Perform the following:
Get-WMIObject Win32_NetworkAdapter | fl Name, Guid
Method 2: Run Failover Cluster's Validate a Configuration wizard, and make sure that the
error does not occur.
Feedback
Was this page helpful? Yes No
This article provides a resolution for a problem in which a duplicate address error occurs
when you validate a Windows Server 2008 failover cluster.
) Important
This article contains information about how to modify the registry. Make sure that
you back up the registry before you modify it. Make sure that you know how to
restore the registry if a problem occurs. For more information about how to back
up, restore, and modify the registry, click the following article number to view the
article in the Microsoft Knowledge Base: 322756 How to back up and restore the
registry in Windows
Symptoms
When you run a cluster validation wizard for a Windows Server 2008 cluster, the
validation fails. Additionally, you may receive an error that resembles the following error
message:
Verifying that there are no duplicate IP addresses between any pair of nodes.
Cause
This problem occurs when only one of the following conditions is true:
Resolution
There are two possible solutions, depending on the combination of error messages that
you receive.
Issue 1
If the error message doesn't include a reference to a "duplicate physical address,"
Teredo is most likely the cause of the problem. To resolve this problem, disable Teredo
by using one of the following two methods.
7 Note
The failover cluster validation tests have been changed in Windows Server 2008
SP2 and later and Windows Server 2008 R2 so that the Teredo addresses will not
cause the test to issue a failure or a warning.
7 Note
If the User Account Control dialog box appears, confirm that the action that
the dialog box displays is what you want, and then click Continue.
2. At the command prompt, type the following lines (press ENTER after each line):
Console
netsh
interface
teredo
set state disabled
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base: 322756 How to back up and restore the registry in Windows
1. For best results, close all programs on the computer on which you're changing the
registry setting.
2. Click Start, click All Programs, click Accessories, right-click Command Prompt, and
then click Run as administrator.
7 Note
If the User Account Control dialog box appears, confirm that the action that
the dialog box displays is what you want, and then click Continue.
5. Right-click Parameters, click New, click DWORD, and then type the name
DisabledComponents for the new value. Make sure that you type the name exactly
as shown, including capitalization. Then, click Enter.
6. Double-click DisabledComponents.
7. In the Edit DWORD Value dialog box, click Hexadecimal under the Base field, and
then type 8 in the Value data field.
8. Click OK.
7 Note
You can also disable Teredo by using Device Manager. However, this only
disables the Teredo adapter so that the system does not show the adapter
anymore. This does not disable the underlying logic for Teredo. This could
cause issues later. Therefore, we recommend that you disable Teredo through
the command line or through the registry entry.
Issue 2
If the error message includes a reference to a "duplicate physical address," the problem
most likely occurs because the referenced servers are based from the same image. To
resolve this issue, remove and then reinstall the Failover Cluster feature. To do this,
follow these steps:
7 Note
The Sysprep command is not supported when an image is captured after you add
the Failover Clustering feature. If you install the Failover Clustering feature, and
then you run the sysprep command on the image, the virtual adapter for all the
nodes will have the same MAC address. The virtual network adapter (NetFT) takes a
MAC address based from one of the addresses of the physical network interface
cards (NICs) when the Failover Clustering feature is installed.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section of this article.
For more information about the Teredo transition technology, visit the following Web
sites:
For more information about how to run the cluster validation wizard for a failover cluster
in Windows Server 2008, visit the following Web site:
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the SCSI-3 Persistent Reservation test
fails when you run the Failover Cluster Validation report.
Symptoms
When running the Failover Cluster Validation report on an existing cluster configured in
Windows Server 2008 R2 Service Pack 1, the SCSI-3 Persistent Reservation test may fail
with the following error:
Cause
Some Storage devices have a defined limit in the amount of SCSI-3 registrations or
reservations that it can handle. The problem comes in where you have exceeded that
limit.
Resolution
Work with the storage vendor to see if there is a firmware update that can raise this
limit. If a firmware update is not available, it may require that you move some of your
storage to different arrays.
Feedback
Was this page helpful? Yes No
This article discusses how to resolve an issue in which the Validate a Configuration
Wizard doesn't discover all of the shared LUNs that a cluster uses.
Symptoms
Consider the following scenario:
You have a Windows Server multi-site failover cluster that has nodes in site A and
site B.
A multi-site storage area network (SAN) uses storage arrays in each site for site-to-
site mirroring.
You use the Validate a Configuration Wizard to run a set of validation tests on the
failover cluster.
In this scenario, storage tests might not detect all logical unit numbers (LUNs) as shared
LUNs.
Cause
The storage validation tests that the wizard runs select only shared LUNs. For a shared
LUN, the disk signatures, device identification number (page 0x83), and storage array
serial number are the same on all cluster nodes. When you use site-to-site mirroring, a
LUN in one site (site A) has a mirrored LUN in another site (site B). These LUNs have the
same disk signatures and device identification numbers (page 0x83). However, the
storage array serial numbers are different. Because of the difference, the wizard doesn't
recognize that the LUNs are shared.
Resolution
To resolve the issue, run all the cluster validation tests before you configure the site-to-
site mirroring.
7 Note
If you have to run the validation tests after you configure mirroring, LUNs that you
don't select for the storage validation tests are supported by Microsoft and the
storage vendor as valid shared LUNs.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where validation fails when you run the Disk
Failover test on a Windows Server 2012 failover cluster.
Symptoms
When you run the Cluster Validation report on a Windows Server 2012 failover cluster,
the Validate Disk Failover test may fail, and you may receive errors that resemble the
following:
Node 2012N2.burragevmlab.com holds the SCSI PR on Test Disk 1 but has failed in its
attempt to bring the disk online. The device is not ready.
Cause
This issue occurs because the Automount feature is turned off. To determine whether this
option is turned off, follow these steps:
1. Open an administrative command prompt, and then run the following command:
Diskpart
Resolution
To resolve this issue, enable Automount . To do this, run the following command from an
administrative command prompt: Mountvol.exe /E
Make sure that you verify this information on all nodes that you will be adding to
the cluster.
Feedback
Was this page helpful? Yes No
This article provides a resolution to an issue where cluster disk cannot be found in
explorer or diskmgmt on Failover.
Symptoms
The file share resource failover from Node A to Node B and the file share disk (example
N:) doesn't show up in the explorer or disk management console. We see the following
events as the drive letter got swapped during failover and the file share resource won't
come online even if the dependencies of the files share (that is disk and IP) were online.
We also see:
Cause
This event happens if you have a network drive mapped on the Node B with the same
drive letter (that is N:) which was assigned to the cluster disk on the Active node.
It happens if you have the Mapped network drive assigned with the same drive letter,
which was held by cluster disk resource on the active node or on the node before
failover. If there is the local hard disk with same drive letter, then this issue doesn't
happen as the part manager assign the same drive letter by swapping it.
Resolution
You will be able to see the disk with drive letter N: on Node B in explorer and disk
management, once you disconnect the mapped network drive. Even if you don't
disconnect the network drive the drive letter would be still accessible with share and
also viewable with same drive letter N: under failover cluster MMC.
References
Failover Cluster Step-by-Step Guide: Configuring a Two-Node File Server Failover Cluster
Feedback
Was this page helpful? Yes No
This article provides a solution to the error 80070005 that occurs when failover cluster
validate fails.
Summary
On a Windows Server 2008 or Windows Server 2008 R2 Failover Cluster, Validate may fail
with either of the following errors:
OR
Validate IP Configuration
Validate that IP addresses are unique and subnets configured correctly.
An error occurred while executing the test.
There was an error initializing the network tests.
There was an error creating the server-side agent (CPrepSrv).
Creating an instance of the COM component with CLSID {E1568352-586D-43E4-
933F-8E6DC4DE317A} from the IClassFactory failed due to the following error:
80070005.
Cause
This can be caused by deploying a cloned image of the operating system that was not
properly prepared using the System Preparation Tool (Sysprep).
Resolution
If the base image was not generated by using Sysprep with the /Generalize option, you
must rebuild the base image, and then reinstall Windows Server.
More information
It is not supported to SysPrep servers that have the Failover Clustering feature installed.
The Failover Cluster feature must be installed after the system has been SysPreped and
cloned.
Feedback
Was this page helpful? Yes No
This article provides a solution to fix the error 0xc000005e that occurs when you create a
failover cluster with Windows Server 2012.
Symptoms
When attempting to run the Create Cluster Wizard to create a Failover Cluster with
Windows Server 2012, the operation may fail. Additionally, you may receive the
following error:
An error occurred while creating the cluster. An error occurred creating cluster
'MyCluster'. Unknown error (0xc000005e)
Cause
This problem can occur if TCP or UDP Port 464 is blocked.
Resolution
To resolve this problem, ensure that port 464 for both TCP and UDP is open on all
firewall network devices between the nodes in the cluster and the domain controller.
The error STATUS_NO_LOGON_SERVER is caused because the nodes in the cluster were
unable to communicate with a domain controller to set the password when attempting
to configure the computer objects in Active Directory. Port 464 is enabled by default in
Windows Firewall on Windows Server 2012.
More information
For more information on the Active Directory service port requirements, see the
following article: Active Directory and Active Directory Domain Services Port
Requirements
Feedback
Was this page helpful? Yes No
This article helps to fix a problem that occurs when you try to create a cluster on a set of
computers that have the Failover Clustering feature installed.
Symptoms
Consider the following scenario:
You install the Failover Clustering feature on a set of Windows Server 2008-based
computers.
You try to create a failover cluster on these computers by using the Failover Cluster
Management Microsoft Management Console (MMC) snap-in or by using the
Cluster.exe tool.
In this scenario, the cluster creation fails, and you receive the following error message:
An error occurred while creating the cluster. An error occurred creating cluster
'clustername'. The service has not been started.
Cause
To eliminate single points of failure that are related to network communication, failover
clustering uses the Microsoft Failover Cluster Virtual Miniport driver. Additionally, this
driver generates a physical address during startup. However, any of the following
situations would make cluster creation fail:
1. On each computer that you want to make a cluster node, use the Server Manager
console to remove the Failover Clustering feature.
2. Restart each computer from which you have removed the Failover Clustering
feature.
3. Add the Failover Clustering feature on all these computers again.
4. Run cluster validation against these computers.
5. Try creating a cluster.
If the problem is not resolved after you reinstall the Failover Clustering feature, follow
these steps, and then run the reinstallation again.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
3. Under this subkey, find the subkey that holds a DriverDesc string value entry
whose value is "Microsoft Failover Cluster Virtual Adapter."
4. Under the subkey that you found in step 3, add the following string value registry
entry:
Name: DatalinkAddress
Value data: 02-AA-BB-CC-DD-01
Feedback
Was this page helpful? Yes No
This article provides a solution to fix error 0x80090327 that occurs when you add a node to a cluster.
You fail to add a node to a cluster. When checking the cluster logs, you find that a sponsor node rejects the
connection with error 0x80090327.
Output
Output
) Important
This section, method, or task contains steps that tell you how to modify the registry. However, serious
problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these
steps carefully. For protection, back up the registry before you modify it so that you can restore it if a
problem occurs. For more information about how to back up and restore the registry, see How to back up
and restore the registry in Windows .
This issue occurs because TLS 1.3 is enabled on the sponsor node. To resolve this issue, remove the following
registry keys:
ノ Expand table
1.3\Server
7 Note
These keys are only supported in Windows Server 2022. For more information, see Protocols in TLS/SSL
(Schannel SSP).
Feedback
Was this page helpful? Yes No
This article discusses the implications of starting the Cluster service by using the
/forcequorum switch
Beta Information
This article discusses a beta release of a Microsoft product. The information in this
article is provided as-is and is subject to change without notice.
No formal product support is available from Microsoft for this beta product. For
information about how to obtain support for a beta release, see the documentation that
is included with the beta product files, or check the Web location where you
downloaded the release.
Introduction
In Windows Server 2003, server clusters that are configured to use a majority node set
(MNS) quorum model can force the Cluster service to start when less than the required
minimum number of cluster nodes are participating in the cluster. The following formula
is used to determine the minimum number of cluster nodes that are required:
(<Total configured cluster nodes>/2) + 1
To start the Cluster service by using the MNS quorum model method, use the
ForceQuorum registry key, or use a startup parameter, such as the /forcequorum switch.
7 Note
The ForceQuorum registry key is located under the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClusSvc\Parameters
There are special procedures that are required to correctly recover after you use the
/forcequorum switch. This article discusses the implications of using the /forcequorum
switch to start the Cluster service in Windows Server 2008. In Windows Server 2008-
based failover clusters, starting the Cluster service together with a /forcequorum switch
has more implications than it did in earlier operating systems.
More information
In Windows Server 2008-based failover clusters, the cluster configuration information is
tracked across all nodes in the cluster and on a witness disk, if one is configured. A
Paxos tagging process is used to guarantee consistency of the cluster configuration
across all nodes and on the witness disk. The Paxos algorithm is used for guaranteeing
consistency across distributed systems. The algorithm is used by the Cluster service to
guarantee data consistency when updates to the cluster configuration are propagated
across all nodes in the cluster.
In Windows Server 2008-based failover clusters, the Paxos tag consists of three
numbers. Each number is separated by a colon. For example, a tag may resemble the
following:
3:3:276
These numbers represent the NextEpoch number, the LastUpdateEpoch number, and
the sequence number. Ideally, the Paxos tag should be the same across all replicas of
the cluster configuration. The Epoch numbers are changed every time that the cluster is
formed. The sequence number is changed every time that an update is made to the
cluster configuration. The synchronization process in a cluster sends out a proposal to
all the nodes in the cluster. The proposal consists of a sequence number and a proposal
number. A cluster node checks its local copy of the cluster configuration to see whether
it has a newer sequence number or a higher proposal number. If the node does not
have more current information (higher numbers), the node sends an acceptance back to
the proposing node. If most of the nodes in the cluster (a "consensus") send back an
acceptance to the proposing node, the data is sent to each cluster node to be
incorporated locally.
When a cluster node joins a cluster, the node sends its Paxos tag information as part of
the joining process. If the Paxos tag information for the joining node is older than the
current cluster configuration, a complete copy of the cluster configuration is pushed to
the node as part of the joining process. This copy of the cluster configuration is known
as a cluster registry hive. This behavior guarantees that all nodes that are joining a
cluster have the most up-to-date configuration information.
The Paxos tag format in a cluster can change only in the following two scenarios:
The new Paxos tag formatting uses time stamps. The following is an example of the new
formatting:
2007/12/31-15 35 55.889_4:2007/12/31-15 35 55.889_4:294
This format guarantees that the nodes that run the Cluster service together with this
Paxos tag format will have the golden or authoritative copy of the cluster configuration.
Any node that joins the cluster will automatically have this copy of the cluster
configuration pushed to it during the joining process. Therefore, when you decide to
force the Cluster service to start on a specific node in a Windows Server 2008-based
failover cluster, it is important to select the node that has the most up-to-date cluster
configuration information. Otherwise, some configuration settings may be lost.
References
For more information about the MNS quorum model, visit the following Microsoft Web
site: https://technet.microsoft.com/library/cc784005(WS.10).aspx
For more information about the Paxos algorithm, visit the following Microsoft Web site:
https://research.microsoft.com/users/lamport/pubs/paxos-simple.pdf
Feedback
Was this page helpful? Yes No
Windows clustering provides high availability of server resources. This article describes
how to move a Windows Server Cluster from one domain to another.
7 Note
More information
Because of an increased dependence on Active Directory Domain Services, Microsoft
does not support moving an already installed and configured Windows Server 2008,
Windows Server 2008 R2 and Windows Server 2012 failover cluster from one domain to
another. The following steps are not for Windows Server 2008, Windows Server 2008 R2
and Windows Server 2012 you must create a new cluster. Additionally, you must
recluster highly available applications.
Although you can move a Microsoft Windows 2000-based server cluster or a Windows
Server 2003-based server cluster from one domain to another, we recommend that you
rebuild the cluster in the new domain so that all installed services and applications are
configured correctly in the new domain. You can use the steps in this article to enable
the cluster service to start and operate in a new domain. However, these steps will not
make sure that all resources will be available in the new domain.
7 Note
2 Warning
We recommend that you perform a full backup of all data on all shared hard disks
on each node in the cluster before you try to move the cluster.
The steps in this article enable the Cluster service to start in the new domain. However,
you may be unable to bring the resources online in the new domain, and the resources
that can be brought online may not work correctly.
1. Create a user account for the Cluster service in the new domain. You must make
sure that no Group Policy objects (GPOs) or security template requirements
remove any of these rights. The user account must have the following rights:
In addition, the Cluster service account must have administrative permissions on all
nodes in the cluster.
2. Set the Startup value for the Cluster service to Manual on all nodes in the cluster:
a. Click Start, point to Settings, click Control Panel, and then double-click Services.
b. Click Cluster Service, and then click Startup.
c. Change the Startup Type from Automatic to Manual.
d. Click OK.
5. Move the node into the new domain by using procedures that are appropriate to
your operating system. Complete the process, and then restart the node.
6. On the node, change the service account that is used by the Cluster service to log
on to the domain to the user account that you created.
8. Use Cluster Administrator to verify that there are no issues. Try to bring all
resources online. Test the functionality of all resources from client computers, and
then check the Event Viewer System log for error messages.
7 Note
At this point, you can still cancel the move by moving this node back into the
old domain and starting the nodes that are not moved.
9. If the first node move is successful, continue to migrate the other nodes in the
cluster to the new domain starting with step 5 for each node.
2 Warning
If you move a computer that has a Virtual Microsoft SQL Server 7.0 instance to
another domain, and you do not first uncluster SQL Server 7.0, the SQL cluster
resources may fail. Because of the failure of the SQL Server 7.0, you may have to
work with Microsoft CSS to manually uncluster SQL Server 7.0. After you have
unclustered SQL Server 7.0, you must use the SQL Cluster Failover Wizard to
reestablish your clustered SQL Server computers. You may also have to completely
remove SQL Server 7.0, and then reinstall it.
7 Note
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you try to add a node to a
Windows Server 2008-based Failover Cluster.
Symptoms
When you attempt to add a node to your existing Windows Server 2008-based Failover
Cluster using the Add-Node wizard, you receive the following error message at the
bottom of the Add-Node wizard screen:
Cause
The error "Provider Load Failure" is returned from WMI when a query is performed and
it's unable to load the required providers to satisfy the query. In this case, the cluster
"Add Node" wizard is making query to identify the domain of the server and the
provider is not correctly registered on the server.
Follow these steps to determine if you are experiencing this issue, on both the server
you are attempting to add to the cluster as well as the node that is already part of the
cluster:
If you get the "Provider load failure" error, you are experiencing the problem
documented in this article, on this server.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
To resolve this problem you need to correct the registration information for the
Cimwin32.dll file in the registry, using these steps:
1. Identify a Windows Server 2008 computer that is at the same Service Pack and
Hotfix level as the problem server and you are able to run the above mentioned
query successfully, in Wbemtest.exe.
7 Note
HKEY_CLASSES_ROOT\CLSID\{D63A5850-8F16-11CF-9F47-00AA00BF345C}\InprocServer32
4. Select the key or the subkey that you want to back up.
6. In the Save in box, select the location where you want to save the backup copy,
and then type a name for the backup file in the File name box. Save it as a .REG
file.
8. Access the file on the problem server and double-click the file to merge it into the
registry.
9. Restart the server.
Feedback
Was this page helpful? Yes No
This article provides a solution to the error (The cluster node already exists) that occurs
during cluster setup.
Symptoms
During create new cluster via Cluster Administrator or cluster.exe command line, the
following error may appear:
Cause
If the current server is member of exiting cluster, or/and the current resource (most
often quorum disk) is available.
Resolution
The resolution process depends on the current status of the cluster member:
1. If the current server should belong to exiting cluster, verity that quorum disk in
online and all cluster resource available for regular use. The server should not be
used as a new cluster member.
2. If the current shouldn't belong to exiting cluster or/and the cluster configuration
cannot be restored or be fixed, follow the following instructions:
The following process is irreversible, and may require reinstall the cluster.
a. Go to Start > Run.
b. Write Cmd and press on Enter button.
c. Write cluster node nodename /forcecleanup and press Enter.
d. The message should be appear after a few seconds: Clean up successfully
completed.
Community Solutions Content Disclaimer
Microsoft corporation and/or its respective suppliers make no representations about the
suitability, reliability, or accuracy of the information and related graphics contained
herein. All such information and related graphics are provided "as is" without warranty
of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and
conditions with regard to this information and related graphics, including all implied
warranties and conditions of merchantability, fitness for a particular purpose,
workmanlike effort, title and non-infringement. You specifically agree that in no event
shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental,
special, consequential damages or any damages whatsoever including, without
limitation, damages for loss of use, data or profits, arising out of or in any way
connected with the use of or inability to use the information and related graphics
contained herein, whether based on contract, tort, negligence, strict liability or
otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of
damages.
Feedback
Was this page helpful? Yes No
This article provides workarounds to an issue that Guest Cluster nodes in Hyper-V may
not be able to create or join.
Symptoms
Failover clusters that are running in virtual machines (sometimes referred to as "guest
clusters") could have problems with nodes joining the cluster.
By using the Create Cluster Wizard, the cluster may fail to create. Additionally, the
report from the wizard may have the following message:
7 Note
The above errors can also be seen anytime that communications between the
servers that are specified to be part of the cluster creation do not complete. A
known cause is described in this article.
In some scenarios, the cluster nodes are successfully created and joined if the VMs are
hosted on the same node. However, once the VMs are moved to different nodes, the
communications between the nodes of the guest cluster starts to fail. Therefore the
nodes of the cluster may be removed from the cluster.
Cause
This issue can occur due to packets not reaching to the virtual machines, when the VMs
are hosted on Windows Server 2012 failover cluster nodes, due to a failover cluster
component that is bound to the network adapters of the hosts. The component is called
the "Microsoft Failover Cluster Virtual Adapter Performance Filter" and it was first
introduced in Windows Server 2012.
The problem only affects the network packets addressed to cluster nodes hosted in
virtual machines.
Workaround
It is recommended that, if the Windows Server 2012 failover cluster is going to host
virtual machines that are part of guest clusters, you should unbind the "Microsoft
Failover Cluster Virtual Adapter Performance Filter" object from all of the virtual switch
network adapters on the Windows Server 2012 Failover Cluster nodes.
7 Note
This problem can affect any Windows Server Failover Cluster version that is running
inside of virtual machines as a guest cluster. The information mentioned in the
cause and workaround of this article is specific to Windows Server 2012 Failover
Clusters that are used to host virtual machines.
You can disable the "Microsoft Failover Cluster Virtual Adapter Performance Filter"
object using one of the methods from below:
Open Network Connections to get the list of network adapters. All network adapters
with the "vEthernet" (default name) are the virtual networks (i.e. virtual switch). The
physical adapters that also have a Hyper-V virtual adapter configured for it will not have
the "Microsoft Failover Cluster Virtual Adapter Performance Filter" binding, so there is
nothing to disable for those adapters.
1. Right click on one of the "v" adapters and select Properties from the menu.
2. Uncheck the item labeled "Microsoft Failover Cluster Virtual Adapter Performance
Filter".
3. Click on OK to close the dialog and have the binding disabled for the unchecked
item.
4. Repeat for all the adapters.
The following process will disable the network adapter, which is binding for "Microsoft
Failover Cluster Virtual Adapter Performance Filter" on every adapter on the server that
has the Componentid of "vms_mp". This Componentid indicates that the adapter is a
Hyper-V adapter used by the virtual switch.
You can run this process on each node of the server so that every server has the binding
disabled for the adapters used by the virtual switch.
Open the Windows PowerShell console with Administrator access using the Run as
Administrator option.
PowerShell
7 Note
To verify which network adapters have the "Microsoft Failover Cluster Virtual
Adapter Performance Filter" item bound to it, you can run the following process:
PowerShell
The "Enabled" property of the binding for each adapter is "False", which means it's
not bound to that adapter.
More information
Windows Server 2012 failover cluster has a component that is bound to the network
adapters called "Microsoft Failover Cluster Virtual Adapter Performance Filter" and it can
cause some of the packets addressed to cluster nodes in the virtual machine to not
reach the virtual machine. If this issue occurs while a node is joining the cluster inside of
the virtual machine, it may fail to successfully be added to the cluster, or join the cluster.
The "Microsoft Failover Cluster Virtual Adapter Performance Filter" component is used
by the failover cluster NetFT virtual adapter to route some cluster specific
communications between nodes of the cluster. This item is not required to have it's
binding enabled for NetFT to function. Therefore, for Hyper-V hosts running Windows
Server 2012, it is recommended to disable the binding of this component on all
adapters of Hyper-V hosts that are members of a failover cluster.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where users are unable to join a node into a
cluster if UDP port 3343 is blocked.
Symptoms
Consider the following scenario:
On a computer that is running Windows Server 2008 or Windows Server 2008 R2.
You attempt to join the node into a cluster.
In this scenario, you may not be able to join the node into the cluster and you may
receive the following error in system event log:
Cause
Cluster nodes communicate over User Datagram Protocol (UDP) port 3343. The issue
may occur because the UDP port 3343 is not opened.
Resolution
To fix the issue, open the required UDP port 3343 on the cluster.
More information
This is a sample cluster log. The UDP port 3343 on the cluster is blocked:
You can confirm the UDP port 3343 by command netstat -ano .
For more information, see Event ID 1572 — Network Connectivity and Configuration.
Feedback
Was this page helpful?
Yes No
This article describes the behavior that occurs when one node of a two-node, two-site
cluster disconnects from the public cluster VLAN. In this case, the IP address resources
and their corresponding cluster groups fail on both nodes.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Symptoms
Consider the following scenario:
You have a two-site cluster that has one node in each site. The cluster uses a File Share
Witness (FSW) resource. The cluster nodes are connected by the following networks:
In this scenario, one of the nodes disconnects from the public VLAN. The following
figure shows the resulting configuration.
The cluster detects the interruption and marks the public VLAN network adapter on
Node 2 as "Failed." Therefore, all the cluster IP address resources on Node 2 fail. The
cluster groups that are associated with those resources also fail. The cluster generates
messages that resemble the following:
000005ec.000011e4::2020/09/19-19:41:51.777 DBG [IM - public-1.0.0] Adding
interface states for cross-subnet-route-only interfaces
Because the two sites cannot communicate across the public VLAN, the cluster also
marks the public VLAN network adapter on Node 1 as "Failed." Therefore, all the cluster
IP Address resources and the associated cluster groups on Node 1 fail.
In the end, lost connection to one node causes the cluster groups on both nodes to be
in a failed state. You have to manually bring the nodes online again.
If the two cluster nodes were in the same site, a similar network disconnect would cause
the public VLAN network adapter on Node 2 to fail in the same manner. However, in
that case all the cluster groups on Node 2 would fail over to Node 1. The cluster IP
address resources on Node 1 wouldn't fail.
Status
This behavior is by design. We recommend that you use four nodes instead of two
nodes for multi-site clusters. Azure AzS HCI clusters require four nodes.
Workaround
To prevent this behavior, you can change your cluster configuration by using any of the
following methods:
Add at least one cluster node to each site. In this configuration, if one node on a
site disconnects, the remaining node continues to communicate with the other
site. The cluster resources on the remaining node and on the nodes in the
unaffected site remain online.
Add another cluster node at a third site. In this configuration, if one node
disconnects, the two remaining nodes remain online, and cross-site
communication continues.
Change the private cluster network to a non-stretched VLAN. In this configuration,
if one node disconnects, the cluster starts the arbitration algorithm to determine
resource and quorum ownership.
If you have the configuration that is described in the "Symptoms" section and you have
to disconnect a node in a controlled manner (such as for a planned maintenance
window), prepare the cluster before you disconnect. Use one of the following
approaches:
When you're ready to resume typical operations, start by enabling the networks (or
restarting the nodes).
Feedback
Was this page helpful? Yes No
This article introduces how to resolve the problems in which nodes are removed from
active failover cluster membership randomly.
Symptoms
When the issue occurs, you're seeing events like this event logged in your system event
log:
This event is logged on all nodes in the Cluster except for the node that was removed.
The reason for this event is because one of the nodes in the Cluster marked that node as
down. It then notifies all of the other nodes of the event. When the nodes are notified,
they discontinue and tear down their heartbeat connections to the downed node.
If any one of these packets isn't returned, then the specific heartbeat is considered
failed. For example, W2K8-R2-NODE2 sends a request and receives a response from
W2K8-R2-NODE1 to a heartbeat packet so it determines the network and the node is
up. If W2K8-R2-NODE1 sends a request to W2K8-R2-NODE2 and W2K8-R2-NODE1
doesn't get the response, it's considered a lost heartbeat and W2K8-R2-NODE1 keeps
track of it. This missed response can have W2K8-R2-NODE1 show the network as down
until another heartbeat request is received.
By default, Cluster nodes have a limit of five failures in 5 seconds before the connection
is marked down. So if W2K8-R2-NODE1 doesn't receive the response five times in the
time period, it considers that particular route to W2K8-R2-NODE2 to be down. If other
routes are still considered to be up, W2K8-R2-NODE2 will remain as an active member.
If all routes are marked down for W2K8-R2-NODE2, it's removed from active failover
cluster membership and the Event 1135 that you see in the first section is logged. On
W2K8-R2-NODE2, the Cluster Service is terminated and then restarted so it can try to
rejoin the Cluster.
For more information on how we handle specific routes going down with three or more
nodes, see "Partitioned" Cluster Networks blog that was written by Jeff Hughes.
2. The profile for your network connections could possibly be bouncing from Domain
to Public and back to Domain again. During the transition of these changes,
network I/O can be blocked. You can check to see if this is the case by looking at
the Network Profile Operational log. You can find this log by opening the Event
Viewer and navigating to Applications and Services
Logs\Microsoft\Windows\NetworkProfile\Operational. Look at the events in this log
on the node that was mentioned in the Event ID 1135 and see if the profile was
changing at this time. If so, see The network location profile changes from
"Domain" to "Public" in Windows 7 or in Windows Server 2008 R2 .
3. You have IPv6 enabled on the servers, but have the following two rules disabled for
Inbound and Outbound in the Windows Firewall:
4. Anti-virus software could be interfering with this process also. If you suspect this,
test by disabling or uninstalling the software. Do this at your own risk because
you're unprotected from viruses at this point.
5. Latency on your network could also cause this to happen. The packets might not
be lost between the nodes, but they might not get to the nodes fast enough
before the timeout period expires.
6. IPv6 is the default protocol that Failover Clustering will use for its heartbeats. The
heartbeat itself is a UDP unicast network packet that communicates over Port 3343.
If there are switches, firewalls, or routers not configured properly to allow this
traffic through, you can experience issues like this.
7. IPsec security policy refreshes can also cause this problem. The specific issue is that
during an IPSec group policy update all IPsec Security Associations (SAs) are torn
down by Windows Firewall with Advanced Security (WFAS). While this is
happening, all network connectivity is blocked. When renegotiating the Security
Associations if there are delays in performing authentication with Active Directory,
these delays (where all network communication is blocked) will also block cluster
heartbeats from getting through and cause cluster health monitoring to detect
nodes as down if they don't respond within the 5-second threshold.
8. Old or out-of-date network card drivers and/or firmware. At times, a simple
misconfiguration of the network card or switch can also cause loss of heartbeats.
9. Modern network cards and virtual network cards might be experiencing packet
loss. This can be tracked by opening Performance Monitor and adding the counter
"Network Interface\Packets Received Discarded." This counter is cumulative and
only increases until the server is rebooted. Seeing a large number of packets
dropped here could be a sign that the receive buffers on the network card are set
too low or that the server is performing slowly and can't handle the inbound traffic.
Each network card manufacturer chooses whether to expose these settings in the
properties of the network card, therefore you need to refer to the manufacturer's
website to learn how to increase these values and the recommended values should
be used. If you're running on VMware, the following blog talks about this in a little
more detail including how to tell if this is the issue as well as points you to the
VMware article on the settings to change.
These are the most common reasons that these events are logged, but there could be
other reasons also. The point of this blog was to give you some insight into the process
and also give ideas of what to look for. Some will raise the following values to their
maximum values to try to get this problem to stop.
ノ Expand table
SameSubnetThreshold 5 3-10
CrossSubnetThreshold 5 3-10
Increasing these values to their maximum might make the event and node removal go
away, it just masks the problem. It doesn't fix anything. The best thing to do is to find
out the root cause of the heartbeat failures and get it fixed. The only real need for
increasing these values is in a multi-site scenario where nodes reside in different
locations and network latency can't be overcome.
Feedback
Was this page helpful? Yes No
This article addresses the issue of finding nodes removed from active failover cluster
membership when the nodes are hosted on VMware ESX.
Symptom
You see the following event in the System Event Log of the Event Viewer when this issue
occurs:
Resolution
One specific problem is with the VMXNET3 adapters dropping inbound network packets
because the inbound buffer is set too low to handle large amounts of traffic. You easily
can find out if packets are being drop by using Performance Monitor to look at the
Network Interface\Packets Received Discarded counter.
After you've added this counter, look at the Average, Minimum, and Maximum
numbers. If the values are higher than zero, then the receive buffer needs to be adjusted
upward for the adapter. This problem is documented in Large packet loss in the guest
OS using VMXNET3 in ESXi (2039495) .
Feedback
Was this page helpful? Yes No
More information
You can use Windows Clustering to host print server functionality. The configuration
steps in Microsoft Windows Server 2003 differ from those in Microsoft Windows NT
Server 4.0, Enterprise Edition, Microsoft Windows 2000 Advanced Server, and Microsoft
Windows 2000 Datacenter Server. To set up a clustered print server, you need to
configure only the Spooler resource in Cluster Administrator and then connect to the
virtual server to configure the ports and print queues. This is an improvement over
previous versions of Windows Clustering in which you had to repeat the configuration
steps on each node in the cluster.
1. To open Cluster Administrator, click Start, click Run, type cluadmin, and then click
OK.
3. At the Welcome screen, click Next, and then click Next again to create a new
virtual server.
4. Click Use an existing Resource Group, and then click an existing group that has a
Disk resource in which you want to store the spooler and printer drivers. Click
Next.
5. For the resource group name, provide a name that accurately represents the
group, such as "SPOOLER."
7 Note
This name is for administrative purposes only in Cluster Administrator.
7 Note
b. Enter the IP address that clients will use to connect to this virtual print server. If
the nodes of the cluster have Print Services for Unix installed and running,
clients can connect using line printer remote (LPR) to this IP address.
7. Click Next.
8. At the Advanced Properties screen, you can make modifications to the resources
that are about to be created, and then click Next.
7 Note
7 Note
If you are setting up an active/active print server, you need to create one
group for each node and you want to set each spooler group to have a
different preferred owner. You cannot have multiple Spooler resources in the
same group. An active/active print server configuration is one in which there
are multiple nodes in the cluster that are processing print jobs for clients with
multiple spoolers. This could include as many as two to four nodes that are
actively handling requests.
When a single node is hosting multiple groups with print spoolers, you'll be able to
browse all printers from all groups.
1. From one of the nodes or a remote computer that has administrative permissions
to the cluster click Start, click Run, type \\VirtualServer where VirtualServer is the
name that is specified for the Network Name resource on which the Spooler
resource is dependent.
3. Double-click Add Printers to open the Add Printer Wizard, and then click Next.
7 Note
TCP/IP ports are the only supported port type on a Windows Clustering. Use
the Standard TCP/IP Port option unless the printing clients need RFC-
compliant LPR ports. If this is the case, follow these steps:
a. In Control Panel, double-click Add/Remove Programs, and then click
Add/Remove Windows Components to start the Windows Components
Wizard.
b. Under Components, scroll down and click to select the Other Network File
and Print Services check box.
c. Click Details to open the Other Network File and Print Services window,
click to select the Print Services for UNIX check box, and then click OK to
close the Other Network File and Print Services window.
d. Click Next to continue with the Windows Components Wizard.
When you complete the wizard, the LPR port will be available as a port type. By
default, according to RFC 1179, LPR will use only 11 TCP ports.
5. Type the IP address of the network printer that you want to process the print jobs
in the Printer Name or IP Address box.
7 Note
Bi-directional printing can also be a problem when using LPR printing. Some
printer drivers enable this option by default. When you create the LPR port
and printer, disable the Bi-directional printing option. If this option is
enabled, it may cause a printer to accept one or more print jobs, and then
stop accepting jobs until the printer is physically reset.
You no longer have to create a locally defined printer port configuration for each
node. In Windows 2000 (and later) the port configuration is stored in the cluster
registry and is therefore shared between all cluster nodes, under the following key:
HKEY_Local_Machine\Cluster\Resources\%Spooler GUID%\Parameters\Monitors\
6. Choose the appropriate driver for this printer, and then click Next.
8. Choose a share name for the printer; this name must also be unique on this cluster.
You don't want to have any other printers with the same share name on this
cluster, even if they are in a different group and associated with a different Spooler
resource. In the event of a failure, in an active/active configuration the same node
in the cluster may own both spooler groups. If this occurs, printers that share a
common name won't be available. Again, it's recommended to adhere to the 8.3-
naming standard for compatibility with earlier versions.
7 Note
The installation process then copies the printer driver files to the
\\VirtualServer\print$ share. The printer drivers are copied to the
%SystemRoot%\System32\Spool\Drivers\Spooler GUID\Drivers folder of the
node in the cluster that owns the Network Name resource for this virtual
name. The drivers are also copied to the shared disk in the \PrinterDrivers
folder.
After you add all the desired print queues, use Cluster Administrator to move the
group that contains the Print Spooler resource to all other nodes. This copies the
printer drivers from the \PrinterDrivers folder on the shared disk to the
%SystemRoot%\System32\Spool\Drivers%Spooler GUID%\Drivers folder on that
node.
7 Note
Printing is available immediately to clients when the queue has been created
even though the drivers have not been copied to all other available nodes. It
is not necessary to move the spooler group over to all other nodes
immediately after creating the queues for the cluster to function. You can do
this later when you can schedule a brief outage during which time you can
take the Spooler resource offline.
When you set up a print cluster, you have to set the Quorum log size to a size that is
large enough to comply with the number of printers that will be installed. You should
increase the size of the reset quorum log when you increase the size of the Quorum log
size. To help determine whether you have to increase the reset quorum log size value,
verify the size of the Clusdb file. Each node includes a local copy of this file in the
%SystemRoot%\Cluster folder. The size of the reset quorum log for the transactional log
should be larger than the size of the Clusdb file for the cluster registry.
For example, if you have installed printers and the size of the Clusdb file is 6 megabytes
(MB), you should increase the size of the reset quorum log to 8192 bytes (8 MB). By
default, the size of the reset quorum log on Windows Server 2003 is 4 MB. You should
increase the size of the reset quorum log in 64-KB increments. A good rule is to double
the current size of the reset quorum log.
Feedback
Was this page helpful? Yes No
This article provides workarounds for an issue where you can't upgrade the operating
system of a clustered server from Windows Server 2003 or later versions.
Symptoms
When you try to perform one of the following server operating system upgrades, the
upgrade is blocked:
When this problem occurs, the following error message is recorded in the System
Compatibility report:
Cause
This behavior occurs because the server is a cluster member. Windows Server 2008,
Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 do not
support an upgrade of clustered servers from previous versions. This is because of
incompatibilities between the cluster versions.
Workaround
To work around this behavior, use one of the following methods, as appropriate for your
situation.
Status
This behavior is by design.
More information
The Help files for Windows Server 2008 and later versions contain more information
about supported paths from previous versions of clustered servers.
Feedback
Was this page helpful? Yes No
Summary
This article describes how to install service packs or hotfixes on a Windows Server
failover cluster. Applying a service pack or hotfix to a server cluster is the same as
applying a service pack or hotfix to Windows Server. However, there are special
conditions that you should consider to make sure that clients have a high level of access
while you perform the installation.
More information
To install Windows service packs or hotfixes on a Windows Server failover cluster, follow
these steps, depending on the version of Windows Server that you're running. Always
install the same service packs or hotfixes on each cluster node. Follow these steps unless
you're directed otherwise by the instructions for a particular service pack version.
1. Check the System log for errors, and make sure that the system is operating
correctly.
2. Make sure that you have a current backup and updated emergency repair disk for
each system. If there are corrupted files, a power outage, or an incompatibility, you
may have to revert to the state of the system before you tried to install the service
packs or hotfixes.
3. In the Failover Cluster Manager snap-in, right-click Node A, and then click Pause.
4. On Node A, expand Services and Applications, and then click the service or
application.
5. Under Actions (on the right side), click Move this service or application to
another node, and then select the node.
7 Note
As the service or application moves, its status is displayed in the details pane
(the center pane).
6. Follow steps 4 and 5 for each service and application that is configured on the
cluster. On a cluster that has more than two nodes, from the options next to Move
this service or application to another node, you can select Best possible. This
option has no effect if you don't have a Preferred owners list configured for the
service or application that you're moving. (In this case, the node will be selected
randomly.) If you configured a Preferred owners list, the Best possible option will
move the service or application to the first available node on the list.
7. Install the service packs or hotfixes on Node A, and then restart the computer.
8. Check the System log for errors. If you find any errors, troubleshoot them before
you continue this process.
9. In the Failover Cluster Manager snap-in, right-click Node A, and then click Resume.
10. In the Failover Cluster Manager snap-in, right-click Node B, and then click Pause.
11. Under Actions (on the right side), click Move this service or application to
another node, and then select the node.
7 Note
As the service or application moves, its status is displayed in the details pane
(the center pane).
12. Follow steps 10 and 11 for each service and application that is configured on the
cluster.
13. Install the service packs or hotfixes on Node B, and then restart the computer.
14. Check the System log for errors. If you find any errors, troubleshoot them before
you continue this process.
15. In Failover Cluster Manager, right-click Node B, and then click Resume.
16. Right-click each group, click Move Group, and then move the groups back to their
preferred owner. For more information, see Test the Failover of a Clustered Service
or Application and Pause or Resume a Node in a Failover Cluster.
1. Check the System log for errors, and make sure that the system is operating
correctly.
2. Make sure that you have a current backup and updated emergency repair disk for
each system. If there are corrupted files, a power outage, or an incompatibility, you
may have to revert to the state of the system before you tried to install the service
packs or hotfixes.
3. In the Windows Server 2008 R2, use the Windows PowerShell Modules link under
Administrative Tools to automatically import all the Windows PowerShell modules
for the features or roles that you've installed.
5. Load the Failover Clusters module by running the following command: Import-
Module FailoverClusters .
Tip
You can also use following command to move all groups of the node to the
preferred owner of the best possible node: Get-ClusterNode NodeA | Get-
ClusterGroup | Move-Cluster Group .
8. Install the service pack on Node A, and then restart the computer.
9. Check the System log for errors. If you find any errors, troubleshoot them before
you continue this process.
10. Resume activity on node A that was suspended in step 5 by running the following
command: Resume-ClusterNode nodeA .
11. Suspend (Pause) activity on other failover cluster node by running the following
command: Suspend-ClusterNode nodeB .
12. Move a clustered service or application (a resource group) from one node to
another by running the following command: Move-ClusterGroup <clustered
service> -Node nodeB .
7 Note
You can again use following command to move all groups of the node to the
preferred owner of the best possible node:
Get-ClusterNode NodeB | Get-ClusterGroup | Move-Cluster Group .
13. Install the service pack on Node B, and then restart the computer.
14. Check the System log for errors. If you find any errors, troubleshoot them before
you continue this process.
15. Resume activity on node B that was suspended in step 10 by running the following
command: Resume-ClusterNode nodeB .
16. Move the clustered service or application (a resource group) back to their
preferred owner by running the following command: Move-ClusterGroup
<CusteredService> -Node <NodeName> .
Feedback
Was this page helpful? Yes No
This article describes the hotfixes and updates that we recommend that you install on
each node of a Windows Server 2008 R2-based failover cluster.
Summary
When you update your Windows Server 2008 R2-based failover cluster, you help reduce
downtime. You also help decrease the number of errors, failed print jobs, and other
support issues that you experience.
7 Note
Use the information in the More information section to help you determine whether a
particular hotfix or update applies to the server cluster. Before you install a particular
hotfix or update, we recommend that you review the original Microsoft Knowledge Base
(KB) article that describes that hotfix or update.
More information
We recommend that you install Windows Server 2008 R2 Service Pack 1 (SP1), as it has
many fixes for problems with Windows Clustering. We also recommend installing the
hotfixes that are referenced in Recommended hotfixes and updates for Windows Server
2008 R2 SP1 Failover Clusters. If for any reason you cannot immediately apply SP1, we
recommend that you install the following Windows Server 2008 R2 hotfixes, depending
on your environment.
General hotfixes
We recommend that you install the following hotfixes if you plan to install the failover
clustering feature on Windows Server 2008 R2 Core:
ノ Expand table
August 3, 2685891 CAP does not come Clusres.dll Prevents cluster outage
2013 online in a Windows when CAP fails to come
Server 2008 R2-based online. Available for
or Windows Server individual download.
2008-based failover
cluster
January 17, 2524478 The network location Ncsi.dll Prevents potential loss
2012 profile changes from of cluster
Domain to Public in Nlaapi.dll communication.
Windows 7 or in Available for individual
Windows Server 2008 Nlasvc.dll download.
R2
Date when Knowledge Title Component Why we recommend
the hotfix Base article this hotfix
was added
May 14, 2545850 Users cannot access Multiple Prevents CNO and VCO
2011 an IIS-hosted website Authentication objects from failing to
after the computer DLL's register in DNS due to
password for the Kerberos authentication
server is changed in not working after the
Windows 7 or in computer password is
Windows Server 2008 changed.
R2
To avoid problems that affect the cluster operation when the network is unreliable,
install the following hotfix:
To avoid performance issues on the cluster and possible system crashes, install the
following hotfix:
2520235 0x0000009E Stop error when you add an extra storage disk to a failover
cluster in Windows Server 2008 R2
Resource-specific hotfixes
We recommend that you install the following hotfixes, depending on the resources that
are running on the server cluster. You do not have to install these hotfixes if you are not
running these resources on the server cluster.
976571 Stability update for Windows Server 2008 R2 Failover Print Clusters
Feedback
Was this page helpful? Yes No
This article documents the logic by which groups fail from one node to another when
there are three or more cluster node members.
Summary
The movement of a group can be caused by an administrator who manually moves a
group or by a node or resource failure. Where the group moves depends on how the
move is initiated and whether the Preferred Owner list is set.
More information
Information about the Preferred Owner list is covered in the Help file under "Server
Clusters," including information about planning and optimizing server clusters. This
article documents the following four possible scenarios:
1. There's a node or resource failure and the Preferred Owner List is set.
2. There's a node or resource failure and the Preferred Owner List isn't set.
3. Administrator manually moves group to "Best Possible" and the Preferred Owner
List is set.
4. Administrator manually moves group to "Best Possible" and the Preferred Owner
List isn't set.
Scenario 1
If a node or resource fails and the Preferred Owner List has been defined, the Cluster
Service fails the Group to the next available node in the Node List. The Node List is
composed of the Preferred Owners List followed by the remaining nodes arranged by
their Node ID. The Node ID is defined when a node is joined to a cluster or if a node is
evicted or and re-added.
You can view the Node ID order by examining the registry under the
\HKEY_LOCAL_MACHINE\Cluster\Nodes key.
For example, suppose we have a six node Cluster and that the nodes were installed and
joined the Cluster in the following order: NodeA, NodeB, NodeC, NodeD, NodeE, and
NodeF. Assume that a Group has NodeA, NodeC, and NodeE listed as the Preferred
Owners.
Having this information, the Node List for the Group would then be the following:
In this scenario, if a Node failure or a failure of a resource was to occur and its restart
threshold were hit, the whole Group would fail to the next node down in the Node List.
For example, if NodeC contained the resource that failed, the whole Group would fail to
NodeE. It wouldn't fail to NodeA even though it's listed first in Preferred Owner List. If
NodeE fails, the Group would fail over to NodeB and not to NodeA.
Scenario 2A
If a resource fails and the Preferred Owner List isn't set, the Group follows a Node List
much like it did in Scenario 1. The Node List is built only from the Node ID. Upon a node
or resource failure, resources follow a downward path failing to the subsequent node in
the Node List. When it reaches the last listed node in the Node List, it starts with the first
node in the Node List.
For example, this list has the installation order of the different Cluster nodes. If NodeE
were to fail, all groups that it owned would fail over to NodeB and not to NodeF.
Scenario 2B
If a node fails and the Preferred Owner List isn't set for a group on that node, then an
available node will be selected randomly for the group to be moved to. This will
distribute the groups among the available nodes.
Scenario 3
If a Cluster administrator manually chooses Move group and selects Best Possible and
the Preferred Owner List is configured, the Group will always start at the top of the Node
List. As in Scenario 1, the Node List is composed of the Preferred Owner List and the
installation order.
In this example, when Best Possible is selected, the Group always tries to move to
NodeA. If the Group is already on NodeA or NodeA isn't available, the Group tries to
move to NodeC. If a Group is on NodeD and the Administrator chooses to move it to
Best Possible, the Group goes to NodeA. If NodeA, NodeC, or NodeE aren't active,
either NodeB or NodeF is randomly chosen.
Scenario 4
If as Cluster administrator, you manually choose Move group and you select Best
Possible and the Preferred Owner List isn't configured, an active node is chosen
randomly to host the group. Without the Preferred Owner List configured, it's possible
that a Group may move to a Node that is already running several other Groups.
We recommend that you configure the Preferred Owner list on a large node cluster if
the load between nodes is significantly different or if the nodes aren't homogeneous.
7 Note
The exception to the failover behavior that is mentioned here is with the default
Group that holds the Quorum resource that is named the Cluster Group. The
Cluster Group does not follow the typical Preferred Owner list behavior. Instead, if
the owner of the Quorum resource fails, the new owner will be the previous group
that successfully owned the Quorum resource.
The AntiAffinityClassNames public property can also affect where a Group will fail over
to.
Feedback
Was this page helpful? Yes No
This article describes how to run the chkdsk /f command on a shared cluster disk.
Summary
When you try to run the chkdsk /f or chkdsk /f /r command on a shared cluster drive,
Chkdsk may not run and may state that the drive could not be locked for exclusive use.
If you schedule Chkdsk to run after the computer restarts, Chkdsk may generate the
following error message during the startup process:
More information
Under most circumstances, running Chkdsk with the /F or /R switch requires the
computer to be restarted because of open handles on the shared disk. Typically, there
are no services or drivers running that prevent autochk (a derivative of Chkdsk) from
checking the disk when the computer restarts. However, if you are using Windows
Clustering, the file system does not mount the shared disk until the Cluster service starts
because the owner of the shared disk is unknown. This causes Chkdsk to report that it
cannot determine the file system on a shared cluster disk. Running Chkdsk in Read-Only
mode may seem to work, but Chkdsk does not fix any problems.
If you suspect that there is file corruption on the shared disk, use the following steps to
close all open handles to the shared disk and run Chkdsk on the drive:
2. Start the Cluster Administrator tool, right-click the cluster name, and then click
Properties.
3. On the Quorum tab, note which hard disk is the quorum hard disk. If the hard disk
on which you want to run Chkdsk contains the quorum log, temporarily move the
quorum to another shared disk.
4. Use the Cluster Administrator tool to find the group that contains the shared hard
disk on which you want to run Chkdsk.
5. After you find the physical disk resource on which you want to run Chkdsk, take
the entire group offline, including the shared disk. This closes all of the handles to
the physical disk. To take the group offline, right-click the group name, and then
click Take off-line.
6. In the Cluster Administrator tool, click the shared disk on which you want to run
Chkdsk, and then bring it online. To do this, right-click the disk resource, and then
click Bring on-line.
7 Note
If the dirty bit was previously set, Chkdsk may automatically run and the
Physical Disk resource may take a while to come online. In Windows NT 4.0,
you will see a Command Prompt window with Chkdsk running. In Windows
2000, if you open Task Manager you will see Chkdsk running as a process.
7. At a command prompt, change to a drive other than the drive on which you are
attempting to run Chkdsk, and then type the chkdsk **x**: /f /r command,
where X is the shared disk.
If you receive a Disk cannot be locked error message when you try to run Chkdsk, verify
that all services and tools that have access to the drive are stopped, and then try to run
Chkdsk again. Any running service or program that has an open handle to the drive can
prevent Chkdsk from running. Windows 2000 and later versions of Windows can
attempt to close open handles to the shared disk. If you are prompted to close open
handles, press the Y key.
Windows 2000
1. Quit all programs, stop all programs that are not cluster-aware, and then log on to
the server with an account that has Administrative credentials.
2. Start Cluster Administrator, right-click cluster name, and then click Properties.
3. Click the Quorum tab, and then note which drive is the quorum disk. If the drive
on which you want to run Chkdsk contains the quorum log, temporarily move the
quorum disk to another shared drive.
4. Copy FSUtil.exe from the %SystemRoot%\System32 folder on a Windows XP-or-later-
based computer to the local drive on the Windows 2000-based computer.
5. On the Windows 2000-based computer, at a command prompt, change to the
folder that contains FSUtil.exe, and then type the fsutil dirty set drive:
command, where drive is the shared drive.
6. Use Cluster Administrator to find the group that contains the shared drive on
which you want to run Chkdsk.
7. Right-click the group name, and then click Take offline. This takes the whole group
offline, including the shared drive, and closes all the handles to the physical drive.
8. Right-click the Physical Disk resource, and then click Bring Online. This brings the
drive online. Chkdsk runs on the volume, and it may be in an online pending state
for a while.
9. After Chkdsk runs on the volume, bring all other resources in the group online.
Windows NT 4.0
Feedback
Was this page helpful? Yes No
A cluster won't trigger a failover unless there's an actual issue with one of the cluster's
components (software or hardware). It will perform a basic recovery step, and the
affected resource will fail over to another node because of the following possible causes:
Resource failure
Troubleshooting checklist
1. Identify the occurrence timestamp in the System Event Log. Then, search for events
about the source Microsoft-Windows-FailoverClustering and check for Event ID
1069, 1146, or 1230 .
2. Match the time zone of the System event log to the GMT time zone in the cluster
log.
7 Note
To quickly find the time zone difference, search for The current time is .
3. Navigate to the occurrence timestamp in the cluster log and identify the
corresponding line. You may find an error such as:
7 Note
4. Scroll up in the cluster log and try to identify if there's any other error that might
be the actual cause.
5. Scroll down in the cluster log and search for Group move or Move of group for the
affected resource. Take note of the exact timestamp and the destination node.
6. Switch over to the cluster log of the destination's node and check the resource's
behavior when it's online. If the resource manages to come online, you'll find the
following log:
More information
For more information, see the following articles:
Feedback
Was this page helpful? Yes No
This article describes the hotfixes that are currently available for Windows Server 2012 R2-based
failover clusters and are highly recommended to be installed on each server of a failover cluster.
Summary
Failover Cluster Management enables multiple servers to provide a high availability of server roles.
Failover Cluster Management is frequently used for file services, virtual machines, database
applications, and mail applications.
) Important
The process for installing service packs and hotfixes for Windows Server 2012 R2 differs from
the process for earlier versions of Windows Server. In Windows Server 2012 R2, you can use the
Cluster-Aware Updating (CAU) feature. CAU automates the software-updating process on
clustered servers and maintains availability. For more information, see Cluster-Aware Updating
Overview.
The following Microsoft Knowledge Base articles describe the currently available fixes that are highly
recommended to be installed on all failover clusters. Most of the updates apply to computers that
are running Windows Server 2012 R2. Some updates, such as KB 976424 , may be required on
computers that are running Windows Server 2008 R2 or Windows Server 2008 if those operating
systems are present in the environment.
These updates are considered to be important installations to ensure the highest level of reliability.
7 Note
You may substitute a newer monthly rollup in place of KB 4282815. The remainder of the
updates in this list are still needed as some components in those updates released before
September 2016 and are not included in the newer monthly rollup.
ノ Expand table
June 14, 4284815 June 12, 2018-KB4284815 (Monthly Multiple This security update rollup
2018 Rollup) includes improvements and fixes
that were released after
September 2016. Available from
Windows Update or for individual
download from Microsoft Update
Catalog and Microsoft Download
Center. To apply this update, you
must first install update
2919355 on Windows Server
2012 R2.
June 21, 3137728 VSS restore fails when you use Vssvc Includes the fix from 3123538 .
2017 ResyncLuns VSS API in Windows Server Available from Windows Update
2012 R2-based failover cluster or for individual download from
Microsoft Update Catalog and
Microsoft Download Center. To
apply this update, you must first
install update 2919355 on
Windows Server 2012 R2.
August 3179574 August 2016 update rollup for Windows Multiple This rollup includes a fix that
22, 2016 RT 8.1, Windows 8.1, and Windows addresses an issue with cluster
Server 2012 R2 services that may stop working
when network loss logging occurs
when a network connection is
down and virtual machines are
configured with one possible
owner. Available from Windows
Update or for individual
download from Microsoft Update
Catalog. To apply this update, you
must first install the update
2919355 on Windows Server
2012 R2.
July 21, 3172614 July 2016 update rollup for Windows RT Multiple This rollup includes
2016 8.1, Windows 8.1, and Windows Server improvements and fixes from
2012 R2 June 2016 update rollup KB
3161606 and May 2016 update
rollup KB 3156418 including an
update (3153887 ) that
increases the default values of
SameSubnetThreshold,
CrossSubnetThreshold, and
RouteHistoryLength to be more
tolerant of brief transient network
issues. Available on Windows
update or for individual
Date that Related Title Component Why we recommend this
update Knowledge update
was Base
added article
October 3091057 Cluster validation fails in the Validate Cprepsrv Changes some timing of the
28, 2015 Simultaneous Failover test in a Validate Simultaneous failover
Windows Server 2012 R2-based failover test to more accurately verify the
cluster storage compatibility with the
failover cluster. Available for
individual download.
December 3013769 December 2014 update rollup for Multiple An update rollup package that
18, 2014 Windows RT 8.1, Windows 8.1, and resolves issues and includes
Windows Server 2012 R2 performance and reliability
improvements. Available from
Windows Update and for
individual download from
Download Center. To apply this
update, you must first install the
update 2919355 on Windows
Server 2012 R2.
November 3000850 November 2014 update rollup for Multiple A cumulative update that includes
18, 2014 Windows RT 8.1, Windows 8.1, and the security updates and
Windows Server 2012 R2 nonsecurity updates including
Failover Clustering updates that
were released between April 2014
and November 2014. Available
from Windows Update and for
individual download from
Download Center. To apply this
update, you must first install the
update 2919355 on Windows
Server 2012 R2.
April 8, 2919355 Windows RT 8.1, Windows 8.1, and Multiple A cumulative update that includes
2014 Windows Server 2012 R2 Update April, the security updates and
2014 nonsecurity updates including
Failover Clustering updates that
were released before March 2014.
Available from Windows Update
and for individual download from
Download Center.
December 976424 Error code when the kpasswd protocol KDCSVC Enables you to add a Windows
18, 2013 fails after you perform an authoritative Server 2012 failover cluster. Install
restore: on every domain controller that is
"KDC_ERROR_S_PRINCIPAL_UNKNOWN" running Windows Server 2008
Service Pack 2 (SP2) or Windows
Date that Related Title Component Why we recommend this
update Knowledge update
was Base
added article
ノ Expand table
June 21, 3145384 MinDiffAreaFileSize Volsnap.sys Describes an update that increases the
2017 registry value limit is MinDiffAreaFileSize registry key value
increased from 3 GB to limit from 3 GB to 50 GB in Windows
50 GB in Windows 8.1 8.1 and Windows Server 2012 R2.
or Windows Server Before you install this update, see the
2012 R2 "Prerequisites" section. Includes the fix
from 3060678 . Available from
Windows Update or for individual
download from Microsoft Update
Catalog. To apply this update, you
must first install the update 2919355
on Windows Server 2012 R2.
September 3063283 Update to improve the Hyper-V Increases the time-out to detect the
15, 2015 backup of Hyper-V Integration volumes to shadow copy when the
Integrated components Services Guest OS has multiple volumes.
in Hyper-V Server 2012 Available for individual download. To
R2 apply this update, you must first install
the update 2919355 on Windows
Server 2012 R2.
References
For more information about the recommended hotfixes and updates for Windows Server 2012-
based Hyper-V servers and Windows Server 2012-based Failover Clusters, see:
2784261
Feedback
Was this page helpful? Yes No
This article describes the support for a large number of logical unit numbers (LUNs) in
Windows Server products.
) Important
This article contains information about how to modify the registry. Make sure to
back up the registry before you modify it. Make sure that you know how to restore
the registry if a problem occurs. For more information about how to back up,
restore, and modify the registry, see Windows registry information for advanced
users.
Summary
This article describes the support for a large number of logical unit numbers (LUNs) in
Windows Server products. When you configure a server with more than eight LUNs, the
hardware vendor must be involved in the planning and configuration. There may be
several different ways to achieve the configuration you want; the hardware vendor is
best equipped to supply the necessary information. This article isn't meant to be all-
inclusive because of the various implementations that a hardware vendor can use.
Contact your hardware manufacturer to determine if and how your hardware can
support more than eight LUNs.
2 Warning
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall your operating system. Microsoft cannot guarantee that these problems
can be solved. Modify the registry at your own risk.
Windows Server supports Large LUNs, but the method for enabling it depends on the
hardware implementation and drivers. If the storage device reports the HiSupport bit in
its standard inquiry data, Windows automatically enables Large LUNs without requiring
any manual registry entries. Contact the hardware vendor to determine if the storage
device reports the HiSupport bit. The hardware drivers may also enable large LUN
support during their installation routines.
If the hardware doesn't report the HiSupport bit, or the drivers don't enable Large LUN
support, a manual registry entry is required. This feature works only if the storage
devices support the SCSI REPORT LUNS command. Note that editing the registry to
enable Large LUNs requires detailed knowledge of the devices' hardware IDs and
registry entries; this is the least-preferred method. Contact the hardware vendor for
additional information. Follow these steps to configure the required registry entry:
1. Find the hardware ID of the storage device. To find the hardware ID:
a. Start Regedit.exe, and then locate and click the following location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI
b. Disk and storage devices that are enumerated by the system are listed. The
storage device on which you want to enable LargeLUNs should appear in the list
starting with Disk&Ven_. The name of the storage device should be
recognizable after the Disk&Ven_ text.
c. To find the hardware ID for the proper storage device, open the different
Disk&Ven_ keys to display the different instances of the storage devices. A value
labeled FriendlyName with a description to the right appears under each of the
instances.
d. After you locate the storage device, double-click hardwareID for one of the
instance names. This is typically listed under the FriendlyName value.
e. The value data lists the hardware ID of the storage device. Often, several
hardware IDs are listed. Copy only one of these hardware IDs. Make sure to
copy only the portion of the value after "SCSI\" to the Clipboard.
7 Note
There may be several hardware IDs for the same device. This occurs because
the device may be detected in different ways for different firmware revisions
of the same device. You may have to try each of the different hardware IDs in
the following steps. If you have any problems with this, contact your storage
device hardware manufacturer.
2. With the hardware ID from the previous steps, follow the next steps to enable
Large LUN support for the appropriate storage device:
ist
c. A new key named New Key #1 is created. Right-click New Key #1, and then click
Paste to paste the hardware ID that you copied earlier.
7 Note
Right-clicking New Key #1 also displays a Rename command that you can
use to attempt to paste the data again if New Key #1 is not in the proper
state.
d. After you create the new key, create a new DWORD value named LargeLuns
with a value of 1.
7 Note
"LargeLuns" is plural.
If logical unit 0 isn't present, the REPORT LUNS command can't be sent to the target
device. Windows enumerates only eight logical units, even if more units are present in
the disk array. To support large configurations, the time that is necessary to determine
the size configuration needed to be minimized. Because the number of logical units can
be as high as 255 on some systems (0 - 254), lots of time can be spent in sending
inquiry commands to non-existent logical units. Notice that any LUN number returned
from Storage should be in range of 0 - 254.
Any LUN with a LUN number larger than 254 will not be recognized by the Windows
operating system. Consult your hardware manufacturer about the different parameters
that should be used with your particular hardware.
Even though Windows can access Large LUNs, there may be other environment
variables that need to be taken into consideration.
These keys are checked in the order in which they're listed; the information at each level
is logically "OR'ed" with that from the previous level.
Feedback
Was this page helpful? Yes No
This article provides help to solve problems with Cluster Services that be caused by
antivirus software that isn't cluster-aware.
Summary
Antivirus software that is not cluster-aware may cause unexpected problems on a server
that is running Cluster Services. For example, you may experience resource failures or
problems when you try to move a group to a different node.
Workaround
2 Warning
7 Note
Antivirus software helps protect your computer from viruses. You must not
download or open files from sources that you do not trust, visit Web sites that you
do not trust, or open e-mail attachments when the antivirus software is disabled.
For more information about computer viruses, see How to prevent and remove viruses
and other malware .
Most antivirus software uses filter drivers (device drivers) that work together with a
service to scan for viruses. These filter drivers reside above the file system recognizer
and scan files as they are opened and closed on a local hard disk. Antivirus software may
not understand the shared disk model and may not correctly allow for failover.
If you are troubleshooting failover issues or general problems with a Cluster services
and antivirus software is installed, temporarily uninstall the antivirus software or check
with the manufacturer of the software to determine whether the antivirus software
works with Cluster services. Just disabling the antivirus software is insufficient in most
cases. Even if you disable the antivirus software, the filter driver is still loaded when you
restart the computer.
Even if you are not monitoring the shared disk, the filter drivers are still loaded and may
affect the operation of the cluster.
You can run antivirus software on a SQL Server cluster. However, you must make sure
that the antivirus software is cluster-aware. Contact your antivirus software vendor
about cluster-aware versions and interoperability.
Additionally, you should exclude the following file system locations and the processes
from virus scanning on a server that is running Cluster Services:
Directory
The path of the \Cluster folder on the quorum hard disk. For example, exclude
the Q:\Cluster folder from virus scanning.
The %Systemroot%\Cluster folder.
The temp folder for the Cluster Service account. For example, exclude the
\cliusr\Local Settings\Temp folder from virus scanning.
Process
clussvc.exe ( %systemroot%\Cluster\clussvc.exe )
This file may have to be configured as a process exclusion within the antivirus
software.
rhs.exe ( %systemroot%\Cluster\rhs.exe )
This file may have to be configured as a process exclusion within the antivirus
software.
For more information about running antivirus software on servers that are running SQL
Server, see Configure antivirus software to work with SQL Server.
Feedback
Was this page helpful? Yes No
This article describes how to change the IP addresses of the network adapters in the
nodes of a cluster.
More information
During this procedure, it's important that the cluster server maintains a connection to
the network. This is necessary so that it can communicate with a domain controller to
validate the cluster server Service account.
This article assumes that there are two nodes named A and B.
7 Note
For more information about clustered Microsoft SQL Server installations, click the
following article number to view the article in the Microsoft Knowledge Base:
244980 How to change the network IP addresses of SQL Server failover cluster
instances
1. Change the IP address of the network adapter on node A. This may require the
computer to be rebooted. If you're prompted to restart the computer, do so.
2. Start Cluster Administrator and open a connection to the cluster. To administer the
cluster, you need to open a connection to "." (without quotation marks) in Cluster
Administrator when you're prompted to do so. You must perform this process on
one of the nodes in the cluster. If you do this remotely, it may be possible to open
a connection to the name of the node itself. During this process, Cluster
Administrator may respond with the following error message:
4. On the Parameters tab in the IP Address resource properties, make sure that the
Network to Use box contains the new network as the network to use.
8. When both nodes agree on the subnets, the old networks disappear and the new
networks are created.
You use "." to administer the cluster because the IP Address resource doesn't come
online when the Cluster service recognizes a new network and no longer uses the old
network.
Feedback
Was this page helpful? Yes No
This article describes how to configure a Shadow Copies of Shared Folders target on a
server cluster in Microsoft Windows Server 2003.
Summary
Windows Server 2003 includes the Shadow Copies of Shared Folders feature to permit
you to revert to an earlier version of a specific file or a group of files in a folder.
7 Note
Although you can use the same drive that contains your file share resource as the
destination drive for your shadow copies, for performance reasons, Microsoft
recommends that you use a separate physical hard disk drive.
) Important
You must assign a drive letter to the hard disk that you use for shadow copy
backups. If possible, avoid creating a shadow copy on a mount point. Setting
shadow storage on a mount point in a cluster is supported on a server cluster in
Windows Server 2003.
When you configure shadow copies on the server cluster, a dependency is automatically
configured between the host drive and the destination drive. You do not have to
manually create this dependency. To configure shadow copies, follow these steps:
2. Right-click Shared Folders, point to All Tasks, and then click Configure Shadow
Copies.
3. In the Select a volume list, click the drive that contains the file share resource that
you want to create a shadow copy for. For example, click drive R.
4. Click Settings, and then click the destination drive for the shadow copy in the
Located on this volume list.
7 Note
To appear in the Located on this volume list, the destination drive must
contain a share.
5. If you do not want to configure a limit to the size of the shadow copy, click No
limit.
7 Note
8. Click OK.
This article describes how to create volume mount points on a server cluster by using
the NTFS volume mount points functionality.
Summary
By using volume mount points, you can graft or mount a target partition onto a folder
on another physical disk. You can also exceed the 26-letter limitation for drive letter
references.
You can use the following methods to add mount points in Windows Server.
7 Note
More information
When you create a volume mount point on a Windows Server failover cluster, you must
consider the following key items:
2. On each node of the cluster, use the Disk Management console to make sure that
only one node has each disk in the "online" state. The disks should be online on
the same node and on only that node.
3. On the disk that will host the volume for the mount point, follow these steps:
a. In the middle pane of the Disk Management console, right-click the disk item
where the disk number is shown, and then click Online if the disk is not already
online.
b. Right-click the disk item again, and then click Initialize Disk if the disk is not
already initialized.
c. If the disk does not have a volume, complete steps 3d-3g. If the disk has a
volume, go to step 3h.
d. Right-click some unallocated space, and then click New Simple Volume.
e. When the New Simple Volume Wizard starts, click Next, enter the volume size,
and then click Next.
f. On the Assign Drive Letter or Path screen, assign a drive letter, and then click
Next.
g. Format the partition by using the NTFS file system, click Next, and then click
Finish.
h. If the volume does not have a drive letter, complete steps 3i-3j. If the volume
has a drive letter, go to step 4.
i. Right-click the disk, and then click Change Drive Letter and Paths.
j. Click Add, assign a drive letter, and then click OK.
4. On the disk that will host the mount point, follow these steps:
a. In the middle pane of the Disk Management console, right-click the disk item
where the disk number is shown, and then click Online if the disk is not already
online.
b. Right-click the disk item again, and then click Initialize Disk if the disk is not
already initialized.
c. If the disk does not have a volume, complete steps 4d-4i. If the disk has a
volume, go to step 4j.
d. Right-click some unallocated space, and then click New Simple Volume.
e. When the New Simple Volume Wizard starts, click Next.
f. Enter the volume size, and then click Next.
g. On the Assign Drive Letter or Path screen, click Mount in the following empty
NTFS folder, and then click Browse.
h. Expand X:, where X represents the root drive that hosts the mount point. Select
an empty folder or create a new folder, click OK, and then click Next.
i. Format the partition by using the NTFS file system, click Next, and then click
Finish.
j. Make sure that the volume does not have a drive letter assigned to it.
k. Right-click the disk, click Change Drive Letter and Paths, and then click Add.
l. Click Mount in the following empty NTFS folder, and then click Browse.
m. Expand the root drive that hosts the volume for the mount point. Select an
empty folder, or create a new folder, and then click OK two times.
The disk that hosts the volume for the mount point
a. Open the Failover Cluster Management snap-in. To do this, click Start, click
Administrative Tools, and then click Failover Cluster Management. If the
User Account Control dialog box appears, confirm that the action that it
displays is what you want, and then click Continue.
d. Select the disk that hosts both the mount point and the volume for the
mount point, and then click OK. Both disks now appear in the Available
Storage area of the storage pane.
e. Right-click the disk resource that hosts the mount point, and then click
Properties.
g. Click the root disk, click Apply, and then click OK. This dependency will
cause the resource to come online after the disk resource that hosts the
mount point is successfully brought online.
6. Right-click the newly added disk resources, and then click More actions.
7. Click Move this resource to Another Service or application to move the resource
to the appropriate application or service group.
How to set up volume mount points on the clustered
disks
7 Note
Follow these steps on the node on which the "Services and Applications"
group is hosted.
In these steps, volume N and volume Y already exist in the same "Cluster
Service and Application" group.
Volume N represents the volume that will host the mount point folder.
Volume Y represents the volume that is being mounted by the mount point.
Volume Y does not require an assigned drive letter before you follow these
steps.
If you receive a "parameter is incorrect" error message when you access Disk
Management on one of the nodes in your server cluster, exit Disk
Management, start Failover Cluster Manager, navigate to Storage, and then
put volume N into Maintenance Mode.
1. In the middle pane of the Disk Management console of the cluster node that owns
both volumes N and Y, right-click volume Y, and then click Change Drive Letter
and Paths.
2. Click Add, click Mount in the following empty NTFS folder, and then click Browse.
3. Click volume N, click New Folder, type a name for the new folder, and then click
OK two times to return to the Server Manager console.
4. Open the Failover Cluster Management console.
5. Test the mount point on each node by moving the "Service and Application" group
that holds both of the disk resources to each node. Make sure that the disks come
online on each node and that the information in the volume that was mounted can
be accessed through Windows Explorer or by using the command line and the "N:\
<mount point folder name>" path.
7 Note
This practice is no longer necessary in Windows Server 2008 and later versions
of Windows.
If you move a mount point from one shared disk to another shared disk, make sure
that the shared disks are located in the same group.
Try to use the root (host) volume exclusively for mount points. The root volume is
the volume that hosts the mount points. This practice greatly reduces the time that
is required to restore access to the mounted volumes if you have to run the
Chkdsk.exe tool. This also reduces the time that is required to restore from backup
on the host volume.
If you use the root (host) volume exclusively for mount points, the size of the host
volume must be at least 5 megabytes (MB). This reduces the probability that the
volume will be used for anything other than the mount points.
In a cluster where high availability is important, you can make redundant mount
points on separate host volumes. This helps guarantee that if one root (host)
volume is inaccessible, you can still access the data that is located on the mounted
volume through the other mount point. For example, if HOST_VOL1 (D :) is located
on Mountpoint1, user data is located on LUN3. Then, if HOST_VOL2 (E:) is located
on Mountpoint1, user data is located on LUN3. Therefore, customers can access
LUN3 by using either D:\mountpoint1 or E:\mountpount1.
7 Note
Because the user data that is located on LUN3 depends on both the D and E
volumes, you must temporarily remove the dependency of any failed host
volume until the volume is back in service. Otherwise, the user data that is
located on LUN3 remains in a failed state.
Feedback
Was this page helpful? Yes No
Summary
To create highly available file shares on a cluster, you should create them using either
Cluster Administrator (CluAdmin.exe) or the cluster API set. When the share is placed in
a group with other related resources (IP Address, Network Name, and a storage device),
the share is available from whichever node in the cluster owns the group of resources.
This article lists basic steps for creating a basic File Share resource.
7 Note
The information in this article is also valid for the Windows 2000 Cluster service.
1. Open Windows Explorer and create a folder on a shared disk that you want to
share out for users.
2. Assign the appropriate NTFS file level permissions on the folder. Make sure that
the account used to start the Cluster Service has at least READ rights to the folder.
7 Note
Do not share the folder in Windows Explorer as you normally would for a file
share. If you do not grant the Cluster account the appropriate permissions or
share the folder through Windows Explorer, it may cause the cluster file share
to fail. This also includes any administrative shares that already exist, you do
not want to create shares for the root of the drive (Q$) for example.
6. Fill in an administrative name and description for the resource. From the Resource
Type pull down, select File Share, click Next.
7 Note
This is the name that will be displayed in Cluster Administrator and is only
used for administrative purposes. This is not the share name that users will
connect to, give the resource a name that will be easy to identify and manage.
7. Select the nodes that you want to be possible owners of the resource. Click Next
to leave all nodes as possible owners.
7 Note
8. Select a Network Name and Physical Disk resource that the file share will be
dependent on.
7 Note
a. They define the bindings for a resource. You want the file share to be
dependent on the Network Name resource that clients are going to use when
connecting to the file share. The IP Address resource that the Network Name
resource is dependent upon is the IP Address that will be used when connecting
to this share. You never want a file share resource to be dependent on the
"Cluster Name" resource.
b. They define the start order for a resource. You want to make sure that the
network name that the share is going to be created under and the physical disk
where the folder resides that is going to be shared are online and available
before attempting to bring the File Share online.
9. On the File Share Parameters screen, fill in the following information and click
Finish:
a. The "Share Name" is the name of the share that will be created for the UNC
when clients connect. This needs to be a valid NetBIOS name, and is
recommended to be a valid URL name as well.
b. The "Path" is the full path on the local node to the shared disk where the folder
is located. For example: T:\Users.
c. The "Comment" is the information about the share that will appear when a
client browses the share.
10. By default, when resources are created, they are in an offline state. The following
steps are a best practice. Follow them to isolate the effect of the resource failure
on other production resources. This will help until the resource is ready to be
brought into production for users.
a. Right-click the resource, and then click Properties.
b. Click the Advanced tab, click to select the Do not restart button, and then click
OK.
c. Bring the resource online. Make sure that it functions correctly.
d. After you confirm that the resource functions correctly, and you are ready to
bring it into production, take the resource offline. Then, click to select the
Restart button.
e. Bring the resource online.
7 Note
The User Limit dialog can be used to limit the number of simultaneous users.
Click the Permissions button to set share level permissions. Only domain level
groups should be used in defining share level permissions because local
groups and user accounts do not reside on the other node, and the
permissions will not take effect when the file share is failed over. The only
exception to this is if all nodes in the cluster are domain controllers. It is
recommended to use NTFS permissions instead of share level permissions on
a server cluster.
The Advanced dialog can be used to create a Dynamic file share or a DFS
Root. The Advanced button was a feature that was added in Windows NT 4.0
Service Pack 4. If you are running Windows NT 4.0, but you do not see the
Advanced button, reapply Windows NT 4.0 Service Pack 4 or higher.
When browsing the file share, file shares for other virtual servers on the same cluster
may be visible. If you are going to create a large number of file share resources, it may
be easier to script the creation using Cluster.exe.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the validation may fail when you run a
cluster validation wizard for Windows Server-based Failover Cluster.
Symptoms
When you run a cluster validation wizard for Windows Server 2008 R2-based or
Windows Server 2012-based Failover Cluster, the validation may fail. Additionally, you
may receive an error message that resembles the following:
Cause
This problem occurs if the shared storage type used by the system is Direct Attached
clustered RAID controllers.
Resolution
To resolve this problem, add a registry key that enables support for shared storage using
Direct Attached clustered RAID controllers.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
To add the key to the registry, follow these steps:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClusDisk\Parameters
6. Click OK.
More information
For more information on validated solutions for Cluster in a Box Validation Kit, visit the
following article:
Feedback
Was this page helpful? Yes No
This article provides a solution to solve an issue where the event ID 1222 is logged when
you create a Windows Server 2012 failover cluster.
Symptoms
When you create a Windows Server 2012 failover cluster, the event ID 1222 is logged in
the System log.
Cause
When you create a Windows Server failover cluster, a Cluster Computer object for the
cluster name is created in Active Directory Domain Services (AD DS). The object is called
a Cluster Name Object (CNO).
A new feature in Windows Server 2012 flags Cluster Computer objects to prevent them
being deleted accidentally. If you do not have sufficient rights to the organizational unit
(OU) in AD DS where the Computer objects are being created, an event is logged that
notifies you that the cluster objects are not protected from accidental deletion.
Resolution
To resolve this issue, follow these steps:
1. Start Active Directory Administrative Center, and then select the tree view.
2. Select the CNO's organizational unit (OU).
3. Locate and right-click the CNO, and then click Properties.
4. Click to select the Protect from accidental deletion check box, and then click OK.
7 Note
Cluster Computer objects that are not protected from accidental deletion have no
adverse effect on the functionality of the cluster. If you are not concerned about
the unintentional deletion of Cluster Computer objects, you can safely ignore this
warning.
More information
To improve the level of protection and ability to recover from the accidental deletion of
Custer Computer objects, we recommend that you enable the Active Directory Recycle
Bin feature. For more information about how to do this, go to the following websites:
For more information about Cluster Computer Objects, go to the following MSDN
website:
Feedback
Was this page helpful? Yes No
This article describes how to add additional storage capacity to a cluster if the
underlying hardware RAID supports capacity extension technology.
Summary
Capacity extension provides the ability to add additional drives to an existing RAID set
and extend the logical drive so that it appears as free space at the end of the same
logical drive. You can use the Diskpart.exe command-line utility to extend an existing
partition into free space. This process has the following requirements:
The additional disk space must appear as free space at the end of the existing
drive, and it must be directly behind the existing volume that is to be extended.
The extension mustn't rely on software fault tolerance to combine the existing
partition and free space.
The disk signatures of the existing drive remain the same.
Use of the Physical Disk Resource type for the disk. If the disk resource is provided
by a third-party manufacturer, you must contact that manufacturer for information
about how to increase disk space.
More information
) Important
If you add an additional drive to an existing array and the new drive appears as a
new logical disk (instead of free space at the end of the existing drive), the
hardware doesn't support capacity extension because it refers to the free space as a
new drive, and the following procedure won't work. Some storage hardware will, by
default, automatically create a new logical disk and volume for the new space
despite the fact that the expansion of the existing logical disk is a possible option.
When you are using server clusters of Windows Server 2003 or failover clusters of
Windows Server 2008 or of Windows Server 2008 R2, software fault tolerance isn't
natively supported, and the creation of a spanned volume (Volume Set) isn't a
viable option. To add additional space:
1. Add the additional physical drives and extend the additional disk or disks as free
space by using the instructions that are included with the hardware vendor
documentation.
2. Open the Disk Management snap-in, verify that the new free space is added to the
end of the proper drive.
3. Right-click the existing partition, and then select Properties. On the General tab,
type a unique name for the partition. This name will be used to identify the
partition that you want to extend.
7 Note
If you encounter any problem with the previous steps when you are extending
the drive, contact your hardware vendor for assistance.
To extend the partition by using the Disk Management snap-in, follow these
steps:
a. In Disk Management, right-click the data volume that you want to extend.
b. Select Extend Volume.....
c. Follow the instructions in the Extend Volume Wizard.
7 Note
To extend the partition by using the Diskpart.exe utility, follow these steps:
a. Open a command prompt, type diskpart, and then press ENTER.
b. At the DISKPART prompt, type list volume, and then press ENTER to
display the existing volumes on the computer.
c. At the DISKPART prompt, type select volume <volume number>, and then
press ENTER. Here volume number is the number of the volume that you
want to extend. The volume has the unique name that you created in step
3. The volume is listed in the output of the list volume command.
d. At the DISKPART prompt, type extend, and then press ENTER to extend the
partition into all of the available disk space to the end of the drive. Or,
type extend size=<size> to extend the selected volume by size megabytes
(MB).
e. Type exit, and then press ENTER to exit the command prompt.
1. Back up the shared disk (or disks) that you want to extend.
3. Take the entire group that the physical disk resource is located in offline. Bring only
the physical disk resource that is to be extended online. This process should close
all open handles to the disk.
7 Note
If you have any disk or Host Bus Adapter (HBA) utilities that access the disk,
you may need to quit them or stop the services so that they will release any
handles to the disk.
4. Add the additional physical drives and extend the additional disk or disks as free
space by using the instructions that are included with the hardware vendor
documentation.
5. Open the Disk Management snap-in, verify that the new free space is added to the
end of the proper drive.
6. Right-click the existing partition, and then select Properties. On the General tab,
type a unique name for the partition. This name will be used to identify the
partition that you want to extend. Exit Disk Management snap-in.
7 Note
If you encounter any problem with the previous steps when you are extending
the drive, contact your hardware vendor for assistance.
8. At the DISKPART prompt, type list volume, and then press ENTER to display the
existing volumes on the computer.
9. At the DISKPART prompt, type select volume <volume number>, and then press
ENTER. Here volume number is the number of the volume that you want to extend.
The volume has the unique name that you created in step 6. The volume is listed in
the output of the list volume command.
10. At the DISKPART prompt, type extend, and then press ENTER to extend the
partition into all of the available disk space to the end of the drive. Or, type extend
size=<size> to extend the selected volume by size megabytes (MB).
11. Type exit, and then press ENTER to exit the command prompt.
12. Now that the volume is extended, you can bring the entire group that contains the
physical disk resource online, and then power up all of the other nodes in the
cluster.
13. Verify that the group can come online and failover to all other nodes in the cluster.
Feedback
Was this page helpful? Yes No
This article provides a solution to fix an error that you receive when managing cluster by
using failover cluster management console.
Symptoms
While managing cluster using failover cluster management console, we receive the
following error:
Error
The operation has failed.
An error occurred connecting to the cluster '.'.
[Expanded Information]
An error occurred trying to display the cluster information.
Connection to the cluster is not allowed since you are not an administrator on the
cluster node(s) (Node name)
or
When you run the Cluster validation, you receive the following error:
Unable to determine if you have administrator privileges on server "Node name" .
Ensure sure that the server service and remote registry services are enabled, and
that the firewall is properly configured for remote access.
Managing cluster using command prompt will still work and will be able to list groups
(cluster group), resources (cluster. res) and even be able to do failover of groups (cluster
group "cluster group" /move) but will error out while managing cluster using GUI
(Failover Cluster Management console).
7 Note
Command to list group & resources, move group are given in bracket.
Cause
This issue occurs if you have server service not started on the node that is shown in the
error. Expand the error to check node name. Additionally, you may get above
mentioned issue due to incorrect protocol enabled which are required for Microsoft
clustering.
Resolution
Open services console and start the Server service.
Ensure the cluster network has both the mentioned below protocol checked:
Feedback
Was this page helpful? Yes No
This article describes how the Microsoft Cluster service reserves and brings online disks
that are managed by cluster service and related drivers.
More information
The Cluster service only uses the SCSI protocol to manage disks on the shared bus.
7 Note
This does not mean that all disks will be of type SCSI, specifying the hardware
interface known as SCSI, but rather that the storage unit must be able to properly
interpret and process the SCSI protocol and commands.
The following list of commands is the additional SCSI protocol features that will be used
when disks are in a clustered environment.
release : This command is issued by the owning host bus adapter when a disk
resource is taken offline; it frees a SCSI device for another host bus adapter to
reserve.
reset : This command breaks the reservation on a target device. This command
can either be a bus reset (for the entire bus) or, using the storport drivers a
targeted reset for a particular device on the bus. The following procedure
describes how a server cluster starts and gains control of the shared disks. This
scenario assumes that only one node is being turned on at a time:
When the computer is started, the Cluster Disk Driver (Clusdisk.sys) reads the following
local registry key to obtain a list of the signatures of the shared disks under cluster
management:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClusDisk\Parameters
\Signatures
After the list is obtained, the cluster service attempts to scan all of the devices on the
shared SCSI bus to find matching disk signatures.
When the first node in the cluster starts, the cluster disk driver first marks all LUNs (LUN:
logical unit number, a unique identifier used on a SCSI bus to distinguish between
devices that share the same bus) matching the Signatures key as offline volumes. Note
that this is not the same as taking a cluster resource offline. The volume is marked
offline to prevent multiple nodes from having write access to the volumes
simultaneously. If the cluster is a shared disk cluster, one of the disks is designated as
quorum disk by the cluster service. Quorum disk is the first resource brought online
when cluster service attempts to form a cluster.
When the cluster service on the forming node starts, it first tries to bring online the
physical device designated as quorum disk. It executes the disk arbitration algorithm on
the quorum disk to gain ownership. On successful arbitration, cluster service sends a
request to clusdisk to start sending periodic reserves to the disk (to maintain
ownership). Then cluster service sends a request to clusdisk to unblock access to the
quorum disk and mounts the volumes on the disk. Successful mounting of the
volume(s), completes the online procedure and the cluster service then continues with
the cluster form process. The request is passed from the cluster disk driver to the
Microsoft storage driver stack and finally to the driver specific to the HBA that
communicates to the disks. It may also be passed to any multipath software running in
the storage stack.
After the storage controller/device driver reports that the device has been successfully
reserved, the cluster service ensures that the drive can be read from and written to.
Once the disk has passed all of these tests, the disk resource is marked as online and the
cluster service then continues to bring all other resources online.
Each node in the cluster renews reservations for any LUNs it owns every three seconds. If
the nodes of a cluster lose network communication with each other (for example, if
there is no communication over the private or public network), the nodes begin a
process known as arbitration to determine ownership of the quorum disk. The node that
wins ownership of the quorum disk resources in total communication loss between
cluster node will remain functional. Any nodes that cannot communicate and cannot
maintain or acquire ownership of the quorum disk will terminate the cluster service and
any resources that node was hosting will be moved to another node in the cluster.
1. The node that currently owns the quorum disk is the defending node. The
defender assumes that it is defending against any cluster nodes that it cannot
communicate with and for which it did not receive a shutdown notification. The
defender continually renews its reservation to the quorum by requesting a SCSI
reserve be placed on the LUN every three seconds.
2. All other nodes (nodes that do not own the quorum disk and cannot communicate
with the node that owns the quorum resource) become challenging nodes.
4. Seven seconds after the SCSI reset requested, the challenger tries to reserve the
quorum disk. If the defender node is online and functioning, it will have already
reserved the quorum disk as it typically does every three seconds. The challenger
detects that it cannot reserve the quorum, and terminates the cluster service. If the
defender is not functioning properly, the challenger can successfully reserve the
quorum disk. After ten seconds, the challenger brings the quorum online and takes
ownership of all resources in the cluster. If the defending node loses ownership of
the quorum device, then the cluster service on the defending node terminates
immediately.
When a cluster node takes a disk resource offline, it requests that the SCSI reserve be
released and then the drive will once again be unavailable to the operating system.
Anytime a disk resource is offline in a cluster, the volume that the resource points to
(the disk with the matching signature) will be inaccessible to the operating system on
any of the cluster nodes.
Feedback
Was this page helpful? Yes No
This article describes how to configure FTP for Internet Information Services (IIS) 8.0 or a
later version in a Windows Server failover cluster. The procedures in this article apply
only to the FTP service.
7 Note
For more information about how to configure Web services in a failover cluster,
click the following article number to view the article in the Microsoft Knowledge
Base:
970759 Configuring IIS World Wide Web Publishing Service in a Windows Server
failover cluster
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 974603
2. Install the Failover Clustering feature on all cluster nodes and create the cluster. For
more information, visit the following website: Failover Cluster Deployment Guide
3. Set up a file share that will be used for IIS Shared Configuration.
5. Configure Offline Files for IIS Shared Configuration on all cluster nodes.
6. Configure the FTP site and specify the location of its content on one cluster node.
7. Configure highly availability for your FTP site by creating a generic script in Failover
Clustering.
2. Create the file share. This share will be used to store the IIS shared configuration
that will be shared between IIS on all cluster nodes. There are multiple options:
On a stand-alone server that's not part of any failover cluster, create a file
share.
On the same failover cluster that will host the high availability FTP site, create
a high availability file share. For more information, visit the following
Microsoft website: Failover Cluster Step-by-Step Guide: Configuring a Two-
Node File Server Failover Cluster
3. Set the permissions on the share that you created in step 2. Give the user whom
you created in step 1 Full Control permissions to the file share and NTFS
permissions.
4. Confirm that all cluster nodes can browse to the file share. The path of the file
share is \\<fileservername>\<sharename> .
6. Select Connect As, and then type the user name and the password for the user
account that has access to the share in which the shared configuration is stored,
and then select OK. This account will be used to access the share. You should use a
restricted Active Directory account that's not the domain administrator.
7. In the Export Configuration dialog box, type a password that will be used to
protect the encryption keys, and then select OK.
8. On the Shared Configuration page, select the Enable shared configuration check
box.
9. Type the physical path, the user account, and the password that you entered
previously, and then select Apply in the Actions pane.
10. In the Encryption Keys Password dialog box, type the encryption key password
that you set earlier, and then select OK.
11. In the Shared Configuration dialog box, select OK.
12. Select OK.
On each of the other cluster nodes, use the shared configuration that you just exported
to the file share:
7 Note
For more information about how to set up shared configurations in IIS, visit the
following Microsoft website: Shared Configuration
For Windows Server 2016, review Install Server with Desktop Experience.
For Windows Server 2102 and 2012 R2, choose Desktop Experience under
User Interfaces and Infrastructures in the features list
2. Do the following:
For Windows Server 2012, 2012 R2 and 2016, select Sync Center in Control Panel,
and then select Manage offline files.
3. Select Enable Offline Files. Don't restart the computer at this point.
4. Ensure that the cache is set to read-only. To do this, run the following command at
an elevated cmd prompt:
Console
6. Browse to the file server from the computer. Right-click the share that contains the
IIS shared configuration, and then select Always Available Offline.
7 Note
If you set up the file share to be highly available on the same failover cluster
that hosts IIS nodes, the Always Available Offline option will not appear when
you right-click the share if the cluster node that you are on is hosting the
highly available file server. You will have to move the high available file server
application to another node.
7. In Control Panel, open Offline Files. Select Open Sync Center, and then select
Schedule.
8. Schedule an offline file sync for every day or according to your requirements. You
can also configure the offline sync to run every few minutes. Even if you don't set
up a scheduler, when you change something in the Applicationhost.config file, the
change is reflected on the Web server.
7 Note
For more information about how to configure offline files for a shared
configuration in IIS, see Offline Files for Shared Configuration.
On the cluster node on which the resource is online, configure the FTP server to use the
shared disk for FTP site content:
1. On each cluster node, copy the script at the end of this article to
Windows\System32\inetsrv\Clusftp7.vbs .
7. Set the Client Access Point (CAP) name to the FTP site name that clients will use to
connect to the high availability FTP site. Specify the static IPs to use for the FTP site
CAP. If you're using Dynamic Host Configuration Protocol (DHCP), this option
won't be displayed.
8. In the Select Storage step, select the cluster shared disk on which the FTP site
content files reside. The storage should be unused by any other high availability
application on the cluster. If the file share that is used for the IIS shared
configuration is hosted on the same cluster, a different disk resource should be
used here.
9. After you confirm the settings, the wizard will create the cluster group, cluster
resources, and the dependencies between the resources, and then bring the
resources online.
7 Note
To host multiple high availability FTP sites on the same failover cluster, follow the
same steps that are mentioned earlier. You can point to the same script file for all
FTP sites on the cluster if you did not customize the script. However, if you make
changes that are specific to the individual FTP sites, use a different script file for
each FTP site and different clustered shared storage. For example, in
%systemroot%\System32\Inetsrv, useClusftp7.vbs for the first FTP site,Clftp7-
2.vbsfor the second,Clftp7-3.vbsfor the third, and so on. Each script file monitors a
different FTP site.
) Important
The following script is for sample purposes only and is not explicitly supported by
Microsoft. Use of this script in an IIS 8.0 FTP clustered environment is done at your
own risk.
Option Explicit
Dim objWmiProvider
Dim objService
Dim strServiceState
Dim response
End Function
Dim bOnline
'Make sure FTP service is started
bOnline = StartFTPSVC()
Online = true
End Function
Offline = true
End Function
Dim objWmiProvider
Dim objService
Dim strServiceState
End Function
IsAlive = LooksAlive
End Function
Open = true
End Function
Close = true
End Function
Terminate = true
End Function
Feedback
Was this page helpful? Yes No
This article describes Microsoft support policy for Windows Server 2012 or Windows
Server 2012 R2 failover clusters implementation.
Introduction
Microsoft Customer Service and Support supports Windows Server 2012 or Windows
Server 2012 R2 failover clusters that meet the following criteria:
All hardware and software components in the failover cluster meet the
qualifications to receive at least one of the following Windows Server 2012 or
Windows Server 2012 R2 logos:
This logo is designed for cloud and infrastructure hardware and software. The
Certified for Windows Server 2012 or Windows Server 2012 R2 logo
demonstrates that a server system meets the security, reliability, and
manageability requirements of Microsoft products. Additionally, the logo
demonstrates that a server system supports all the roles, features, and interfaces
that Windows Server 2012 or Windows Server 2012 R2 supports.
The fully configured failover cluster passes all required failover cluster validation
tests. To validate a failover cluster, run the Validate a Configuration Wizard in the
Failover Cluster Manager snap-in, or run the Windows PowerShell cmdlet Test-
Cluster .
Changes in Windows Server 2012 or Windows
Server 2012 R2
Before you create a cluster, run a failover cluster validation test on fully configured
hardware that is running Windows Server 2012 or Windows Server 2012 R2. The failover
cluster validation test identifies potential hardware and software configuration issues.
Run the failover cluster validation test on hardware and software that is certified under
the Windows Server Logo Program for Windows Server 2012 or Windows Server 2012
R2.
To configure a failover cluster in Windows Server 2012 or Windows Server 2012 R2, the
failover cluster must pass the required failover cluster validation tests. The failover
cluster validation tests perform the following functions on the collection of servers that
you intended to use as a cluster:
By default, if the failover cluster validation tests recognize that one or more nodes
already exist in a cluster, the cluster configuration function is performed. Also, if the
failover cluster validation tests recognize that one or more nodes have the Hyper-V role
installed, the Hyper-V configuration function is performed.
For a more information about how to validate hardware for a Windows Server 2012 or
Windows Server 2012 R2 failover cluster, go to the following Microsoft website:
7 Note
All reports that the Validate a Configuration Wizard in the Failover Cluster Manager
snap-in generates are stored in the %systemroot%\cluster\Reports folder.
Run the failover cluster validation tests on a fully configured failover cluster before you
install the Failover Clustering feature. The failover cluster is valid if it receives one of the
following indicators for each test in the Summary Report:
The yellow yield sign indicates that the aspect of the proposed failover cluster
that is being tested is not in alignment with Microsoft best practices.
Investigate this aspect to make sure that the configuration of the cluster is
acceptable for the environment of the cluster, for the requirements of the
cluster, and for the roles that the cluster hosts.
If a failover cluster receives a red "X" (fail) in one of the tests, you cannot use the part of
the failover cluster that failed in a Windows Server 2012 or Windows Server 2012 R2
failover cluster. Additionally, if a test fails, all other tests do not run, and you must
resolve the issue before you install the failover cluster.
Run the validation tests when a major component of the cluster is changed or updated.
For example, run the validation tests when you make the following configuration
changes to the failover cluster:
Microsoft Support may also request that you run the validation tests against a
production cluster. When you do this, the failover cluster validation tests perform a
hardware and software inventory, test the network, validate the system configuration,
and perform other relevant tests. In some scenarios, you can run only a subset of the
tests. For example, when troubleshooting a problem with networking, Microsoft Support
may request that you run only the hardware and the software inventory and the
networking test against the production cluster.
7 Note
The ability to specify one or more disks to be included in the failover cluster
validation tests is added in Windows Server 2012 or Windows Server 2012 R2.
For more information about advanced failover cluster validation scenarios, go to the
following Microsoft website:
More information
Microsoft supports the failover clusters that are listed under Cluster Solutions on the
Windows Server Catalog for the following versions of Windows Server:
For more information about the Windows Server Catalog, see Windows Server
Catalog .
For more information about failover clustering, see Failover Clustering Overview.
For more information about the Microsoft support policy for earlier operating systems,
click the following article numbers to view the articles in the Microsoft Knowledge Base:
309395 The Microsoft support policy for server clusters, the Hardware
Compatibility List, and the Windows Server Catalog
943984 The Microsoft Support Policy for Windows Server 2008 or Windows
Server 2008 R2 Failover Clusters
Feedback
Was this page helpful? Yes No
Provide product feedback
NetBIOS and WINS don't bind to cluster
IP address resources
Article • 12/26/2023
This article provides a workaround for an issue where NetBIOS and WINS don't bind to
cluster IP address resources.
Symptoms
Assume that you have an environment in which cluster servers are running Windows
Server 2016 or a later version of Windows. You notice the following issues:
Issue 1
Issue 2
The WINS name resolution service does not respond to incoming queries or
registration requests on cluster networks.
Cause
This behavior is by design. It occurs because NetBIOS no longer binds to IP address
resources in Windows Server 2016 or later versions of the Windows Server-based Cluster
service.
Workaround
To work around this behavior, use the Cluster Management console to determine the
name of the IP address resource that must be changed.
After you determine the IP address resource, run the following commands in an elevated
PowerShell window. In the commands, substitute the name of the actual IP address
resource.
PowerShell
Get-ClusterResource"resource name"| Set-ClusterParameter EnableNetBIOS 1
Stop-ClusterResource"resource name"
Start-ClusterResource"resource name"
Feedback
Was this page helpful? Yes No
This article describes recommended configuration for the private adapter on a cluster
server.
Summary
Communication between Server Cluster nodes is critical for smooth cluster operations.
Therefore, you must configure the networks that you use for cluster communication are
configured optimally and follow all hardware compatibility list requirements. For
networking configuration, two or more independent networks must connect the nodes
of a cluster to avoid a single point of failure. The use of two local area networks (LANs)
is typical. (Microsoft Product Support Services does not support the configuration of a
cluster with nodes connected by only one network.)
Additionally, each cluster network must fail independently of all other cluster networks.
This means that two cluster networks must not have a component in common that can
cause both to fail simultaneously. For example, the use of a multiport network adapter
to attach a node to two cluster networks would not satisfy this requirement in most
cases because the ports are not independent.
7 Note
The information in this article does not apply to Windows Server 2008 or Windows
Server 2008 R2 failover clusters. The recommendations for network configuration
for the newer versions of Failover Cluster in non-CSV environments are noted at
Appendix A: Failover Cluster Requirements. The scenario where the settings in this
article are likely to cause adverse behavior on Windows Server 2008 or Windows
Server 2008 R2, is with a CSV environment. Recommendations with CSV is located
at Requirements for Using Cluster Shared Volumes in a Failover Cluster in
Windows Server 2008 R2.
3. In the Connections box, make sure that your bindings are in the following order,
and then click OK:
4. Right-click the network connection for your heartbeat adapter, and then click
Properties.
7 Note
You may want to rename this connection for simplicity (for example, rename it
to "Private").
If the server is using a MNS quorum, click to select Internet Protocol (TCP/IP)
and at least one other file-sharing network protocol, and then click to clear all
other options.
7 Note
If the server is using a MNS quorum, you must have at least one network that
has file-sharing capabilities for the MNS quorum to function. We strongly
recommend that you have multiple networks on the cluster that have file
sharing enabled to avoid a single point of failure for the quorum resource.
6. If you have a network adapter that can transmit at multiple speeds, and the
adapter can specify a speed and duplex mode, manually specify a speed and
duplex mode.
With network adapters that can manually specify a speed and duplex mode, make
sure that you hard set them to the same on all nodes and according to the
manufacturers' specifications. For network adapters that do not support manual
settings, follow the card manufacturer's specifications.
The information that is traveling across the heartbeat network is small, but latency
is critical for communication. If you have the same the speed and duplex settings,
this helps to make sure that you have reliable communication.
If you are not sure of the supported speed of your card and connecting devices, or
your manufacturer's recommended settings, Microsoft recommends that you set
all the devices on that path of 10 MB/Sec and Half Duplex. This configuration will
provide sufficient bandwidth and reliable communication.
7 Note
Microsoft does not recommend the use of any type of fault-tolerant adapter
or "Teaming" for the heartbeat. If you require redundancy for your heartbeat
connection, use multiple network adapters set to Internal Communication
Only and define their network priority in the Cluster configuration. Issues seen
with early multi-ported network adapters, verify that your firmware and driver
are at the most current revision if you use this technology.
Contact your network adapter manufacturer for information about compatibility
on a Server Cluster.
8. On the General tab, verify that you have selected a static IP address that is not on
the same subnet or network as another one of the public network adapters. An
example of good IP addresses to use for the private adapters is 10.10.10.10 on
node 1 and 10.10.10.11 on node 2 with a subnet mask of 255.0.0.0. If your public
network uses the 10.x.x.x network and 255.0.0.0 subnet mask, use an alternate
private network IP and subnet.
9. Make sure that there is no value set in the Default Gateway box.
10. Verify that there are no values defined in the Use the following DNS server
addresses box.
7 Note
If the cluster nodes are also DNS servers, "127.0.0.1" is displayed in the Use
the following DNS server addresses box (the box will not be blank); this is
acceptable.
12. On the DNS tab, verify that there are no values defined. Make sure that the
Register this connection's addresses in DNS and Use this connection's DNS suffix
in DNS registration check boxes are cleared.
13. When you close the dialog box, you may receive the following prompt. If you
receive this prompt, click Yes:
14. If you are using a crossover cable for your private heartbeat interconnect, disable
the TCP/IP stack destruction feature of Media Sense.
7 Note
15. Complete the previous steps on all other nodes in the cluster.
17. Click the cluster name at the root of Administrator. On the File menu, click
Properties.
18. On the Network Priority tab, verify that the private network is listed at the top. If it
is not, use the Move Up button to increase its priority.
20. Click to select the Enable this network for cluster use check box.
21. Click Internal cluster communications only (private Network). For more
information, see How to use Windows Server cluster nodes as domain controllers.
2. On the Protocols tab, click TCP/IP Protocol, and then click Properties.
4. On the IP Address tab, verify that you have selected a static IP address that is not
on the same subnet or network as another one of the public network adapters. An
example of good IP addresses to use for the private adapters is 10.10.10.10 on
node 1 and 10.10.10.11 on node 2 with a subnet mask of 255.0.0.0.
5. Make sure that there is no value set in the Default Gateway box.
6. On the WINS Address tab, click the heartbeat adapter in the Adapter box.
7. Verify that there are no values defined for the WINS server entries.
8. When you close the dialog box, you may receive the following prompt. If you
receive this prompt, click Yes:
At least one of the adapter cards has an empty primary WINS address. Do you
want to continue?
9. On the Routing tab, verify that the Enable IP Forwarding check box is cleared.
11. If you have a network adapter that can transmit at multiple speeds and can specify
a speed and duplex mode, manually specify a speed and duplex mode.
With network adapters that can manually specify a speed and duplex mode, make
sure that you hard set them to the same on all nodes and according to the
manufacturer's specifications. For network adapters that do not support manual
settings, follow the card manufacturer's specifications.
The information that is traveling across the heartbeat network is small, but latency
is critical for communication. If you have the same speed and duplex settings, you
can help make sure that you have reliable communication.
If you do not know the supported speed of your card and connecting devices,
Microsoft recommends you set all devices on that path to 10 MB/Sec and Half
Duplex. This configuration provides sufficient bandwidth and reliable
communication.
7 Note
Microsoft does not recommend that you use any type of fault-tolerant
adapter or "Teaming" for the heartbeat. If you require redundancy for your
heartbeat connection, use multiple network adapters set to Internal
Communication Only and define their network priority in the Cluster
configuration. Issues seen with early multi-ported network adapters, verify
that your firmware and driver are at the most current revision if you use this
technology.
12. On the Bindings tab, click All Adapters in the Show Bindings For box.
13. Click the plus sign (+) next to the adapter used for the private interconnect.
14. Click WINS Client (TCP/IP), and then click Disable.
7 Note
17. Make sure that the public network adapter is the first binding (at the top of the
binding list). To do this, click the private network adapter and use the Move Down
button. If you have multiple public network adapters, make sure the heartbeat
adapter is listed last.
18. Click OK to finish modifying the network properties and accept the changes.
20. Complete the previous steps on all other nodes in the cluster.
22. Click the cluster name at the root of Administrator. On the File menu, click
Properties.
23. On the Network Priority tab, verify that the private network is listed at the top. If it
is not, use the Move Up button to increase its priority.
25. Click to select the Enable this network for cluster use check box.
26. Click Internal cluster communications only (private Network). For more
information, see How to use Windows Server cluster nodes as domain controllers.
Feedback
Was this page helpful? Yes No
This article documents recommended hotfixes for Windows Server 2008 R2 Service Pack
1 (SP1) Failover Clusters. Applying these fixes can improve the reliability of your high
availability solution.
7 Note
We recommend that you evaluate each fix to determine whether it applies to your
environment. If you determine that Failover Clusters in your environment may be
affected by the problem(s) that a fix addresses, install the fix on each cluster node
by using the procedures that are described in How to update Windows Server
failover clusters.
Use the information in the More information section to help you determine
whether a particular fix applies to the cluster. Before you install a particular fix, we
recommend that you review the original Microsoft Knowledge Base (KB) article that
describes the fix.
January 22, 3033918 Disk resource does Clusres.dll Makes sure that chkdsk
2015 not come online in works correctly on
Windows Server 2012 clustered volumes.
R2 or Windows
Server 2008 R2-
based failover cluster
Date when Knowledge Title Component Why we recommend
the hotfix Base article this hotfix
was added
June 14, 2545850 Users cannot access Multiple Prevents CNO and VCO
2011 an IIS-hosted website Authentication objects from failing to
after the computer DLL's register in DNS because
password for the of Kerberos
server is changed in authentication failure
Windows 7 or in after the computer
Windows Server 2008 password is changed.
R2
To see the latest list of hotfixes for Windows Server 2008 R2 Hyper-V configurations, see
Hyper-V Update List for Windows Server 2008 R2.
Feedback
Was this page helpful? Yes No
This article describes an issue in which some SMB features don't work correctly together
with non-default cluster network name configuration in Windows Server 2012 R2.
Symptoms
Consider the following scenario:
You're using a Windows Server 2012, Windows Server 2012 R2, or Windows Server
2016 cluster.
You changed the Properties for the cluster network name resource so that the
DNSName and Name property are different than the Name of the cluster network
name resource. For example, you run the following PowerShell cmdlet:
PowerShell
You create a file share in this cluster group with the CA Feature enabled.
In this scenario, the CA Feature doesn't work correctly, and you receive the following
event in the SMBWitnessClient log:
7 Note
This event could also be logged with for a file share without the CA feature
enabled.
Cause
This issue occurs because the SMB code expects the Name of the cluster network name
resource and the property names of DNSName and Name to be identical.
Workaround
To work around this issue, you have to adjust the properties of the cluster network name
resource to be identical to the Name of the resource.
More information
The purpose of the SMB witness service is to speed up the detection of cluster node
failures. This SMB witness service is only active for clustered CA shares. For Non-CA
shares, the SMB witness service is not used.
If the Event ID 8 is logged and the witness client could not register for a cluster network
name (CA file share), then this is equal to the SMB witness service is disabled.
A cluster node failure is first found during the cluster service health checks and the SMB
witness service also gets this Information immediately from the cluster.
Next the SMB clients are notified from the SMB witness service that they need to
reconnect to the remaining cluster nodes. This Process is finished in a few seconds. If the
SMB witness service is not running, then the SMB client needs to rely on the TCP and
SMB timeouts. Depending on the configuration, this can take about 45-90 Seconds until
the client notices the cluster node outage and reconnects to the remaining cluster
nodes. In some special configurations, it can take multiple minutes until the cluster node
outage is notified.
The SMB witness service is not necessarily needed to enable CA but it is recommended
to have this service running in default configurations as this speeds up the detection of
node failures. Nevertheless the CA feature is fully supported with disabled SMB witness
service.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
Feedback
Was this page helpful? Yes No
This article outlines the Microsoft third-party storage software solutions support policy
that works in conjunction with Microsoft server products.
Introduction
If you're using third-party storage solutions that run in conjunction with Microsoft server
products such as Microsoft Exchange Server and Microsoft SQL Server, you may find
occasions where you require support for the configuration. You can contact Microsoft
Product Support Services (PSS) if you require help, although depending on your
configuration, PSS may provide support directly, or may instruct you to contact the
storage vendor if you require help.
More information
7 Note
For third-party software programs that install drivers, this policy applies only if all
the included drivers are signed. This includes filter drivers, system drivers, and
others.
When you use a third-party program on qualified hardware such as block mode devices,
you must contact the third-party software vendor for support for that software product.
For example, if you use snapshot management software or backup software that
configures the storage hardware directly, you must contact the vendor directly for
support with the tool. However, when you these third-party programs on a Windows
system that is connected to qualified hardware or that is installed with qualified
hardware, your overall configuration is still supported by Microsoft. You can still run
these programs without invalidating or otherwise compromising the supportability of
your configuration.
7 Note
For third-party software programs that install drivers, this policy only applies if all
the included drivers are signed. This includes filter drivers, system drivers, and
others.
Microsoft won't offer direct support for third-party software that is used on qualified
hardware, just as Microsoft doesn't offer direct support for other third-party
independent programs that run on Windows. If you call Microsoft for support for third-
party software that is used in conjunction with qualified hardware, and PSS determines
that there's a problem with the third-party software product, PSS will refer you to the
software vendor.
The role of Volume Shadow Copy Service
Volume Shadow Copy Service (VSS) is an infrastructure where multiple third-party
storage management programs, business programs, and hardware providers cooperate
in the creation and management of shadow copies.
Because VSS is an API that is licensed and built upon by these third parties, Microsoft
makes no warranty or recommendation on the performance or reliability of the third-
party solution. Microsoft relies on partners to offer VSS-enabled solutions and to
provide support for them. We recommend that customers use VSS-enabled backup
products.
When designed and implemented correctly, VSS-enabled products help make sure that
synchronization occurs between the server program, the backup program, and the
Windows storage subsystem. VSS-enabled products help make sure that pending writes
are held while the backup is created. VSS-enabled products help make sure that system
state information is accurately captured. This is especially true when backing up
Exchange, SQL Server, the Microsoft Cluster Service (MSCS), and the Active Directory
directory service.
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise,
regarding the performance or reliability of these products.
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft doesn't guarantee the
accuracy of this third-party contact information.
References
For additional information about how storage solutions are supported for Microsoft
Exchange 5.5, Microsoft Exchange Server 2003, Microsoft SQL Server 7.0, and Microsoft
SQL Server 2000, click the following article numbers to view the articles in the Microsoft
Knowledge Base:
Feedback
Was this page helpful? Yes No
This article provides troubleshooting guidance for issues with accounts used by failover
clusters.
When you create a failover cluster and configure clustered services or applications, the
failover cluster wizard creates the necessary Active Directory accounts and gives them
the correct permissions. Issues can occur if a needed account is deleted, or necessary
permissions are changed. The following sections provide steps to troubleshoot these
issues.
Output
The event message indicates that the password for the cluster name account no longer
matches the corresponding password stored by the clustering software.
7 Note
For more information about using the appropriate accounts and group
memberships, see Local and Domain Default Groups.
For more information about ensuring the cluster administrators have the correct
permissions, see Planning ahead for password resets and other account
maintenance.
1. Select Start, go to Administrative Tools, and then select Failover Cluster Manager
to open the failover cluster snap-in. If the User Account Control dialog box
appears, confirm that the action it displays is what you want, and then select Yes.
2. In the Failover Cluster Manager snap-in, check whether the cluster you want to
configure is displayed. If it isn't displayed, in the console tree, right-click Failover
Cluster Manager, select Manage a Cluster, and then select or specify the desired
cluster.
4. Under Cluster Name, right-click the Name item, and then select Take Offline.
5. Under Cluster Name, right-click the Name item, point to More Actions, and then
select Repair Active Directory Object.
7 Note
The Repair Active Directory Object option will be greyed out unless the
cluster's Name resource is offline. Taking the cluster's Name resource offline
shouldn't negatively impact other cluster groups, such as the SQL Server
Failover Cluster Instance. This is because those other cluster groups don't
depend on the cluster's Name resource.
For more information about the related events (Event IDs 1193, 1194, 1206, and 1207),
see Active Directory Permissions for Cluster Accounts .
7 Note
The following steps require at least membership in the Domain Admins group (or
equivalent). For more information about using the appropriate accounts and group
memberships, see Local and Domain Default Groups .
2. Expand the default Computers container or the folder in which the cluster name
account (the computer account for the cluster) is located. The Computers
container is located in Active Directory Users and Computers\<domain-
node>\Computers.
3. Examine the icon for the cluster name account. The account shouldn't be disabled
by having a downward-pointing arrow on it. If it's disabled, right-click it and select
Enable Account if possible.
4. On the View menu, make sure that the Advanced Features option is selected.
When the Advanced Features option is selected, you can see the Security tab in
the properties of accounts (objects) in Active Directory Users and Computers.
5. Right-click the default Computers container or the folder in which the cluster
name account is located, and then select Properties.
7. In the list of accounts with permissions, select the cluster name account, and then
select Edit.
7 Note
If the cluster name account isn't listed, select Add and add it to the list.
8. For the cluster name account (also known as the cluster name object or CNO),
ensure that the Allow checkbox is selected for the Create Computer objects and
Read all properties permissions.
9. Select OK until you return to the Active Directory Users and Computers snap-in.
11. Expand the default Computers container or the container in which the computer
account for one of the clustered services or applications is located.
12. Right-click the computer account for one of the clustered services or applications,
and then select Properties.
13. On the Security tab, confirm that the cluster name account is listed among the
accounts that have permissions, and select it. Confirm that the cluster name
account has the Full control permission (the Allow checkbox is selected). If it
doesn't, add the cluster name account to the list and give it the Full control
permission.
14. Repeat steps 12-13 for each clustered service and application configured in the
cluster.
15. Make sure that the domain-wide quota (by default, 10 ) for creating computer
objects hasn't been reached (consult a domain administrator if applicable). If the
previous items in this procedure have all been reviewed and corrected, and the
quota has been reached, consider increasing the quota. To change the quota,
follow these steps:
a. Open a command prompt as an administrator and run the ADSIEdit.msc
command.
b. Right-click ADSI Edit, and then select Connect to > OK. Then, Default naming
context is added to the console tree.
c. Double-click Default naming context, right-click the domain object under it,
and then select Properties.
d. Scroll to ms-DS-MachineAccountQuota and select it. Select Edit, change the
value, and then select OK.
Feedback
Was this page helpful? Yes No
This article introduces solutions for adjusting the threshold of failover cluster networks.
Symptom
When you run Windows failover cluster nodes in IaaS with a SQL Server Always On
availability group, changing the cluster setting to a more relaxed monitoring state is
recommended. Cluster settings out of the box are restrictive and could cause unneeded
outages. The default settings are designed for highly tuned on premises networks and
don't take into account the possibility of induced latency caused by a multitenant
environment such as Microsoft Azure (IaaS).
Cluster node Node 1 was removed from the active failover cluster membership. The
Cluster service on this node might have stopped. This could also be due to the node
having lost communication with other active nodes in the failover cluster. Run the
Validate a Configuration wizard to check your network configuration. If the condition
persists, check for hardware or software errors related to the network adapters on this
node. Also check for failures in any other network components to which the node is
connected such as hubs, switches, or bridges.
Cluster.log example:
Output
Output
0000ab34.00007328::2014/06/10-07:54:34.100 INFO
<realLocal>10.xxx.xx.xxx:~3343~</realLocal>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO
<realRemote>10.xxx.xx.xxx:~3343~</realRemote>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO
<virtualLocal>fexx::xxxx:xxxx:xxxx:xxxx:~0~</virtualLocal>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO
<virtualRemote>fexx::xxxx:xxxx:xxxx:xxxx:~0~</virtualRemote>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO <Delay>1000</Delay>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO <Threshold>5</Threshold>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO
<Priority>140481</Priority>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO
<Attributes>2147483649</Attributes>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO </struct
mscs::FaultTolerantRoute>
0000ab34.00007328::2014/06/10-07:54:34.100 INFO removed
Output
Cause
There are two settings that are used to configure the connectivity health of the cluster.
Delay - This defines the frequency at which cluster heartbeats are sent between nodes.
The delay is the number of seconds before the next heartbeat is sent. Within the same
cluster, there can be different delays between nodes on the same subnet and between
nodes, which are on different subnets.
Threshold - This defines the number of heartbeats, which are missed before the cluster
takes recovery action. The threshold is a number of heartbeats. Within the same cluster,
there can be different thresholds between nodes on the same subnet and between
nodes that are on different subnets.
Resolution
To resolve this issue, relax the Cluster network configuration settings. See Heartbeat and
threshold.
References
For more information on tuning Windows Cluster network configuration settings, see
Tuning Failover Cluster Network Thresholds .
Feedback
Was this page helpful? Yes No
This article describes an issue where unexpected warning and error messages occur in a
Windows Server failover cluster that has been configured to run as a guest (virtual
machine) in a Hyper-V environment.
Symptoms
In a Windows Server failover cluster that has been configured to run as a guest (virtual
machine) in a Hyper-V environment, the following messages are written to the logs that
are indicated in the message details:
Warning message:
Cause
These messages are registered because of the new functionality in Windows Server
failover clusters. This new functionality includes better interoperability with Hyper-V.
Even when the failover cluster is running in a virtualized environment as a guest (virtual
machine), the failover clustering feature expects aspects of the Hyper-V role to be
available. When the failover cluster doesn't find these Hyper-V aspects, these messages
are written to the logs in question.
Resolution
To resolve the warning message, install the Hyper-V role Remote Server Administration
tools. To add the Hyper-V Remote Server Administration tools, follow these steps:
1. Click Start, click Administrative Tools, and then click Server Manager.
2. In the navigation pane, click Features, and then click Add Features.
3. Expand Remote Server Administration Tools.
4. Click Hyper-V Tools, click Next, and then click Install.
There's no workaround or resolution for the error message. However, you can safely
ignore this error message in this scenario.
More information
In a Windows Server 2008 R2 IA-64 environment, there's no workaround for this error
message because Hyper-V doesn't support the IA-64 architecture.
Feedback
Was this page helpful? Yes No
This article describes how to use Windows Server cluster nodes as domain controllers.
Summary
7 Note
The information in this article addresses a situation that you do not generally
encounter in most Information Technology architectures.
Links to all of the articles that are referenced within this article are located in the
"References" section.
There are instances when you can deploy cluster nodes in an environment where there
are no pre-existing Active Directory. This scenario requires that you configure at least
one of the cluster nodes as a domain controller. It is recommended that 2+ nodes be
configured as domain controllers, so that there be at least one backup domain
controller. Keeping the configuration of the nodes consistent across the cluster is a
general best practice, and you may wish to enable all nodes as domain controllers.
Because Active Directory depends on the Domain Name System (DNS), each domain
controller must be a DNS server if there is not another DNS server available that
supports dynamic updates or SRV records. (Microsoft recommends that you use Active
Directory-integrated zones). For more information, see article 255913.
More information
Depending on the workload deployed on the Failover Cluster, there are different
support policies and recommendations:
If you have a cluster deployment in which there is no link with a domain, you must
configure the cluster nodes as domain controllers prior to setting up the cluster. If the
connectivity between cluster nodes and domain controllers is such that the link is either
slow or unreliable, consider having a domain controller co-located at the same site or
location as the cluster.
Consider the following important points when you are deploying Windows Server 2003,
Windows Server 2008, Windows Server 2008 R2, or Windows Server 2012 Failover
Clustering nodes as domain controllers:
It is not recommended to combine the Active Directory Domain Services role and
the Failover Cluster feature on Windows Server 2003, Windows Server 2008, or
Windows Server 2008 R2
It is not supported for a Windows Server 2003, Windows Server 2008, or Windows
Server 2008 R2 node in a Failover Cluster to be a Read-Only Domain Controller
(RODC)
It is not supported for a Windows Server 2003, Windows Server 2008, or Windows
Server 2008 R2 Failover Cluster running Microsoft Exchange Server or Microsoft
SQL Server to be a domain controller
It is not supported to combine the Active Directory Domain Services role and the
Failover Cluster feature on Windows Server 2012
If the Windows Server 2003 cluster nodes are the only domain controllers, they
each have to be DNS servers as well, and they should point to themselves for
primary DNS resolution, and to each other for secondary DNS resolution. You must
address the problem of the ability to not register the private interface in DNS,
especially if it is connected by way of a crossover cable (two-node only). For
additional information about how to configure the heartbeat interface, click the
following article number to view the article in the Microsoft Knowledge Base:
258750 Recommended private "heartbeat" configuration on a cluster server
However, before you can accomplish step 12 in article 258750, you must first
modify other configuration settings, which are outlined in the following article in
the Microsoft Knowledge Base: 275554 The host's "A" record is registered in
DNS after you choose not to register the connection's address
If the cluster nodes are the only domain controllers, they must each be global
catalog servers, or you must implement domainlets.
The first domain controller in the forest takes on all flexible single master
operation (FISMO) roles, refer to article 197132. You can redistribute these roles to
each node. However, if a node fails, the flexible single master operation roles that
the node has taken on are no longer available. You can use Ntdsutil to forcibly take
away the roles and assign them to the node that is still running (refer to article
223787). Review article 223346 for information about placement of flexible single
master operation roles throughout the domain.
You cannot cluster domain controllers for fault tolerance. You can promote
computers to be domain controllers, and then you can install the Cluster service on
those computers, but there is no method to store Active Directory on any one of
the cluster's managed drives. There is no "failover" of Active Directory. Having
multiple domain controllers are by the very nature deliver high availability of
directory services.
Nodes in a Windows Server 2003, Windows Server 2008, and Windows Server 2008
R2 Failover Cluster must have access to a Read-Write Domain Controller
It is supported to deploy a Windows Server 2012 Failover Cluster in an
environment that only has access to a Read-Only Domain Controller (RODC)
References
For more information, click the following article numbers to view the articles in the
Microsoft Knowledge Base:
255913 Integrating Windows 2000 DNS into an existing BIND or Windows NT 4.0-
based DNS namespace
275554 The host's "A" record is registered in DNS after you choose not to register the
connection's address
234790 How to find servers that hold flexible single master operations roles
Feedback
Was this page helpful? Yes No
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve issues with installing updates, features, or roles. The topics
are divided into one subcategory. Browse the content or use the search feature to find
relevant content.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where you're unable to connect to WSUS
Administration website.
Symptoms
You are unable to connect to WSUS Administration website while opening
"Windows Server Update Service"
In addition to this when you open Windows Small Business Server Console you get
error message "An error occurred while retrieving updates information" under
"Updates" tab.
You see HTTP Error 500 in IIS log file for WSUS Administration Website:
http://<ServerName>:8530/ApiRemoting30/WebService.asmx
Site 1572271583
Process 6860
Failure Reason STATUS_CODE
Trigger Status 500.24
Final Status 500.24
Time Taken 16 msec
ModuleName ConfigurationValidationModule
Notification 1
HttpStatus 500
HttpReason Internal Server Error
HttpSubStatus 24
ErrorCode 2147942450
ConfigExceptionInfo
Notification BEGIN_REQUEST
ErrorCode The request is not supported. (0x80070032)
Cause
The above behavior is experienced due to incorrect settings on the WSUS
Administration Website. By default we do not have " ASP.NET Impersonation " Enabled for
any of the WSUS Administration Websites.
Resolution
Open IIS Console
ApiRemoting30
ClientWebService
Content
DssAuthWebService
Inventory
ReportingWebService
Selfupdate
ServerSyncWebService
SipleAuthWebService
Restart IIS
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where the Microsoft .NET Framework 3.5
installation fails without a public Internet environment on an OEM Windows installation.
Symptoms
Consider the following scenario:
You have an exclusive network environment that is not connected to the Internet.
You have a Windows operating system installed from a standard OEM image in this
environment. This image may include a combination of languages and the latest
updates relevant to the system and environment.
You try to install the .NET Framework 3.5 or the .NET Framework 3.5 Service Pack 1
(SP1) on this computer.
In this scenario, you receive an error message, and the .NET Framework installation fails.
The .NET Framework installation also fails in one of the following situations:
Cause
This issue occurs because Windows was designed with the intent that the operating
system would have access to the Internet.
If you cannot access the Internet, the .NET Framework 3.5 has to pull data from an
alternative source. If that source does not explicitly match the installing OS (such as a
hotfix, hotfix version, or a language pack-specific file that was installed), you will
encounter this issue.
Workaround
To work around this issue, create an installation media that has the .NET Framework 3.5
preinstalled. To do this, follow the steps on the following webpage for each language
that will be installed on this operating system: The .NET Framework 4.5 is default and
the .NET Framework 3.5 is optional Or, you can temporarily connect the computer
that needs the .NET Framework 3.5 to the Internet in order to install the .NET
Framework.
7 Note
You have to perform these steps before you install the language packs. However,
hotfixes typically must be installed after the language packs are installed.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section. Currently, an efficient and effective strategy has not been
located for existing operating systems. However, this issue is under investigations for
future operating systems.
More information
If you were successful in building an alternative installation source by using an offline
OS image, be aware that with this solution, you have to make sure that this alternative
source has all updates (hotfixes) applied to it that might be on the target computers
together with all language packs. This image has to be kept up-to-date as new updates
are released.
7 Note
Some hotfixes can only be obtained by contacting Microsoft directly. These hotfixes
should also be considered when you build the installation source if this route is
selected.
Our recommendation regarding the building of installation media (as mentioned in the
"Workaround" section) is to build an alternative-source media and test it, as this process
has proven expensive considering the time that must be spent. This is compared to
creating installation media by using known file versions.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article offers you some advanced manual methods that can be used to fix some
problems that prevent you from installing some updates or programs.
Symptoms
When you try to download an ActiveX control, install an update to Windows or to a
Windows component, install a service pack for Windows or for a Windows component,
or install a Microsoft or third-party software program, you may experience one or more
of the following symptoms:
7 Note
You receive the following error message when you try to install a program or
update:
Microsoft Windows
The signature on the software package you want to install is invalid. The
software package is not signed properly.
After you click OK in the first error message dialog box, you receive a message that
states that the installation was successful, or you receive the following error
message:
When you try to install an update or to install a service pack, you receive an error
message that is similar to one of the following:
Error 1
Error 2
Error 3
The software you are installing has not passed Windows Logo testing to
verify its compatibility with Windows XP. (Tell me why this testing is
important.)
This software will not be installed. Contact your system administrator.
Error 4
The software you are installing has not passed Windows Logo testing to
verify its compatibility with this version of Windows. (Tell me why this
testing is important.)
When you try to install a Windows XP service pack, you receive an error message
that is similar to the following:
Service Pack 1 Setup could not verify the integrity of the file. Make sure the
Cryptographic service is running on this computer.
When you attempt to install Microsoft Data Access Components (MDAC) 2.8, you
receive an error message that is similar to the following:
INF Install failure. Reason: The timestamp signature and/or certificate could not
be verified or is malformed.
When you try to install a package from the Windows Update Web site or from the
Microsoft Update Web site, you receive a message that is similar to the following:
The software has not passed Windows logo testing and will not be installed.
When you use Microsoft windows update on a Windows XP-based computer, the
update process fails, and you receive a 0x8007f007 error message. This may occur
regardless of what type of update you select.
The Svcpack.log file may contain entries that are similar to the following
Cause
These problems may occur in any of the following situations:
The Enable trusted publisher lockdown Group Policy setting is turned on, and you
do not have the appropriate certificate in your Trusted Publishers certificate store.
This Group Policy setting is located under User Configuration, under Windows
Settings, under Internet Explorer Maintenance, under Security, under
Authenticode Settings in the Group Policy MMC snap-in.
You are installing Internet Explorer 6 SP1, and the 823559 (MS03-023) security
update is installed.
The software distribution folder is corrupted.
1. Click Start, click Run, type cmd in the Open box, and then click OK.
7 Note
On a Windows Vista-based computer, click Start, type cmd in the Start Search
text box, right-click cmd.exe, and then click Run as administrator.
2. At the command prompt, type the following command, and then press Enter:
Console
1. Download the Microsoft product update that you want to install from the
Microsoft Download Center, from the Windows Update Catalog, or from the
Microsoft Update.
For more information about how to download product updates from the Microsoft
Download Center, view how to obtain Microsoft support files from the Online
Services Catalog .
For more information about how to download product updates from the Windows
Update Catalog, view how to download updates that include drivers and hotfixes
from the Windows Update Catalog .
3. Right-click the KB Number.cat file from the product update package in the
temporary folder you created in step 2, and then click Properties.
7 Note
The KB Number.cat file may be in a subfolder. For example, the file may be in
the C:\824146\sp1\update folder or in the C:\824146\sp2\update folder.
4. On the Digital Signatures tab, click the digital signature and then click Details.
7. Click Place all certificates in the following store, and then click Browse.
4. On the General tab, make sure that the Valid from dates are 1/10/1997 to
12/31/2020.
5. On the Certification Path tab, verify that This certificate is OK appears under
Certificate Status.
7. On the General tab, make sure that the Valid from dates are 5/11/1997 to
1/7/2004.
8. On the Certification Path tab, verify that either This certificate has expired or is
not yet valid or This certificate is OK appears under Certificate Status.
7 Note
Although this certificate is expired, the certificate will continue to work. The
operating system may not work correctly if the certificate is missing or
revoked. For more information, view Required trusted root certificates.
9. Click OK, and then double-click the GTE CyberTrust Root certificate. You may have
more than one of these certificates with the same name. Check the certificate that
has an expiration date of 2/23/2006.
10. On the General tab, make sure that the Valid from dates are 2/23/1996 to
2/23/2006.
11. On the Certification Path tab, verify that This certificate is OK appears under
Certificate Status.
7 Note
Although this certificate is expired, the certificate will continue to work. The
operating system may not work correctly if the certificate is missing or
revoked.
13. On the General tab, make sure that the Valid from dates are 12/31/1996 to
12/31/2020.
14. On the Certification Path tab, verify that This certificate is OK appears under
Certificate Status.
1. Click Start, click Run, type cmd, and then click OK.
2. At the command prompt, type the following commands. Press Enter after each
command.
Console
%systemroot% \system32\CatRoot{127D0A1D-4EF2-11D1-8608-
00C04FC295EE}
%systemroot% \system32\CatRoot{F750E6C3-38EE-11D1-85E5-
00C04FC295EE}
If no files that start with tmp exist in this folder, do not remove any other files. The
.cat files in this folder are necessary for installing hotfixes and service packs.
) Important
4. Delete all the oem*.* files from the %systemroot% \inf folder.
7 Note
2. In the Services (Local) pane, right-click Automatic Updates, and then click Stop.
4. Select all the contents of the Windows distribution folder, and then delete them.
7 Note
5. Make sure that the Windows distribution folder is empty, and then maximize the
Services (local) window.
6. In the Services (Local) pane, right-click Automatic Updates, and then click Start.
7. Restart the computer, and then run Windows Update again.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides workarounds for an issue in which Windows Server 2019 can't be
installed on servers with a high processor count.
When you install Windows Server 2019 on servers with a high processor count, the
installation fails at the setup stage, and you encounter the following issues:
In the memory dump file, "USB Port Reset Failures" occur on the port with the CD-ROM.
This is a known limitation when installing Windows Server 2019 on servers that have the
latest processor with a high processor count.
Feedback
Was this page helpful? Yes No
This article describes an issue where the CBS.log file records entries when a static file
changes. Because the static file isn't protected by the Windows Resource Protection
feature, the feature reports the change in the CBS.log file.
Symptoms
You run the System File Checker (SFC) utility (Sfc.exe) to scan for changes in Windows
system files in a Windows Server 2008-based computer. When you run the SFC utility,
you may receive the following message:
All files and registry keys listed in this transaction have been successfully repaired.
However, when you view the %windir%\Logs\CBS\CBS.log file that the Sfc.exe program
generates, you may see the following entries:
Cause
Static files and mutable files are the two kinds of files that are defined in the system.
Static files can't be changed. Mutable files can be changed. Registry files and log files
are examples of mutable files. The Windows Resource Protection (WRP) feature doesn't
scan mutable files. The WRP feature scans static files when the SFC utility scans the
computer. The WRP feature helps protect most of the static files. However, in this case,
the WRP feature doesn't protect the Img11.jpg static file. If a static file changes when
the WRP feature scans the file, the change is recorded in the CBS.log file. Because the
WRP feature doesn't protect the Img11.jpg static file, the WRP feature has no option
other than to report the change in the CBS.log file.
More information
The Sfc.exe program writes the details of each verification operation and of each repair
operation to the CBS.log file. Each SFC.exe program entry in the CBS.log file has an [SR]
tag.
7 Note
The Windows Modules Installer service also writes to the CBS.log file. The Windows
Modules Installer service installs optional features, updates, and service packs.
You can search for [SR] tags to help locate SFC.exe program entries. To search for [SR]
tags and to redirect the search results to a text file, follow these steps:
1. Click Start, type cmd in the Start Search box, right-click cmd in the Programs list,
and then click Run as administrator.
2. At the command prompt, type the following command, and then press ENTER:
Console
The Sfcdetails.txt file includes the entries that are logged every time that the
SFC.exe program runs on the computer.
3. Type exit, and then press ENTER to close the Command Prompt window.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes System File Checker (Sfc.exe), which is a command-line utility used
with the Windows File Protection (WFP) feature.
Summary
System File Checker gives an administrator the ability to scan all protected files to verify
their versions. If System File Checker discovers that a protected file has been
overwritten, it retrieves the correct version of the file from the cache folder
( %Systemroot%\System32\Dllcache ) or the Windows installation source files, and then
replaces the incorrect file. System File Checker also checks and repopulates the cache
folder. You must be logged on as an administrator or as a member of the Administrators
group to run System File Checker. If the cache folder becomes damaged or unusable,
you can use the sfc /scannow , the sfc /scanonce , or the sfc /scanboot commands to
repair its contents.
/Scannow : Scans all protected system files immediately and replaces incorrect
versions with correct Microsoft versions. This command may require access to the
Windows installation source files.
/Scanonce : Scans all protected system files one time when you restart your
computer. This command may require access to the Windows installation source
files when you restart the computer. The SfcScan DWORD value is set to 2 in the
following registry key when you run this command:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
/Scanboot : Scans all protected system files every time you start your computer.
This command may require access to the Windows installation source files every
time you start your computer. The SfcScan DWORD value is set to 1 in the
following registry key when you run this command:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
/Revert : Returns scan to the default setting (do not scan protected files when you
start the computer). The default cache size is not reset when you run this
command. This command is equivalent to the /Enable switch in Windows 2000.
/Purgecache : Purges the file cache and scans all protected system files
immediately. This command may require access to the Windows installation source
files.
/Cachesize=x : Sets the file cache size to x megabytes (MB). The default size of the
cache is 50 MB. This command requires you to restart the computer, and then run
the /purgecache command to adjust the size of the on-disk cache. This command
sets the SfcQuota DWORD value to x in the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
For more information about the Windows File Protection feature, see Description of the
Windows File Protection feature .
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides some information about Windows Server Update Services 3.0
Service Pack 1 package.
Introduction
Microsoft has released a service pack for Microsoft Windows Server Update Services 3.0
(WSUS). This article includes information about how to obtain the service pack and how
to obtain a list of issues that the service pack fixes. Additionally, this article includes
information about the issues that you may experience when you install the service pack
and information about how to determine whether the service pack is installed.
More information
For more information about how to download Microsoft support files, click the following
article number to view the article in the Microsoft Knowledge Base:
119591 How to obtain Microsoft support files from online services Microsoft scanned
this file for viruses. Microsoft used the most current virus-detection software that was
available on the date that the file was posted. The file is stored on security-enhanced
servers that help prevent any unauthorized changes to the file.
Removal information
You cannot use Add or Removed Programs in Control Panel to remove only WSUS 3.0
Service Pack 1 because it will remove all of WSUS 3.0 as well.
Issues that the service pack fixes
Bulk approval of updates now does not overwrite existing approvals. Instead, bulk
approval now updates to a new target group. Bulk approval does not overwrite the
existing approvals of the old target groups. By default, bulk approval will add to
the existing set of approvals for an update that is not approved.
7 Note
We recommend that you use the WSUS APIs to "optionally" approve updates
for WSUS 3.0 SP1 and to approve updates that are not critical updates or
security updates.
For example, assume that you have a required approval on Update X for Group A
and an optional approval for Group B. If a computer belongs to both Group A and
Group B, the update would be listed as optional on the client computer. Because
the target groups are at the same level, required approval should always "win."
The Configuration Wizard keeps a proxy server password if one is set before
upgrade.
Support is provided for a separate proxy server and port for SSL traffic.
The Add Printer Wizard now works when you receive lots of drivers from Windows
Update.
Includes all the hotfixes that have been issued since the release of WSUS 3.0.
7 Note
In Windows Server 2008, you must enable dynamic compression for Internet
Information Services (IIS).
An upgrade occurs for all earlier versions of WSUS starting with WSUS 2.0 through
the original version of WSUS 3.0. The original version of WSUS 3.0 runs on
computers that are running Windows Server 2003 SP1 or later versions.
All upgrades require user interaction.
This service pack package supersedes previous updates for WSUS 3.0.
Upgrades of all WSUS installations that use remote SQL Server installations are
blocked. This is now a manual upgrade process.
Upgrades of earlier versions of WSUS that are running on Windows Server 2008
are not supported.
The original version of System Center Essentials 1.0 is not upgraded to WSUS 3.0
SP1. This will be handled by a future release of System Center Essentials.>
7 Note
"WSUS 2.0 SP1" and "WSUS 2.0 Client SelfUpdate Update for WSUS 2.0 SP1"
packages will be expired. These updates are still available on the following
Microsoft Web site: https://www.microsoft.com/download/Search.aspx
Symptoms
During the installation of this package, you may receive an error message that
resembles the following in the %temp%\Wsussetup.log file:
Cause
This problem occurs because a Simple Mail Transfer Protocol (SMTP) password that is
greater than 11 characters fails. This causes the WSUS 3.0 SP1upgrade to fail. WSUS
does not copy its local copy of the password.
Workaround
To work around this issue, temporarily change the locally saved password, run the WSUS
3.0 SP1 upgrade, and then change the password back to the original password that is
used by the SMTP account. To do this, follow these steps:
1. Click Start, click Administrative Tools, and then click Microsoft Windows Update
Server Services 3.0.
2. Click to select Options, and then click E-Mail notification.
3. On the E-Mail Server tab, enter a password that is less than 12 characters.
4. Click OK to save the password.
7 Note
Do not use Test because this password would be invalid for the SMTP account. 5.
Exit the WSUS Administration tool. 6. Run the WSUS 3.0 SP1 upgrade. 7. After you
successfully upgrade to WSUS 3.0 SP1, change the password back to the original
password.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue that triggers an error when you restart a
Windows Server 2012 R2-based computer after you install updates.
Symptoms
Consider the following scenario:
You try to install many updates from Windows Update. This includes update
3000850.
You're using a native 4K sector disk as a system drive.
However, after the update installation process finishes and the computer is restarted,
you may receive one of the following error messages:
7 Note
Cause
During the installation process, all the file operations (copy, move, and delete, for
example) must be transactional. However, if there are lots of files to process, the
transaction log may become full. In this situation, transactions are reverted, and the
error message is displayed.
Workaround
If you haven't installed the updates yet, you can work around this issue by increasing the
transaction log size. To do this, open cmd.exe as an administrator, and then run the
following command:
Console
7 Note
This command increases the maximum number of containers for the boot drive
(drive C) to 100. (The default value is 20.) If you set the value to 100 and still
experience the same error, you may want to try a higher number.
If you've already experienced the issue that's described in the Symptoms section, you
can recover from the issue by following these steps:
1. While the error message is displayed, press the power button to turn off the
computer.
2. Press the power button and then immediately press the F8 key. This displays the
Advanced Boot Options menu.
Console
References
Microsoft support policy for 4K sector hard drives in Windows
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which you receive error code 2359302 when
installing updates in Windows Server 2019.
When you install updates in Windows Server 2019, you receive the 2359302 error in the
Windows Setup event log under Event Viewer. For example:
Windows update could not be installed because of error 2359302 "" (Command line:
""C:\Windows\system32\wusa.exe" "C:\temp\windows10.0-kb5027222-x64
5802ce76528f37a5abbd6bde65549a9bad98acfc.msu" ")
7 Note
In the Component Based Servicing (CBS) registry key, the updates are displayed under
the PendedSessionPackages registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based
Servicing\PendedSessionPackages
Uninstall all pending updates and delete the
pending transactions
To resolve this issue, follow these steps:
2. Run the list volume command to list all volumes and find the OS disk. For example,
the D volume is the OS disk in the following screenshot:
3. Navigate to the transaction folder and show hidden files by running the following
commands:
Console
cd D:\Windows\System32\Config\TxR\
attrib -h -r -s
dir
4. Back up the transaction files by running the following commands:
Console
mkdir backup
copy *.* backup
dir backup
dir
del *.blf
del *.regtrans-ms
6. Navigate to the WinSxS folder and rename the pending.xml file by running the
following commands:
Console
cd D:\Windows\WinSxS\
ren pending.xml pending.xml.old
7. In Registry Editor, select the HKEY_LOCAL_MACHINE registry key, and then select File >
Load Hive.
C:\Windows\System32\config
9. Delete the ExecutionState and PendingXmlIdentifier registry values (if they exist)
from the following registry key:
HKEY_LOCAL_MACHINE\COMPONENTS
Console
Output
11. Restart the system, and you'll receive the following message:
Console
Feedback
Was this page helpful? Yes No
Provide product feedback
ERROR_INVALID_DATA error at startup
after installing updates
Article • 02/19/2024
This article helps resolve an issue in which you receive the "ERROR_INVALID_DATA" error
at the system startup after installing Windows updates.
After you install an update and restart the system, the system performs a rollback at the
system startup, and you receive the "ERROR_INVALID_DATA" error.
PowerShell
cd C:\Windows\system32\wbem
2. Run the following wmiadap cmdlet to parse all the performance libraries:
PowerShell
C:\Windows\system32\wbem>wmiadap.exe /f
3. Run the following lodctr cmdlet to rebuild the performance counter setting:
PowerShell
C:\Windows\system32\wbem>lodctr /r
Then, you receive the following message if the cmdlet runs successfully:
Output
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which Windows Update fails with error 0x800705aa.
You can also find the following error by searching "Failed to load the COMPONENTS
hive" in CBS.log (C:\Windows\Logs\CBS):
7 Note
This allows the operating system to automatically set the registry size as needed.
We recommend deleting the registry key unless it's specifically required.
Feedback
Was this page helpful? Yes No
This article discusses how to fix Windows activation error 0x80070005 (access denied).
Applies to: Windows Server, all versions, and Windows client, all versions
Symptoms
You run the slmgr /ato command to activate a domain-joined computer that's running
Windows. However, Windows doesn't activate, and you receive the following error
message:
Output
Cause
The SELF account doesn't have the correct DCOM permissions.
1. In the Search box, type dcomcnfg, and then select Component Services
(depending on your version of Windows, you might have to select dcomcnfg Run
command instead).
2. In the left pane of the Component Services snap-in, select Component Services >
Computers, right-click My Computer, and then select Properties.
3. In the My Computer Properties dialog box, select the COM Security tab, and then
select Edit Default in the Access Permissions area.
4. In the Access Permission dialog box, if SELF doesn't appear in the Group or user
names area, select Add. In the Enter the object names to select text box, type
SELF, select Check Names, and then select OK.
5. In the Group or user names area, select SELF, and then select the following
checkboxes in the Allow column:
Local Access
Remote Access
This article helps fix the error 0xC004E015 that occurs when you activate Windows.
To resolve the issue, rebuild the tokens.dat file and activate Windows again.
More information
Normally, Windows can create a tokens.dat file. If you get an "Error: Product not found"
error, run the following commands to reapply the Key Management Services (KMS)
client key:
Console
7 Note
You can get the <KMS Client Key> in Key Management Services (KMS) client
activation and product keys depending on your Windows version.
Feedback
Was this page helpful? Yes No
Provide product feedback
Error 0x800f0922 caused by corrupted
scheduled task when installing Windows
updates
Article • 02/19/2024
This article helps resolve the 0x800f0922 (CBS_E_INSTALLERS_FAILED) error that occurs
when installing Windows updates.
Output
In the Task Scheduler event log, you see the following entries:
Output
PowerShell
Dism /english /online /get-packages /format:table | findstr /i
"Staged"
2. Delete the staged update packages by running the remove-package cmdlet. For
example:
PowerShell
PowerShell
Output
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBo
otEncodeUEFI
ID REG_SZ {<GUID>}
7 Note
PowerShell
For more information about how to clean up corrupted tasks, see MS10-092:
Vulnerability in Task Scheduler could allow for elevation of privilege .
Feedback
Was this page helpful? Yes No
This article helps to fix the error 0x800f0922 that occurs when the Microsoft Multipath
I/O (MPIO) feature installation fails.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1
Original KB number: 3008079
Symptoms
When you try to install the MPIO feature by using the graphical user interface (GUI) or
Windows PowerShell, you receive the following error message:
Also, the following information is logged in the device installation text log
(SetupAPI.dev.log):
Cause
This issue occurs because of some stale entries in the registry key for the MPIO feature.
Resolution
To resolve this issue, remove the following key from the registry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\MPIO\0001
Status
Microsoft has confirmed that this is a problem in the Microsoft products listed at the
beginning of this article.
Explanation of the error codes
ノ Expand table
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article discusses an issue where converting Windows Server Core to GUI by using a
DISM or PowerShell command fails with error 0x800f0906.
Symptoms
This issue occurs when you run a DISM command, an equivalent Windows PowerShell
command, or another similar method to convert to GUI.
The DISM command that is used for conversion contains the following switches:
/featurename:Server-Gui-Shell
You receive one of the following information clusters on the command prompt:
Console
Information for the DISM command that continues to run for a long time without
stopping:
Console
7 Note
The progress bar on the command prompt always remains at 66.7%. The size of the
CBS.log file that is under the %windir%\logs\cbs path will continue to increase.
Error 1
Error 2
7 Note
The updates that appear during the error may different. The cause of these errors is
in the CBS component and the index file, not the updates themselves. The sample
output and the list of updates that are mentioned in the error are based on internal
testing of a default but updated Windows Server 2012 R2 Core installation that has
no additional features or roles enabled.
Local testing shows that presence of the following updates on the Core server will cause
the conversion to fail with the DPX Extraction 0x80070002 errors:
3000850
3003057
3014442
2919355
2959977
7 Note
To see sample values for updateID, open the wuindex.xml file under the
%windir%\servicing\packages path, and search for the updateID string.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article helps fix the error 0x800f0922 that occurs when you uninstall Microsoft
Windows Server roles or features.
Symptoms
When you try to uninstall a Windows Server role or feature by using Server Manager or
the PowerShell cmdlet Uninstall-WindowsFeature , the attempt fails, and you receive
error code 0x800f0922 and the following error message:
CBS_E_INSTALLERS_FAILED
Processing advanced installers and generic commands failed
For example, when uninstalling Windows Deployment Services (WDS), the following
errors were logged in the CBS.log under C:\Windows\Logs\CBS :
Cause
This issue can occur if there are more than 65,000 files in the Windows Temp directory.
The Windows Temp directory is located at C:\Windows\Temp . Check Windows
environment variables to confirm the location of the Windows Temp directory.
Resolution
To resolve the problem, delete the contents of the Windows Temp folder (normally
C:\Windows\Temp ), and then again try to remove the Windows Server role or feature.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article helps fix the "Failed to be changed to the Absent state. Status: 0x800f0922"
error when installing updates in Windows Server 2019.
You receive the error code 0x800f0922 when you try to install an update in Windows
Server 2019. For example:
In the CBS.log file, you see the following entries with a failed status by searching
completion status , and the package fails to be changed to the Absent state:
Output
In the log file, the error code 1058 indicates that the HTTP service can't be started
because it's disabled or there's no enabled device associated with it.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when the Network Service
account doesn't have permissions to the SoftwareProtectionPlatform folder.
Applies to: Windows Server 2008 R2 Service Pack 1, Windows Server 2012 R2
Original KB number: 3033200
Symptoms
You may frequently receive the following event in the Application log for the Software
Protection service:
Cause
The issue may occur if one or more of the following conditions are true:
Resolution
To resolve this issue, follow these steps:
and then verify that the NETWORK SERVICE account has Read permissions for that
folder.
5. Restart the Software Protection service if it's running.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to fix the error 0x80004005 that occurs when you install
or start the Network Policy Server role service.
Symptoms
When you try to install or start the Network Policy Server role service on a computer
that is running Windows Server 2008 R2, the role is not installed, or the service is not
started. Additionally, you receive an error message that resembles the following:
Windows could not start the Network Policy Server service on Local Computer. Error
0x80004005 Unspecified error
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base: 322756 How to back up and restore the registry in Windows
1. Start Registry Editor. To do this, click Start, type regedit in the Start Search box,
and then press ENTER.
If you are prompted for an administrator password or for confirmation, type the
password or provide confirmation.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article offers you advanced manual methods to fix problems that prevent Windows
Update from installing successfully by using the System Update Readiness Tool or the
Deployment Image Servicing and Management (DISM) tool.
7 Note
This article is intended for use by support agents and IT professionals. If you're
home users and looking for more information about fixing Windows update errors,
see Fix Windows Update errors .
ノ Expand table
For example, an update might not install if a system file is damaged. The DISM or
System Update Readiness tool may help you fix some Windows corruption errors.
Check this page for Windows Update troubleshooting scenarios.
7 Note
The solution mentioned in this section applies to Modern Windows versions like
Windows 11, Windows 10, Windows Server 2016, or later. For Windows 7 and
Windows Server 2008 R2, check Solution 2: Use the System Update Readiness
tool.
To resolve this problem, use the DISM tool. Then, install the Windows update or service
pack again.
1. Open an elevated command prompt. To do this, open the Start menu or Start
screen, type Command Prompt, right-click Command Prompt, and then select Run
as administrator. If you're prompted for an administrator password or for a
confirmation, type the password, or select Allow.
2. Type the following command, and then press Enter. It may take several minutes for
the command operation to be completed.
Console
) Important
When you run this command, DISM uses Windows Update to provide the files
that are required to fix corruptions. However, if your Windows Update client is
already broken, use a running Windows installation as the repair source, or
use a Windows side-by-side folder from a network share or from a removable
media, such as the Windows DVD, as the source of the files. To do this, run the
following command instead:
Console
3. Type the sfc /scannow command and press Enter. It may take several minutes for
the command operation to be completed.
4. Close the command prompt, and then run Windows Update again.
DISM creates a log file (%windir%/Logs/CBS/CBS.log) that captures any issues that the
tool found or fixed. %windir% is the folder in which Windows is installed. For example,
the %windir% folder is C:\Windows.
7 Note
The solution mentioned in this section is applicable for Windows 7 and Windows
Server 2008 R2. For Modern Windows versions like Windows 11, Windows 10,
Windows Server 2016, or later, check Solution 1: Use DISM.
To resolve this problem, use the System Update Readiness tool. Then, install the
Windows update or service pack again.
Go to Microsoft Update Catalog and download the tool that corresponds to the
version of Windows that's running on your computer. For more information about
how to find the version of Windows that you installed, see Find out if your
computer is running the 32-bit or 64-bit version of Windows .
7 Note
This tool is updated regularly, and we recommend that you always download
the latest version. This tool isn't available in every supported language.
To install the tool immediately, select Open or Run, and then follow the
instructions on your screen.
To install the tool later, select Save, and then download the installation file
to your computer. When you're ready to install the tool, double-click the
file.
3. When the tool is installed, it automatically runs. Although it typically takes less
than 15 minutes to run, it might take much longer on some computers. Even if the
progress bar seems to have stopped, the scan is still running, so don't select
Cancel.
To manually fix corruption errors that the tool detects but can't fix, see How to fix errors
that are found in the CheckSUR log file.
For example, you may have problems when you try to install updates from Windows
Update. In this situation, you can download the update package and try to install the
update manually. To do this, follow these steps:
2. Find the update that applies to your operating system appropriately in the search
results, and then select the Download button.
5. Open the folder, and then double-click the update package to install the update.
When the System Update Readiness tool detects incorrect manifests, Cabinets, or
registry data, it may replace the incorrect data with a corrected version.
Logging
The System Update Readiness tool creates a log file that captures any issues that the
tool found or fixed. The log file is located here:
%SYSTEMROOT%\Logs\CBS\CheckSUR.log
%SYSTEMROOT%\Logs\CBS\CheckSUR.persist.log
1. Open %SYSTEMROOT%\Logs\CBS\CheckSUR.log.
7 Note
2. Identify the packages that the tool can't fix. For example, you may find the
following information in the log file:
Output
Summary:
servicing\packages\Package_for_KB958690_sc_0~31bf3856ad364e35~amd64~~6.
0.1.6.mum
...
If you're a technical professional, see How to fix errors found in the CheckSUR.log for
another option on fixing errors in the CheckSUR.log.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes how to block user access to Windows Update on Windows Server.
Symptoms
The default settings in Windows Server allow user who is not an administrator to scan
for and apply Windows Updates. Administrators may want to change this setting to limit
access to Windows Updates, especially in Remote Desktop Services Host deployments.
More Information
To change this setting, use the Group Policy "Remove access to use all Windows update
features." The full path to this Group Policy is:
Computer Configuration\Administrative Templates\Windows Components\Windows
update\Remove access to use all Windows update features
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes how to use the Recovery Console on a computer that does not
start.
Summary
This step-by-step article describes how to use Recovery Console to recover a Windows
Server 2003-based computer that does not start.
The Recovery Console is a command-line tool that you can use to repair Windows if the
computer does not start correctly. You can start the Recovery Console from the
Windows Server 2003 CD, or at startup, if you previously installed the Recovery Console
on the computer.
7 Note
1. Configure the computer to start from the CD or the DVD drive. For more
information, see the computer documentation or contact the computer
manufacturer.
5. When the Welcome to Setup screen appears, press the R key to start the Recovery
Console.
6. Select the Windows installation that you must access from the Recovery Console.
7. Follow the instructions that appear on the screen, type the Administrator
password, and then press ENTER.
For a list of commands that are available in the Recovery Console, type
help at the command prompt, and then press ENTER.
7 Note
Alternatively, you can install the Recovery Console as a startup option on the
computer so that it is always available. For information about how to do so,
see the Precautionary Measures section in this article.
Batch executes commands that you specify in the text file, InputFile. OutputFile
holds the output of the commands. If you omit the OutputFile argument, output is
displayed on the screen.
Bootcfg is used for boot configuration and recovery. You can use the bootcfg
command to make changes to the Boot.ini file.
Copy copies one file to a target location. By default, the target cannot be
removable media, and you cannot use wildcard characters. Copying a compressed
file from the Windows Server 2003 installation CD automatically decompresses the
file.
Del (delete) deletes one file. Del operates in the system directories of the current
Windows installation, in removable media, in the root directory of any hard disk
partition, or in the local installation sources. By default, you cannot use wildcard
characters.
Dir displays a list of all files, including hidden and system files.
Console
SERVICE_BOOT_START
SERVICE_SYSTEM_START
SERVICE_AUTO_START
SERVICE_DEMAND_START
Exit quits the Recovery Console and then restarts the computer.
Expand expands a compressed file. The source argument is the file that you want to
expand. By default, you cannot use wildcard characters. The destination argument
is the directory for the new file. By default, the destination cannot be removable
media and cannot be read-only. You can use the attrib command to remove the
read-only attribute from the destination directory. The option /f:filespec is
required if the source contains more than one file. This option permits wildcard
characters. The /y switch disables the overwrite confirmation prompt. The /d switch
specifies that the files should not be expanded and displays a directory of the files
in the source.
Fixboot writes a new boot sector on the system partition. The fixboot command
Fixmbr repairs the boot partition's master boot record (MBR). The device-name
argument is an optional name that specifies the device that requires a new MBR.
Omit this variable when the target is the boot device. The fixmbr command is only
supported on x86-based computers.
Format formats a disk. The /q switch performs a quick format. The /fs: file-system
switch specifies the file system.
Help lists all the commands that the Recovery Console supports. For more
information about a specific command, type help
command-name or
command-name /? .
Ren (rename) renames a single file. The command operates only in the system
directories of the current Windows installation, in removable media, in the root
directory of any hard disk partition, or in the local installation sources. You cannot
specify a new drive or path as the target.
Precautionary Measures
You can install the Recovery Console on a working computer so that it is available to use
if you cannot start Windows. This precautionary measure can save you time if you must
use the Recovery Console.
7 Note
1. While Windows is running, insert the Windows Server 2003 CD in the computer's
CD or DVD drive.
To install Recovery console as a startup option for Windows Server 2003 x64
edition, type the following line:
**drive: \amd64\winnt32.exe /cmdcons
4. Click Yes when the message appears, to install the Recovery Console.
5. When you receive the message that states that the Recovery Console is
successfully installed, click OK.
6. To use the Recovery Console, restart the computer, and then use the ARROW keys
to select Microsoft Windows Recovery Console in the Please select the operating
system to start list.
3. Turn on the Show hidden files and folders option (if it is not already turned on). To
do so, follow these steps:
a. On the Tools menu, click Folder Options.
b. Click the View tab.
c. Click Show hidden files and folders, click to clear the Hide protected operating
system files (Recommended) check box (if it is selected), and then click OK.
4. Double-click the drive letter that represents the hard disk on which you installed
the Recovery Console.
5. Delete the Cmdcons folder from the root folder, and then delete the Cmldr file. To
do so, follow these steps:
a. Right-click Cmdcons, and then click Delete. Follow the instructions that appear
on the screen, and then click Yes to confirm the deletion.
b. Right-click Cmldr, and then click Delete. Follow the instructions that appear on
the screen, and then click Yes to confirm the deletion.
6. Remove the Recovery Console entry from the Boot.ini file. To do so, follow these
steps.
2 Warning
Incorrectly modifying the Boot.ini file may prevent your computer from
restarting. Make sure that you delete only the entry for the Recovery Console.
a. At the root folder, right-click the Boot.ini file, and then click Properties. Click to
clear the Read-only check box, and then click OK.
c. Locate the Recovery Console entry, and then delete it. The Recovery Console
entry looks similar to the following line:
C:\cmdcons\bootsect.dat="Microsoft Windows Recovery Console" /cmdcons
d. On the File menu, click Save, and then click Exit to quit Notepad.
7. Change the attribute for the Boot.ini file back to Read-only. To do so, right-click
Boot.ini, and then click Properties. Click to select the Read-only check box, and
then click OK.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides some steps for installing the Microsoft Product Support Reporting
Tool for Microsoft Software Update Services.
Summary
This article describes how to install the Microsoft Product Support Reporting Tool for
Microsoft Software Update Services. The Microsoft Product Support Reporting Tool (also
known as MPS_REPORTS) is a compressed software package that contains scripts and
utilities that you can use to capture critical system, diagnostic, and configuration
information about your computer. This tool includes the Software Update Services
edition that is described in this article and other editions that are designed for specific
support issues.
More information
You can use the Microsoft Product Support Reporting Tool for Software Update Services
to gather detailed information about the current configuration of a computer. The
information you collect helps a Microsoft Support Professional isolate the problem.
The Microsoft Product Support Reporting Tool for Software Update Services works on
Windows Server 2003, Windows XP, Windows 2000, and Windows NT 4.0. When the tool
runs, it detects the Windows operating system that is installed to determine which
commands it will use to collect information. The reporting tool does not change any
registry entries and does not modify the operating system.
2. Double-click the copy of Mpsrpt_sus.exe that you saved to your computer, and
then click Yes to accept the End User License Agreement (EULA).
7 Note
Be patient while the tool collects information. The tool may stop responding
for five to fifteen minutes.
3. The tool creates a .cab file named Computer_name MPSReports Date.cab in the
System_root\MPSReports\Msus\Cab folder. The .cab file contains the reports that
are generated by the Microsoft Product Support Reporting Tool. If the .cab file is
not created, copy all the files in the System_root\MPSReports\Msus folder to a
compressed (zipped) file.
7 Note
The System_root folder is the folder where you installed the operating system.
Typically, this folder is the C:\Winnt folder or the C:\Windows folder.
4. Send the .cab file or compressed (zipped) file to your Microsoft Support
Professional using the e-mail address the Microsoft Support Professional provides.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article lists problems that are fixed in Microsoft Windows Server 2003 Service Pack 2
(SP2).
Summary
Service packs are cumulative. Which means that the problems that are fixed in a service
pack are also fixed in later service packs.
This article contains a reference to the Maintenance Decision Support System (MDSS)
utility, which is a utility that Microsoft Support provides as-is and doesn't support.
Microsoft makes no warranty, implied or otherwise, about the performance or reliability
of the MDSS utility.
More information
This article contains a list of Microsoft Knowledge Base (KB) articles that describe the
fixes and updates that are contained in Microsoft Windows Server 2003 Service Pack 2
(SP2).
For more information about Windows Server 2003 SP2, see Release Notes for Microsoft
Windows Server 2003 Service Pack 2.
7 Note
ノ Expand table
925104 The System log reports many "PerfOS event ID: 2001" errors when Admin Tools
you use a Microsoft Windows Server 2003-based computer that has
more than 32 processors
902400 MS05-051: Vulnerabilities in MS DTC and COM+ could allow remote COM+
code execution
910695 FIX: You cannot obtain detailed error information about DCOM COM+
10009 errors in Windows Server 2003
244139 Windows feature lets you generate a memory dump file by using Drivers
the keyboard
898544 FIX: You cannot burn a CD or a DVD on a computer that is running Drivers
Windows Server 2003
921883 MS06-040: Vulnerability in Server service could allow remote code Distributed
execution Systems (DS)
922582 Error message when you try to update a Microsoft Windows-based File Systems
computer: "0x80070002"
896358 MS05-026: A vulnerability in HTML Help could allow remote code Help
execution
917557 FIX: You may experience slow performance when you use Integrated IIS 6.0
Windows authentication together with the Kerberos authentication
protocol in IIS 6.0
899812 You receive a "Internet Explorer has encountered a problem and Internet
needs to close" error when you use Internet Explorer 6 to view a Explorer
Web page that hosts an ActiveX control
Article Article title Category
number
904942 Authentication fails when you use Outlook or Outlook Express to try Security
to log on to a HTTP-based mail server if you use Internet Explorer
version 7.0
919557 You receive pre-authentication errors when you use keytab files that Security
are generated by using the Ktpass.exe tool on a Windows Server
2003 SP1-based computer
922706 How to use Certificate Services Web enrollment pages together with Security
Windows Vista
824995 Windows starts and ends daylight saving time incorrectly if the time Shell
zone is set to (GMT+02:00) Cairo
901115 A Terminal Services client computer may make beep sounds after Terminal
you connect to a Windows Server 2003 Service Pack 1-based Server
computer
902346 FIX: Error messages when you use a Windows Management WMI
Instrumentation (WMI) query to register WMI events on a computer
that is running Windows Server 2003 or Windows XP: "0x80041032"
and "0x80041003"
This service pack also includes the fixes and the updates that are contained in Windows
Server 2003 Service Pack 1 (SP1).
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides the steps to re-register a Windows client/server in Windows Server
Update Services (WSUS).
Summary
This article will help you to re-register a Windows client/server in WSUS.
Tips
To re-register a Windows client/server in WSUS, review the following instructions:
Tip
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where SystemInfo.exe can't display all
installed updates.
Symptoms
When using SystemInfo.exe in Windows Server 2003 to display a list of installed hotfixes,
some hotfixes may not be listed if over 200 are installed.
Cause
There is a buffer size limitation that does not allow all system update hotfixes to be
displayed.
Workaround
Microsoft is currently aware of this issue. To work around this issue, run the following
command at a Windows command prompt:
Console
More information
Windows Server 2003 is currently at end of life cycle and Service Packs are no longer
being developed for this product. When installing a Service Pack, the number of hotfixes
being shown by the SystemInfo.exe tool is reduced to a much smaller number.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a resolution to an issue where System Partition goes offline after
installing some third-party disk or Storage Management Software.
Symptoms
Issue 1
When installing Hyper-V Role, you may get the following error:
Process output: [l:100 [100]"The boot configuration data store could not be
opened. The system cannot find the file specified."][gle=0x80004005]
Issue 2
When you run Cluster validation, Storage validation fails, under Cluster Validation
Reports we can see the following error:
List all disks visible to one or more nodes (including non-cluster disks).
Prepare storage for testing
Preparing storage for testing on node Node1.contoso.com
Preparing storage for testing on node Node1
Failed to prepare storage for testing on node Node1 status 87
Failed to prepare storage for testing on node Node1 status 87
Issue 3
When you run Bcdedit /enum all , you get the following error:
The boot configuration data store could not be opened. The system cannot
find the file specified."
Cause
If some third-party storage disk or Storage Management software is installed, it may
bring all the volume without drive letter offline.
Resolution
To solve this issue, use one of the following methods:
Console
C:\\>Diskpart
C:\Diskpart> List volume
C:\Diskpart> Select volume 1 (Considering this is 100-MB system
partition)
c:\Diskpart> Online volume
C:\Diskpart> exit
From the Disk Management console, assign the drive letter to the 100-MB
partition it should bring the disk online.
To access Disk Management, open command prompt, run the following command:
C:>Diskmgmt.msc
Select the 100-MB volume; Right click on the volume Change drive letter & Path,
assign a drive letter.
Assigning the drive letter will ensure the volume not offline again after a reboot.
The volumes may go offline if AUTOMOUNT is disabled either while using a third
party storage software or if the user manually disabled the AUTOMOUNT for the
volume. To check this, type the DISKPART> automount command after running
diskpart in the administrator command prompt.
Console
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes how to deactivate the kernel mode filter driver without removing
the corresponding software.
) Important
This article contains information that shows you how to help lower security settings
or how to turn off security features on a computer. You can make these changes to
work around a specific problem. Before you make these changes, we recommend
that you evaluate the risks that are associated with implementing this workaround
in your particular environment. If you implement this workaround, take any
appropriate additional steps to help protect your system.
Summary
You may want to deactivate the filter driver when you are troubleshooting the following
issues:
Program errors that occur when you are opening files from network drives or you
are saving files to network drives. For more information about these program
errors, see Slow network performance when you open a file that is located in a
shared folder on a remote network computer .
Event ID 2022 errors messages that occur in the System log, for example:
To disable filter drivers, you must first identify third-party services and their
corresponding filter drivers. After you do this, follow these steps.
2 Warning
This workaround may make your computer or your network more vulnerable to
attack by malicious users or by malicious software such as viruses. We do not
recommend this workaround but are providing this information so that you can
implement this workaround at your own discretion. Use this workaround at your
own risk.
) Important
An antivirus program is designed to help protect your computer from viruses. You
must not download or open files from sources that you do not trust, visit Web sites
that you do not trust, or open e-mail attachments when your antivirus program is
disabled.
For more information about computer viruses, see How to prevent and remove viruses
and other malware .
3. Set the Start registry key of the corresponding filter drivers to 0x4. A value of 0x4
will disable the filter driver. To do this, follow these steps.
) Important
This section, method, or task contains steps that tell you how to modify the
registry. However, serious problems might occur if you modify the registry
incorrectly. Therefore, make sure that you follow these steps carefully. For
added protection, back up the registry before you modify it. Then, you can
restore the registry if a problem occurs. For more information about how to
back up and restore the registry, see How to back up and restore the registry
in Windows .
d. Click the entry for the filter driver that you want to disable.
e. Double-click the Start registry setting, and then set it to a value of 0x4.
7 Note
Most antivirus software uses filter drivers that work together with a service to scan for
viruses. These filter drivers are still loaded after the service is deactivated. These filter
drivers scan files as they are opened and closed on a hard disk. For troubleshooting
purposes, temporarily remove the antivirus software or contact the manufacturer of the
software to determine whether a newer version is available.
Antivirus
Inoculan: INO_FLPY and INO_FLTR
Norton: SYMEVENT, NAVAP, NAVEN, and NAVEX
McAfee (NAI): NaiFiltr and NaiFsRec
Trend Micro: Tmfilter.sys and Vsapint.sys
Backup agent
Backup Agent for Open Files: Ofant.sys
7 Note
Use caution if you disable these filter drivers by using the method that is
described in this article. If you do this, you may receive a stop 0x7b error
message.
The stop 0x7b Inaccessible_Boot_Device error message may occur if the following
registry keys exist and contain references to the Otman5 driver when the
Otman5.sys driver either does not exist on the hard disk or if the driver is set to
disabled.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E967-E325
-11CE-BFC1-08002BE10318}\UpperFilters
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{71A27CDD-812A
-11D0-BEC7-08002BE2092F}\UpperFilters
If you experience the stop 0x7b error message, you should back up these
registry keys and delete the Otman5 reference.
ノ Expand table
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix Roles and Features
related issues.
This guidance is designed to help troubleshoot issues when adding or removing roles
and features in Windows.
Troubleshooting checklist
1. Check errors in the Windows event log, especially the System event log and the
Windows Setup event log. For example, navigate to the following location in Event
Viewer and search for Event IDs in the range of 4000 to 4099.
2. Try to add or remove a different role or feature. This method will help to determine
if the issue is specific to a role or feature.
a. Run the following command to repair the Windows image. For more
information, see Repair a Windows image.
%windir%/Logs/CBS/CBS.log
4. After verifying the component store and fixing any corruption, run the SFC
/scannow command at an elevated command prompt to scan and restore Windows
files. For more information, see Use the System File Checker tool to repair missing
or corrupted system files .
Common support scenarios
See the following list of common issues for scenario-specific guidance:
ノ Expand table
Server Manager is Server Manager can't be used to manage servers that are running a
collecting inventory data. newer version of Windows Server than the version that is running
The wizard will be available Server Manager. For example, Server Manager running in Windows
after data collection 8 as part of Remote Server Administration Tools can't be used to
finishes. manage a server that's running Windows Server 2012 R2.
For more information, see Install or uninstall roles, role services, or features.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix common Windows
Update issues.
Troubleshooting checklist
To troubleshoot this issue, check that the package that you are installing contains newer
versions of the binaries. Alternatively, check that the package is superseded by another
new package.
To troubleshoot this issue, verify that the package that you're trying to install matches
the Windows version that you are using. The Windows version information can be found
in the "Applies To" section of the article for each update. For example, Windows Server
2012-only updates cannot be installed on Windows Server 2012 R2-based computers.
Verify that the package you want to install matches the processor architecture of the
Windows version that you are using. For example, an x86-based update can't be
installed on x64-based installations of Windows.
To troubleshoot this issue, read the package’s related article to find out whether the
prerequisite updates are installed. For example, if you receive the error message in
Windows 8.1 or Windows Server 2012 R2, you might have to install the April 2014
update 2919355 as a prerequisite and one or more pre-requisite servicing updates (KB
2919442 and KB 3173424).
To determine if these prerequisite updates are installed, run this PowerShell command:
get-hotfix KB3173424, KB2919355, KB2919442
If the updates are installed, the command returns the installed date in the InstalledOn
section of the output.
To troubleshoot this issue, check the numeric code provided in the error message code:
this corresponds to the winsock error code. Certificate errors are granular (for example,
cert cannot be verified, cert not authorized, etc.)
1. Check that the device’s updates for the relevant category aren’t paused. See Pause
feature updates and Pause quality updates.
2. Feature updates only: The device might have a safeguard hold applied for the
given feature update version. For more information about safeguard holds, see
Safeguard holds and Opt out of safeguard holds.
3. Check that the deployment to which the device is assigned has the state offering.
Deployments that have the states paused or scheduled won't deploy content to
devices.
4. Check that the device has scanned for updates and is scanning the Windows
Update service. To learn more about scanning for updates, see Scanning updates.
5. Feature updates only: Verify that the device is successfully enrolled in feature
update management by the deployment service. A device that is successfully
enrolled is represented by a Microsoft Entra device resource with an update
management enrollment for feature updates and has no Microsoft Entra device
registration errors.
6. Expedited quality updates only: Check that the device has the Update Health Tools
installed (available for Windows 10 version 1809 or later in the update described in
KB 4023057 - Update for Windows 10 Update Service components , or a more
recent quality update). The Update Health Tools are required for a device to
receive an expedited quality update. The program’s location on the device is
C:\Program Files\Microsoft Update Health Tools.
To verify its presence, view the installed programs list or use this PowerShell script:
PowerShell
1. Check that the device is scanning the Windows Update service and not a different
endpoint. If the device is scanning for updates from a WSUS endpoint, for
example, it might receive different updates. To learn more about scanning for
updates, see Scanning updates.
2. Feature updates only: Check that the device is successfully enrolled in feature
update management by the deployment service. A device that isn't successfully
enrolled might receive different updates according to its feature update deferral
period. A device that is successfully enrolled is represented by a Microsoft Entra
device resource with an update management enrollment for feature updates and
has no Microsoft Entra device registration errors.
WSUS troubleshooting
If you are using WSUS on Windows Server 2012 or a later version, you must have one of
the following Security Quality Monthly Rollups or a later-version rollup installed on the
WSUS server:
7 Note
If you're using Configuration Manager with the software update point installed on a
remote site system server, the WSUS Administration Console must be installed on
the site server. For WSUS 3.0 SP2, KB 4039929 or a later update must also be
installed on the WSUS Administration console. A server restart is required after
installing 4039929 (remotely or locally). Check whether the issue persists after
the restart.
1. Verify that the Update Services service and the World Wide Web Publishing
Service are running on the WSUS server.
2. Verify that the Default website or WSUS Administration website is running on the
WSUS server.
3. Review the IIS logs for the WSUS Administration website (c:\inetpub\logfiles), and
check for errors.
SyncUpdates_WithRecovery failed
To fix the issue, follow these steps on the WSUS server:
2. Type the following commands, and press Enter after each command:
Console
takeown /f web.config
icacls web.config /grant administrator:(F)
notepad.exe web.config
XML
6. Run IISReset .
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Reference
Log files created by Windows Update
Windows Update troubleshooting
Windows Update common errors and mitigation
Troubleshooting issues with WSUS client agents
PowerShell script to decline superseded updates in WSUS
Windows Server Update Services best practices
WSUS client computers restart without any notification
WSUS client takes too long to finish an update scan
Feedback
Was this page helpful? Yes No
This article is designed to help get you started on troubleshooting issues that you might
encounter when you use Windows Update for Business reports.
Troubleshooting checklist
Here's a list of the basic steps to resolve most Windows Update for Business reports
issues:
At a high level, Azure roles control permissions to manage Azure resources, while
Microsoft Entra roles control permissions to manage Microsoft Entra ID resources.
For more information, see Windows Update for Business reports prerequisites:
Permissions.
Verify that at least one device is sending telemetry, especially if you received a
successful save message during enrollment but still haven't seen any data after 48
hours. If no devices are sending telemetry, run the configuration script on the
clients to make sure that they're active and configured correctly.
Verify that the devices are Microsoft Entra joined or Microsoft Entra hybrid joined.
Verify that the devices are turned on, active, and can scan for Windows updates. To
be included in reports, a device must have been active at least one time in the past
28 days.
Make sure that each device has the Allow device name to be sent in Windows
diagnostic data policy enabled.
Check the size of the report. For performance, the default limit for rows in Azure
workbooks is set to 1,000. If your report has more than 1,000 rows, do one of the
following:
Export the report data to Excel to view the whole report.
To view the information in Logs view, select the three-dot icon that's next to the
component of interest.
Check the policy configuration.
7 Note
If you have questions about report content or customization, see Frequently Asked
Questions about Windows Update for Business reports.
At a high level, Azure roles control permissions to manage Azure resources, and
Microsoft Entra roles control permissions to manage Microsoft Entra resources. For
more information, see Windows Update for Business reports prerequisites:
Permissions.
Verify that at least one device is sending telemetry, especially if you received a
successful save message during enrollment but still haven't seen any data after 48
hours. If no devices are sending telemetry, run the configuration script on the
clients to make sure that they're active and configured correctly.
If the preceding solutions don't apply or don't resolve the issue, use the
Configuration flyout of your administrative console to unenroll and re-enroll. Wait
for 24–48 hours. If the issue persists, contact Microsoft Support.
Verify that the devices are Microsoft Entra joined or Microsoft Entra hybrid joined.
Verify that the devices are sending telemetry. If the missing devices aren't sending
telemetry, run the configuration script to make sure that they're active and
configured correctly.
Verify that the devices are turned on, active, and can scan for Windows updates. To
be included in reports, a device must have been active at least one time in the past
28 days.
Check the size of the report. For performance, the default limit for rows in Azure
workbooks is set to 1,000. If your report has more than 1,000 rows, do one of the
following:
Export the report data to Excel to view the whole report.
To view the information in Logs view, select the three-dot icon that's next to the
component of interest.
For more in-depth troubleshooting of missing diagnostic data, see Windows Update for
Business reports: How to troubleshoot diagnostic data transmission.
Feedback
Was this page helpful? Yes No
This article describes why you may be prompted to restart your Microsoft Windows-
based computer after you install a security update.
The security update updates a DLL that is loaded in one or more processes that are
required by Windows. The security update can't be completed while the DLL is
loaded. So the security update must stop the process that causes the DLL to be
loaded. Stopping the process will unload the DLL that is required to complete the
update. However, the process in which the DLL is loaded can't be stopped while
Windows is running. For example, the security update that is described in security
bulletin MS04-011 updates many DLLs that are loaded in core operating system
processes that can't be stopped without shutting down Windows.
The security update updates an .exe file that is currently running as a process that
is required by Windows. The update can't be completed while this process is
running. However, you can't force this process to stop unless you shut down
Windows. For example, Csrss.exe is a required process in Windows.
The security update updates a device driver that is currently being used and that is
required by Windows. The update can't be completed while this device driver is
being used. However, you can't unload this device driver unless you shut down
Windows. For example, Disk.sys is a device driver that is required by Windows.
The security update makes changes to the registry. These changes require that you
restart your computer.
The security update makes changes to registry entries that are read only when you
start your computer.
To determine whether files that are being updated by a security update are being used
by your computer, you can use Process Explorer from Sysinternals to examine how the
files are being used and by what processes they're being used. You may be able to stop
the services or to end the processes that are using the files. For more information about
Process Explorer, see Windows Sysinternals.
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft doesn't guarantee the
accuracy of this third-party contact information.
Except for our own products, Microsoft doesn't support or recommend this product
over others in the same area. We provide this information only as a convenience for our
customers and, excepting our own products, don't provide warranties of any kind, either
express or implied. The warranties that we don't provide include but aren't limited to the
implied warranties of merchantability or fitness for a particular purpose.
When you use Windows Installer, a security update that uses the .msi or the .msp file
name extension is installed on your computer. For more information about command-
line options, see Command-Line Options.
) Important
In certain cases, you must restart your computer to fully apply the security update.
Your computer may remain vulnerable if the security update isn't fully applied.
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Applies To
This article applies to all currently supported Microsoft operating systems.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes how to obtain Windows Server 2008 Service Pack 2 (SP2).
Summary
Windows Server 2008 updates are distributed in service packs. Service packs help keep
Windows Server 2008 current. Additionally, service packs extend and update the
functionality of your computer.
Service packs include updates, system administration tools, drivers, and additional
components. These components are conveniently bundled for easy downloading.
Service packs are cumulative. Each new service pack contains all the fixes that are
included in previous service packs, and also contain any new fixes. You do not have to
install a previous service pack before you install the latest service pack.
You can download Windows Server 2008 SP2 from the Windows Update site and from
the Microsoft Download Center. The following versions of Windows Server 2008 SP2 are
available:
A 32-bit version
A 64-bit (x64-based) version
An Itanium-based version
Windows Server 2008 Service Pack 2 and Windows Vista Service Pack 2 - Five Language
Standalone DVD ISO
7 Note
If you have installed a prerelease version of Windows Server 2008 SP2, uninstall the
prerelease version of the service pack, and then install the final product from the
Microsoft Download Center.
Release notes
For more information about issues with Windows Server 2008 Service Pack 2, see
Release Notes for Windows Server 2008 with Service Pack 2.
For more information, see Information about Service Pack 2 for Windows Vista and for
Windows Server 2008 .
Additional resources
For documentation, tools, and resources to help you evaluate, deploy, and manage
Windows Server 2008 SP2 on the servers in your organization, see What's new in
Windows 10 deployment.
For frequently asked questions about Windows Server 2008 Service Pack 2 and about
Windows Vista Service Pack 2, see Frequently Asked Questions: Windows Server 2008
Service Pack 2 and Windows Vista Service Pack 2.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Windows Server Update Services
(WSUS) clients can't install updates when Symantec Endpoint Protection is installed on
the same Web site.
Symptom
WSUS clients do not install approved updates from WSUS.
The WSUS client computers are configured correctly to connect to WSUS and appear on
the WSUS Administration console. The WSUS server is functional in every other respect.
Cause
WSUS and the Symantec Endpoint Protection Manager both utilize a virtual directory
called "Content." If WSUS and Symantec are both installed onto the same default Web
site using Port 80, only the last one installed will be able to serve updates to clients.
2. Create a new destination folder for the WSUS content directory on an NTFS
partition. The new destination folder must have the same permissions that were set
on the original folder.
3. Click Start, right-click Command Prompt, and then click Run as administrator.
cd WSUSInstallDir\Tools
Console
7 Note
The contentpath placeholder is the new root for content files (the path must
exist) and logfile is the path and file name of the log file to create.
a. Updates the WSUS database to refer to the new location of the update files.
c. Retains the old content directory. It remains intact and is not deleted by the
utility.
d. Using the -skipcopy parameter ensures that the files in the existing content
directory are not copied to the new WSUS destination folder.
7. Symantec Endpoint Protection Manager can now use the default content directory.
7 Note
1. Log on to the WSUS server by using an account that is a member of the local
Administrators group.
2. On the WSUS server, click Start, right-click Command Prompt, and then click Run
as administrator.
cd WSUSInstallDir\Tools
Console
6. As applicable, reconfigure the WSUS client's Group Policy setting for port 8530.
7. Symantec Endpoint Protection Manager can now use the default content directory
and port 80.
7 Note
Feedback
Was this page helpful? Yes No
This article provides some information about Windows Server Update Services 3.0
installation package.
Introduction
This article describes the Release-to-Web (RTW) version of Windows Server Update
Services (WSUS) 3.0. WSUS 3.0 upgrades the earlier version of this product. You can
install the RTW version of WSUS 3.0 on the following operating systems:
Microsoft Windows Server 2003 with Service Pack 1 or a later service pack
Microsoft Windows XP with Service Pack 2
Windows Vista
More information
WSUS 3.0 delivers new features that let administrators more easily deploy updates and
manage updates across an organization. This update can upgrade computers that are
running the following versions of WSUS to WSUS 3.0 RTW:
WSUS 2.0
WSUS 2.0 Service Pack 1 (SP1)
WSUS 3.0 RC
Before you install WSUS 3.0, make sure that the computer meets the minimum system
requirements.
System requirements
7 Note
Update information
For more information about how to download Microsoft support files, click the following
article number to view the article in the Microsoft Knowledge Base:
119591 How to obtain Microsoft support files from online services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection
software that was available on the date that the file was posted. The file is stored on
security-enhanced servers that help prevent any unauthorized changes to the file.
You can find the shortcut to start the WSUS 3.0 Administration Console in the
Administrative Tools folder. In Windows XP with SP2 and in Windows Vista, the
Administrative Tools folder is in Control Panel.
If you use a proxy server that requires authentication, you must overwrite the proxy
server password in the WSUS Server Configuration Wizard. If you do not do it, the WSUS
server may not synchronize updates. Because the configuration wizard starts
automatically at the end of the Setup process, this problem can cause synchronization
errors after you upgrade to WSUS 3.0. You can avoid this problem by canceling the
Configuration Wizard after the upgrade or by reentering the correct proxy password
when the wizard runs. To recover from this problem after it has occurred, follow these
steps:
For more information about Windows Server Update Services, visit the following
Microsoft Web site:
WSUS TechNet Center
https://technet.microsoft.com/wsus/default.aspx
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the client computers don't receive
updates when you use a Microsoft Windows Server Update Services (WSUS) SelfUpdate
service to send automatic updates.
Symptoms
When you try to use the WSUS SelfUpdate service to send automatic updates to client
computers, the client computers do not receive the updates. Additionally, the client
computers do not report to the WSUS server.
When this occurs, the WSUS Administration console logs the following error message:
Check your server configuration. One or more Update Service components could
not be contacted. Check your server status and ensure that the Windows Server
Update Service is running.
Non-running services: SelfUpdate
Cause
This problem may occur if one or more of the following conditions are true:
Resolution
To resolve this problem, you must have the following minimum permissions on the
C:\Program Files\Update Service\SelfUpdate directory.
ノ Expand table
Group Permissions
7 Note
IUSR_ ComputerName represents the host name of the server that is running IIS
where WSUS is installed. If this account is a member of the Users group, you do not
have to explicitly define these permissions.
To resolve issues where the SelfUpdate virtual directory does not have anonymous
access permissions, open IIS Manager, expand the default Web site, right-click the
SelfUpdate virtual directory, and then click Properties. On the Directory Security tab,
click edit under Authentication and access control. Make sure that anonymous access is
enabled.
7 Note
This step should be performed for the default Web site as well. The SelfUpdate tree
does not work if you have a Web site that is bound to a specific IP address in your
IIS configuration. The workaround is either to set your IIS configuration to respond
to "All unassigned" addresses or to add 127.0.0.1 to the list of IP addresses used for
SelfUpdate.
Use Internet Information Services (IIS) Management console to verify that the server is
set up with one of the following two configurations.
SelfUpdate
Content
ClientWebService
SimpleAuthWebService
WSUSAdmin
ReportingWebService
DssAuthWebService
ServerSyncWebService
SelfUpdate
ClientWebService
SelfUpdate
Content
ClientWebService
SimpleAuthWebService
WSUSAdmin
ReportingWebService
DssAuthWebService
ServerSyncWebService
Regardless of the configuration that you select, you must also verify the following
settings:
You must configure the SelfUpdate virtual directory under the default Web site or
any other Web site to listen on Port 80.
The SelfUpdate virtual directory points to C:\Program Files\Update
Service\SelfUpdate.
The WSUSAdmin virtual directory is the only virtual directory in IIS that should
have security set to Integrated Windows Authentication. Set all other virtual
directories security to Anonymous Access Enabled.
Status
Microsoft has confirmed that this is a problem.
More information
When you use IIS, you can move the SelfUpdate directory to a different Web site. To do
this, follow these steps:
1. Click Start, click Run, type Control admintools, and then double-click Internet
Information Services (IIS) Manager.
2. Expand the Web Sites folder, and then click the WSUS Administration node.
3. Right-click the SelfUpdate node, point to All Tasks, and then click Save
Configuration to File.
4. Type a name for the file and then save the file to another folder. You will use this
file in steps 9 through 12.
5. Right-click the ClientWebService node, select All Tasks, and then click Save
Configuration to File.
6. Type a name for the file and save the file to the same folder that you used in step
4. You will use this file in steps 13 through 15.
7. Select the default Web site or another Web site that is running on port 80.
8. Right-click the Web site, point to New, and then click Virtual Directory (from file).
9. Select the directory where you saved the SelfUpdate and the ClientWebService.xml
files in steps 4 and 6.
10. Select the SelfUpdate.xml file, and then click Open.
11. Click Read File, click the SelfUpdate file that is now listed under Select a
configuration to import, and then click OK.
12. In the IIS Manager dialog box, type the name for a new virtual directory in the
Alias box, and then click OK.
13. Select the ClientWebService.xml file, and then click Open.
14. Click Read File, click the SelfUpdate file that is now listed under Select a
configuration to import, and then click OK.
15. In the IIS Manager dialog box, type the name for a new virtual directory in the
Alias box, and then click OK.
16. If this is a new Web site, start the Web site from IIS Manager. If this is an existing
Web site, restart the Web site from IIS Manager.
References
For more information about automatic updates in Windows, see Description of the
Automatic Updates feature in Windows .
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes the Windows Server Update Services 3.0 SP2 Dynamic Installer for
Server Manager.
Introduction
Microsoft has released the Windows Server Update Services (WSUS) 3.0 Service Pack 2
(SP2) Dynamic Install for Windows Server 2008. WSUS enables information technology
administrators to fully manage the distribution of updates that are released through
Microsoft Update to computers in their network.
This article includes information about the contents of the service pack, links to
instructions and system requirements for installation on supported Windows Server
2008 operating systems by using Server Manager, and how to determine whether the
service pack is installed.
Software updates
Stability and reliability fixes for the WSUS 3.0 server, such as support for IPv6
addresses that are longer than 40 characters.
The approval dialog now sorts computer groups alphabetically by group name.
Computer status report sorting icons are now functional in x64 environments.
A new release of Windows Update Agent is included with WSUS 3.0 SP2. This new
release provides improvements and fixes, such as support for APIs that are called
by a nonlocal system callnoninteractiveteractive session.
More information
By default, Windows Server 2008 SP2 includes the ability to install the WSUS Role
Service by using Server Manager. This role lets you use the MMC Server Manager snap-
in and wizards to install, configure, and manage WSUS 3.0 SP2. The dynamic package
for WSUS 3.0 SP2 will only install by using Server Manager.
The WSUS 3.0 SP2 package has the following Microsoft Update detection logic and
characteristics:
Classification: Update
This package is applicable only to the following Windows Server operating systems
with the WSUS-Server Manager integration:
For more information, click the following article number to view the article in
the Microsoft Knowledge Base: 940518 An update is available that integrates
Windows Server Update Services (WSUS) 3.0 into Server Manager in Windows
Server 2008
Applicability rules:
Is installed = No
Is installable
Download Center:
The WSUS 3.0 SP2 Download Center Web site includes the RTM Microsoft user
license terms.
Pre-3.0 SP1 versions of WSUS 3.0 are no longer available for download.
After WSUS 3.0 is detected as installed by Server Manager, it can be configured and
managed within the Server Manager user interface or the WSUS 3.0 snap-in. To install
WSUS 3.0 SP2 on a server that runs Windows Server 2008 SP2 that is being updated by
a WSUS 3.0 server, approve the Windows Server Update Services 3.0 SP2 Dynamic Install
for Windows Server 2008, and then install WSUS role by using Server Manager.
Removal information
You can't use Add or Remove Programs in Control Panel to remove only WSUS 3.0
Service Pack 2 because it will also remove all WSUS 3.0.
To remove WSUS 3.0 SP2 by using Server Manager, follow these steps:
1. Log on to the server on which you plan to remove WSUS 3.0 SP2 by using an
account that is a member of the local Administrators group.
2. Click Start, point to Administrative Tools, and then click Server Manager.
3. In the right side pane of the Server Manager window, in the Roles Summary
section, click Remove Roles.
4. If the Before You Begin page appears, click Next.
5. On the Select Server Roles page, clear the Windows Server Update Services check
box.
6. On the Windows Server Update Services page, click Next.
7. On the Confirm Installation Selections page, click Remove.
8. On the Remove Windows Server Update Services 3.0 SP2 page, select any
additional items to be removed, and then click Next.
9. Click Finish to exit the wizard when the WSUS 3.0 SP2 Removal Wizard is finished.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article is designed to help you troubleshoot missing device data from Windows
Update for Business reports. If data is missing from your reports, there are three primary
questions that you have to answer:
Did Windows Update for Business reports receive the data but not include it in
reports?
Are the devices correctly configured to send diagnostic data, and have they tried
to send it?
Are network connections and permissions correctly configured, including any
proxy servers?
To verify that the reports service is receiving data from the device, run a query the
UCClient table. For example, the following query shows the total enrolled device count
per time-generated:
If the table contains data from the device but the data is missing from reports, a
problem might exist in the report configuration. For more information, see the following
articles:
If sufficient time has passed since the device was configured and enrolled, and the table
still contains no device data, go to the next section to start troubleshooting the device.
7 Note
This section summarizes the data transmission prerequisites. For a full discussion of
these requirements and an up-to-date list of endpoints, see Enable Windows
diagnostic data processor configuration.
settings-win.data.microsoft.com
*.blob.core.windows.net
7 Note
Tenants that have billing addresses in countries or regions in the Middle East
or Africa, and European countries or regions that aren't in the EU, also use the
eu-v10c.events.data.microsoft.com and eu-
watsonc.events.data.microsoft.com endpoints. Their diagnostic data is
Devices can connect directly or by using a proxy server. If a device has to use a proxy
server, the device configuration must meet the requirements that are described in the
next section.
Microsoft recommends that you configure the proxy servers to allow traffic to the
diagnostic data endpoints without requiring proxy authentication. This approach is the
most comprehensive solution, and it's compatible with all versions of Windows 10 and
Windows 11.
On the device, the Windows Universal Telemetry Client (UTC) service is responsible for
transmitting diagnostic data. When the UTC service starts to transmit, it first tries to
connect directly to the endpoint. If the UTC service can't connect in that manner, it
checks the device for a proxy configuration. The UTC service uses either type of proxy
configuration, unless Group Policy dictates a specific proxy configuration. For more
information about how to use Group Policy to configure the proxy server, see Configure
device proxy and Internet connectivity.
The following table lists the two types of proxy connections and which scenarios each is
suitable for.
ノ Expand table
Type Scenarios
User proxy At least one user account has permissions to access the device console, the proxy
server, and the endpoint.
The proxy servers require authentication, but they don't support Integrated
Windows Authentication.
) Important
Before you configure devices to use a proxy server, make sure that the devices have
the latest quality updates for a supported version of Windows.
On the device, in Network and internet settings, use the Proxy tab to configure the
user-level (WinINET) proxy.
7 Note
You can also use the legacy Internet Options control panel to configure the proxy
settings.
In a Command Prompt window on the device, run netsh winhttp set proxy .
Use the Web Proxy Auto-Discovery (WPAD) protocol.
Use a transparent proxy.
In Group Policy, configure a device-wide WinINET proxy by enabling Make proxy
settings per-machine (rather than per-user) .
Establish a routed connection.
Use Network Address Translation (NAT).
Feedback
Was this page helpful? Yes No
Provide product feedback
Windows Update for Business reports:
Use the configuration script to
troubleshoot device configuration
Article • 02/19/2024
When you're troubleshooting, you can use the Windows Update for Business reports
configuration script to test endpoint connectivity, make sure that the correct services are
running, and check for common issues.
You can download the script from the Microsoft Download Center .
For more information about the script, including the available parameters, see
Configuring devices through the Windows Update for Business reports configuration
script.
7 Note
If you don't find any issues in the device configuration, and you determine that the
Windows Update for Business reports are correctly configured, your issue is likely
related to data transmission. For more information, see Windows Update for
Business reports: How to troubleshoot diagnostic data transmission.
) Important
The script package includes PSExec.exe. If you use a mobile device manager
such as Microsoft Intune, and you've implemented attack surface reduction
(ASR) rules beyond the standard ASR rules, the rules might block the script.
For more information, see Block process creations originating from PSExec
and WMI commands.
After you finish troubleshooting the device, remove PSExec.exe.
2. Download the script package to the device that you're troubleshooting, and
expand the script package.
3. Create a folder on the device for log data. The default name and path that the
script uses is *The default value is .\UCLogs.
runMode=Pilot
7 Note
ノ Expand table
7. Open an elevated PowerShell window, navigate to the folder that contains the
script files, and then run RunConfig.bat.
ノ Expand table
Error Description
1 Unexpected error
16 Reboot is pending on device. Restart the device then re rerun the script.
30 Unable to disable Enterprise Auth Proxy. This registry value must be 0 for UTC to operate
in an authenticated proxy environment.
63 AllowTelemetry isn't set to the appropriate value and it couldn't be set by the script.
100 Device must be Microsoft Entra joined or Microsoft Entra hybrid joined to use Windows
Update for Business reports.
RegAppCompatFlags.txt
RegDataCollection.txt
This file records the DataCollection settings. This data represents the current telemetry
configuration of the device, per applied policies.
You can use this data to verify that the appropriate values are applied to transmit
diagnostic data to Microsoft. This data resembles the following excerpt:
Output
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection]
"AllowDeviceNameInTelemetry"=dword:00000001
"AllowUpdateComplianceProcessing"=dword:00000010
"AllowCommercialDataPipeline"=dword:00000001
RegPoliciesDataCollection.txt
This file records device-level and user-level settings for controlling diagnostic data. The
device-level configuration data resembles the following excerpt:
Output
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataC
ollection]
"AllowTelemetry"=dword:00000003
"MaxTelemetryAllowed"=dword:00000003
The AllowTelemetry entry controls the type (if any) of diagnostic data to transmit. The
entry has the following allowed values:
Output
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataC
ollection\Users]
RegSQM.txt
RegDiagTrack.txt
This file records all the registry settings for the Connected User Experiences and
Telemetry (DiagTrack) (UTC) service. All the entries that store these settings reside under
the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack
Output
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\Di
agTrack]
"TimeStampInterval"=dword:00000001
"Capabilities"=hex:c6,f6,43,15,00,00,00,00
"mspflags"=hex(b):11,00,00,00,00,00,00,00
"DiagTrackAuthorization"=dword:00000f9f
"LaunchCount"=hex(b):03,00,00,00,00,00,00,00
"DiagTrackStatus"=dword:00000003
"LastFreeNetworkLossTime"=hex(b):00,00,00,00,00,00,00,00
"LastConnectivityHeartBeatTime"=hex(b):00,00,00,00,00,00,00,00
"LastConnectivityState"=dword:00000002
"ConnectivityNoNetworkTime"=dword:00000001
"ConnectivityRestrictedNetworkTime"=dword:00000000
"LastPersistedEventTime"=hex(b):40,e5,64,27,cb,8a,d9,01
"LatencyDataLastUploadTime"=hex(b):00,00,00,00,00,00,00,00
"TriggerCount"=hex(b):00,04,00,00,00,00,00,00
"HttpRequestCount"=hex(b):07,00,00,00,00,00,00,00
"TriggerLatency"="0.088490"
"HttpRequestLatency"="0.077600"
"LastSuccessfulUploadTime"=hex(b):7a,96,6c,2b,cb,8a,d9,01
"LastSuccessfulRealtimeUploadTime"=hex(b):7a,96,6c,2b,cb,8a,d9,01
"LastSuccessfulNormalUploadTime"=hex(b):55,2a,aa,a7,ca,8a,d9,01
As shown in the previous excerpt, many of these entries use big-endian hexadecimal
format. To convert them to UTC dates and times, use a tool such as DCode . This tool is
available as a free download.
The DCode tool uses input values that have a slightly different format than the one that
the file uses. You have to reverse the sequence of the segments, and then remove all
non-numeric characters. For example, consider the following value from the excerpt:
Console
hex(b):55,2a,aa,a7,ca,8a,d9,01
To convert this value, open DCode, select Format, and then select Hexadecimal (Big
Endian). In Value, enter the following:
Console
01d98acaa7aa2a55
Then, select Decode. The list of results includes a Windows FileTime (UTC) entry that
has the value, 2023-05-20 03:24:58.5114197 Z.
7 Note
By default, all dates and times are Coordinated Universal Time (UTC) values. To
display the time stamp in a different time zone, use the Time Zone setting in
DCode.
Feedback
Was this page helpful? Yes No
This article helps work around an issue that occurs when you deploy Windows Update
.msu files through Windows Remote Management 2.0 and Windows Remote Shell.
Symptoms
Windows Update Standalone Installer (WUSA) returns 0x5 ERROR_ACCESS_DENIED
when deploying Windows Update .msu files through Windows Remote Management 2.0
and Windows Remote Shell. You may also see the following in the Application Event log:
Source: Microsoft-Windows-WUSA
Event ID: 3
Level: Error
Description: Windows update could not be installed because of error 2147942405
"Access is denied."
Installing an update using WUSA or the WUA APIs on a remote machine isn't supported.
Workaround
To work around this issue, use the following method:
Extract the .msu file through Windows Remote Shell with WUSA using the following
command:
Console
Console
More information
The Windows Update Standalone Installer uses the Windows Update Agent API to install
update packages. Update packages have a .msu file name extension. The .msu file name
extension is associated with the Windows Update Standalone Installer.
The security restrictions on remote use of the WUA APIs are documented here:
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue that prevents you from adding features to a
Windows Server 2012 R2-based computer that's running the Server Core installation
option.
Symptoms
Consider the following scenario:
In this scenario, the feature installation fails. Also, you receive the following error
message:
Error: 0x800f081f
The source files could not be found. Use the "Source" option to specify the location
of the files that are required to restore the feature. For more information on
specifying a source location, see Configure a Windows Repair Source .
Resolution
To resolve this problem, use one of the following methods.
1. Insert the updated Windows Server 2012 R2 DVD into the computer's DVD drive.
2. Type the following command to determine the index number that's required for
steps 3 and 4.
PowerShell
7 Note
Console
Index : 1
Name : Windows Server 2012 R2 SERVERSTANDARDCORE
Description : Windows Server 2012 R2 SERVERSTANDARDCORE
Size : 6,653,342,051 bytes
Index : 2
Name : Windows Server 2012 R2 SERVERSTANDARD
Description : Windows Server 2012 R2 SERVERSTANDARD
Size : 11,807,528,410 bytes
Index : 3
Name : Windows Server 2012 R2 SERVERDATACENTERCORE
Description : Windows Server 2012 R2 SERVERDATACENTERCORE
Size : 6,653,031,430 bytes
Index : 4
Name : Windows Server 2012 R2 SERVERDATACENTER
Description : Windows Server 2012 R2 SERVERDATACENTER
Size : 11,809,495,151 bytes
7 Note
Powershell
Powershell.exe
4. Type the following PowerShell command, in which <drive> represents the location
of the Windows Server 2012 R2 installation files and <index> represents the
numbered index from step 2:
Powershell
For example: If your media is on drive F, and you're installing the full version of
Datacenter, enter the following command:
Powershell
More information
The Windows Server 2012 R2 Volume Licensing media was designed to require access to
Windows Update to add optional components or features that aren't included in the
side-by-side repository. If the server doesn't have Internet access, or if access to
Windows Update has been restricted, you can't enable optional components or features
by using the DISM command, Windows PowerShell cmdlets, or Server Manager.
Status
Microsoft has confirmed it to be a problem in the packaging of volume licensed media
for Windows Server 2012 R2. This behavior isn't by design and has been corrected in the
Volume Licensing build that was released on December 11, 2013. Use the new media for
any Windows Server 2012 R2 installations. See the Resolution section to resolve this
problem on servers on which you can't install features.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve licensing and activation-related issues. The topics are
divided into one subcategory. Browse the content or use the search feature to find
relevant content.
Feedback
Was this page helpful? Yes No
This article provides some information about Application Event Log Warning ID
1058(Security-SPP) which may be logged after reboot on OEM systems.
Summary
Application Event Log Warning ID 1058 (Security-SPP) may be logged after an OEM
system that utilizes OA (OEM Activation) has been rebooted.
Cause
This warning is logged because of test activation data being present as part of the
manufacturing process for OEM systems.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you try to validate a copy of
Windows.
Symptoms
When you try to validate a copy of Windows, you may receive an error message that
resembles the following:
When you try to validate Windows, Windows downloads an update 971033 . However,
when Windows tries to install the update, the update shows an error message that is
mentioned above. Additionally, if you try to download the update KB971033 on your
machine and run it manually, you may receive following error message:
Cause
This error occurs when the State value of the following registry subkey is incorrectly set.
This value corresponds to the Internet Explorer security setting Check for publisher's
certificate Revocation and Check for signatures on downloaded programs.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust
Providers\Software Publishing
You can find a key with the name State. By default the value is set to 23c00.
Resolution
To resolve this problem, change the registry key to a valid setting, for example:
2 Warning
If you use Registry Editor incorrectly, you may cause serious problems that may
require you to reinstall your operating system. Microsoft cannot guarantee that you
can solve problems that result from using Registry Editor incorrectly. Use Registry
Editor at your own risk.
3. On the left side pane, look for State key and double-click to open it.
4. Change the Value data to 23c00 or 23e00 (Hexadecimal).
5. Quit Registry Editor.
registry
More information
In some cases, you might be required to update the State value for following two
registries as well.
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust
Providers\Software Publishing
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust
Providers\Software Publishing
7 Note
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error 0xC004E002 when you try to activate
Windows.
Applies to: Windows Server 2012 R2, Windows 10 - all editions, Windows 7 Service Pack
1
Original KB number: 978305
Symptoms
When you try to activate Windows Vista, Windows Server 2008, Windows 7, Windows
Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, or Windows Server
2012 R2, you may receive one of the following error messages:
Code: 0xC004C003
Description: The activation server determined that the specified product key has
been blocked.
Code: 0xC004E002
Description: The Software Licensing Service reported that the license store contains
inconsistent data.
Cause
This issue occurs because the incorrect permissions are set on the Tokens.dat file or this
file is corrupted.
Resolution
To resolve this issue, try the following methods in order.
Console
icacls
%windir%\serviceprofiles\networkservice\appdata\roaming\microsoft\softw
arelicensing /grant "BUILTIN\Administrators:(OI)(CI)(F)" "NT
AUTHORITY\SYSTEM:(OI)(CI)(F)" "NT Service\slsvc:(OI)(CI)(R,W,D)"
The correct permissions for tokens.dat should look like this output from icacls:
Console
tokens.dat NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)
NT SERVICE\SLSVC:(I)(R,W,D)
Console
icacls
%windir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Softw
areProtectionPlatform /grant "BUILTIN\Administrators:(OI)(CI)(F)" "NT
AUTHORITY\SYSTEM:(OI)(CI)(F)" "NETWORK SERVICE:(OI)(CI)(F)"
The correct permissions for token.dat should look like this output from icacls:
Console
tokens.dat NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)
NT AUTHORITY\NETWORK SERVICE:(I)(F)
For Windows 8, Windows Server 2012, Windows 8.1, or Windows Server 2008 R2:
Console
icacls
"%windir%\ServiceProfiles\LocalService\AppData\Local\Microsoft\WSLicens
e" /grant "BUILTIN\Administrators:(OI)(CI)(F)" "NT AUTHORITY\SYSTEM:
(OI)(CI)(F)" "NETWORK SERVICE:(OI)(CI)(F)"
The correct permissions for tokens.dat should look like this output from icacls:
Console
tokens.dat NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)
NT SERVICE\WSService:(OI)(CI)(R,W,D)
7 Note
3. At the command prompt, type the following command and then press ENTER.
Console
Console
For Windows 8, Windows Server 2012, Windows 8.1, or Windows Server 2008 R2
Console
If you receive a message that asks whether you want to continue with this
operation, type Y and then press ENTER.
Console
cd
%windir%\serviceprofiles\networkservice\appdata\roaming\microsoft\softw
arelicensing
Console
cd
%windir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Softw
areProtectionPlatform
For Windows 8, Windows Server 2012, Windows 8.1, or Windows Server 2008 R2:
Console
cd
%windir%\ServiceProfiles\LocalService\AppData\Local\Microsoft\WSLicense
Console
Console
Console
For Windows 8, Windows Server 2012, Windows 8.1, or Windows Server 2008 R2:
Console
Console
cd %windir% \System32
Console
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article helps fix the error 0xC004F06C and the error message "The Key Management
Service (KMS) determined that the request timestamp is invalid" when you activate
Windows.
When you try to activate Windows by using the Slmgr /ato command, you receive the
following error message:
Error: 0xC004F074 The Software Licensing Service reported that the computer could
not be activated. No Key Management Service (KMS) could be contacted. Please see
the Application Event Log for additional information.
In addition, Event ID 12288 with the 0xC004F06C error is logged in the application event
log.
Output
b. Search for Windows Time and make sure the service is running.
c. Run the following command from an elevated command prompt to make sure
the service is working properly:
Console
2. For non-domain-joined computers, use the Network Time Protocol (NTP) time
source by enabling the NtpClient provider.
) Important
This section, method, or task contains steps that tell you how to modify the
registry. However, serious problems might occur if you modify the registry
incorrectly. Therefore, make sure that you follow these steps carefully. For
protection, back up the registry before you modify it so that you can restore it
if a problem occurs. For more information about how to back up and restore
the registry, see How to back up and restore the registry in Windows .
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\
NtpClient
b. Change the value of the Enabled registry entry to 1 to enable the NtpClient
provider in the current time service.
3. For domain-joined computers, use the AD DS time source by configuring the time
client type.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\W32Time\Parameters .
b. Make sure the value of the Type registry entry is NT5DS. This means the
computer is synchronizing its time with the AD DS time hierarchy.
Feedback
Was this page helpful? Yes No
This article helps fix the error 0xC004F074 that occurs when you activate Windows.
When you try to activate Windows, you may get error 0xC004F074 and one of the
following error messages:
Error: 0xC004F074 The Software Licensing Service reported that the product
could not be activated. No Key Management Service (KMS) could be
contacted. Please see the Application Event Log for additional information.
At the same time, the following entries may get logged in the KMS Event Log on the
KMS client and the KMS host.
In the application event log on the KMS client, you see the following event:
Output
Description:
The client has sent an activation request to the key management service
machine.
Info:
0xC004F06C, 0x00000000, <KMS Host FQDN>:1688, 36f27b39-2fd5-440b-be67-
a09996d27a38, 2010/09/29 17:52, 0, 2, 41760, 68531fb9-5511-4989-97be-
d11a0f55633f, 5
In the application event log on the KMS host, you see the following event:
Output
A support version mismatch between the KMS client and the KMS host machine
A time difference between the KMS client and the KMS host machine
If you're running Windows Server 2008 as your KMS host, you need this update hotfix
968912 .
Time difference between KMS client and KMS host
machine
The error 0xC004F06C listed in the info section may occur if the difference between
system time on the client computer and the system time on the KMS host is more than
4 hours. We recommend that you use a Network Time Protocol (NTP) time source or the
Active Directory service to synchronize the time between computers. Time is
coordinated between the KMS host and the client computer in Coordinated Universal
Time (UTC).
Make sure that the system time on the client and the KMS host is the same. The time
zone set on the client computer doesn't affect the activation since it's based on UTC.
Run the w32tm /resync command to resync the time on the client.
Error: 0xC004F074 The Software Licensing Service reported that the product could
not be activated. No Key Management Service (KMS) could be contacted. Please see
the Application Event Log for additional information.
The Software Protection Platform Service (sppsvc service) on the KMS host has
stopped running.
There are networking issues between the KMS client and the KMS host server. For
example, TCP 1688 traffic is blocked between the KMS client and the KMS host
server.
There's an incorrect or old KMS host server record in the Domain Name System
(DNS).
PowerShell
Review the TcpTestSucceeded output parameter. If it's False , it means that port 1688 is
blocked between the KMS client and the KMS server.
2. Select the _tcp folder under your domain name folder, and search for the _VLMCS
SRV record.
3. Check if the correct KMS host server name is present in the _VLMCS SRV record.
4. Verify the host record of the KMS host server by going to the domain name folder
and verifying the Host A record. Change the IP address to point to the new KMS
server host if it's incorrect.
References
Resolve Windows activation error codes
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to a 0xC004F015 error that occurs when you activate
Windows 10 Enterprise on a Microsoft Windows Server 2012 R2 and Windows Server
2008 R2 KMS host.
Symptoms
On a computer that is running a volume-licensed installation of Windows 10 Enterprise,
you cannot activate Windows if you are using a Customer Support Volume License Key
(CSLVK). Additionally, the following error entry is logged in the event log as Event ID
12290:
0xC004F015
Error details
0xc004f042 - SL_E_VL_KEY_MANAGEMENT_SERVICE_ID_MISMATCH
The Software Licensing Service determined that the specified Key Management
Service (KMS) cannot be used.
Cause
This problem can occur if you use the Windows 10 KMS host product key in a Windows
Server 2012 R2 and Windows Server 2008 R2 environment. You must use the updated
WS2012R2+Win10 KMS host product key if the following conditions are true.
You must have Windows Server 2012 R2 with the Volume Activation role installed.
You must have update 3172614 installed.
You must have Windows Server 2008 R2 with the Volume Activation role installed.
You must have update 3079821 installed.
Resolution
To resolve this problem, follow these steps:
More information
For the client KMS host, this problem should not occur on a client KMS host server.
Activation of Windows 10 is not supported if you are running a KMS host on any of the
following operating systems:
Windows Vista
Windows Server 2008
Windows Server 2003
The Generic Volume License Key (GVLK) for Windows 10 editions can be located at
Appendix A: KMS Client Setup Keys.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article helps fix the error 0x8007000D that occurs when you activate a Windows 7
machine by using any type of product key.
Symptoms
You try to activate a Windows 7 machine by using any type of product key. Running
slsmgr -dlv or slmgr -ato from a command line generates the following error:
Cause
The System account by default has Full Control permissions to the registry path
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root and any subkeys.
If those permissions have been altered for the Root key or any subkey(s), we would see
the error code 0x8007000D.
Resolution
Assign the minimum permission of Enumerate Subkeys to the System account for the
registry path HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root and any of its
subkeys.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
Symptoms
You see one or more of the following event IDs logged in the Application log:
Source: Microsoft-Windows-Security-SPP
Date: <DateTime>
Event ID: 900
Task Category: None
Level: Information
Keywords: Classic
User: N/A
Computer: Server1.contoso.com
Description:
The Software Protection service is starting.
Parameters:caller=wsqmcons.exe
7 Note
The 0x80072EE7 error code indicates that the system did not have appropriate
Internet access to be able to obtain the Windows Genuine Advantage ticket.
Cause
These event IDs may be logged if an application or component in Windows tries to
validate and call the Genuine Advantage APIs to acquire a Windows Genuine Advantage
ticket if one does not exist. For example, these event IDs may be logged in the following
situations:
When you try to access the Microsoft Store, this triggers a request for a Windows
Genuine Advantage ticket and an attempt to acquire one through validation.
Resolution
The events that are mentioned in the "Symptoms" section are logged if the system does
not have access to the Internet. To prevent these events from occurring, connect the
system to the Internet, and then check the firewall and proxy settings.
If you cannot connect the system to the Internet, you can try the following methods to
prevent Event ID 900, depending on the caller program identity:
7 Note
The inability to obtain a Windows Genuine Advantage ticket may not prevent the
component from working. The presence of these event IDs does not mean that the
computer is not genuine or that a licensing issue exists.
More information
The Genuine Advantage feature is designed for client operating systems and is typically
not found on a server. However, it is possible for a Windows component to use the
Windows Genuine Advantage APIs if it has to.
For more information about volume activation, see the following Microsoft TechNet
topic:
For more information about Windows Genuine Advantage, see the following Windows
article:
Genuine Windows: frequently asked questions
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a resolution for Event ID 12321 Warning Token Based Activation
failed.
Symptoms
The Application Event log may log an event ID 12321 warning event from the source
Microsoft-Windows-Security-Licensing-SLC. The description field will state Token Based
Activation failed.
HR=0xC004F011
Cause
This event will occur when the Token Issuance License is not installed inside Windows or
the certificates on the Smartcard are not present and activation is attempted.
0xC004F011 = SL_E_LICENSE_FILE_NOT_INSTALLED
Resolution
This issuance license file or Smartcard certificates are only needed when Token Based
activation is being attempted.
If you are not using Token-Based Activation, this warning message can be safely
ignored. And it will not affect the ability, which activates Windows using KMS host
machines or MAK keys.
If you are using Token Based Activation, you need to reinstall the Token Issuance license
acquired from Microsoft.
SLMGR /ILC <token-based-license-filename>
More information
Token-Based activation functionality was enabled in Service Pack 2 for Windows Vista
and Windows Server 2008.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a resolution to fix the event ID 12293 that occurs when setting up a
KMS host.
Symptoms
When setting up a KMS host, you may receive the following Event ID in the application
event log on the KMS host.
Source: Security-SPP
Event ID: 12293
Publishing the Key Managment Service (KMS) to DNS in the contoso.com domain
failed.
Info: 0x80072338
Cause
This error can occur if the KMS host doesn't have permissions to edit the existing
_VLMCS SRV record in DNS.
Resolution
Use the following steps to change the permissions to allow the new KMS host to update
the record.
7 Note
These are instructions specific to Microsoft DNS server. If you're using a third party
DNS server, consult your documentation for how to change permissions.
More information
SRV records in DNS use the record name as the ID for all records of that type. The first
KMS host to create a record named VLMCS.TCP becomes the Creator/Owner of SRV
records with that name. Other KMS can't publish SRV records in that zone with that
name until given permission to do so.
The _VLMCS SRV record can be thought as an array with single name. In a default DDNS
configuration, any machine can create a unique SRV record. Once a _VLMCS record
exists, no other computer has the rights to change that record. The second and later
KMS hosts create the SRV records with the same name. The SRV record design allows a
DNS admin to explicitly and control which machines are allowed to advertise services in
the DNS zone.
When publishing to DNS is successful, the KMS host will log an Event ID 12294 in the
application event log.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides workarounds to an issue where you see an error when you activate
Microsoft Windows Server 2003 over the Internet fails.
Symptoms
When you try to activate Windows Server 2003 over the Internet, Windows Product
Activation may be unsuccessful and you may experience the following issues:
You receive a message that prompts you for a user name and password.
Unable to establish a connection with the activation server. Please check your
network settings and confirm that you are able to connect to the Internet, then
try again. Message number 32777.
Windows Product Activation is unsuccessful whether or not you enter your user name
and password.
Cause
This issue occurs if both of the following conditions are true:
The Internet Explorer Enhanced Security Configuration (also known as Internet Explorer
hardening) uses certificate revocation. This certificate revocation lookup process involves
a URL retrieval operation. In this case, the URL retrieval goes through the proxy server
and occurs outside the explicit context of the logged-on user. Therefore, Basic
Authentication mistakenly prompts you for a user account name and password. As the
user, you are typically not aware that certificates are being validated, and you may be
prompted repeatedly during the validation of a series of certificates.
7 Note
The following methods are listed in the order of the most preferred to least
preferred, with the most preferred method appearing first.
http://crl.microsoft.com/pki/crl/productsMicrosoftProductSecureServer.crl
http://crl.microsoft.com/pki/crl/products/MicrosoftProductSecureCommunications
.crl
http://crl.microsoft.com/pki/crl/products/MicrosoftRootAuthority.crl
http://www.microsoft.com/pki/crl/productsMicrosoftProductSecureServer.crl
http://www.microsoft.com/pki/crl/products/MicrosoftProductSecureCommunications
.crl
http://www.microsoft.com/pki/crl/products/MicrosoftRootAuthority.crl
Microsoft recommends that you do not turn off certificate revocation in Internet
Explorer.
3. Click the Advanced tab, and then clear the following check boxes in the Settings
list:
6. Activate Windows.
8. Click the Advanced tab, and then select the following check boxes in the Settings
list:
More information
Because other issues may generate error message number 32777, you can view the
Setuplog.txt file to determine whether the issue described in this article is the cause of
this error. Status code 407 typically indicates the occurrence of the issue described in
this article. The following is an example of Status code 407 as it appears in a Setuplog.txt
file:
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,4423,,DISPID_E
XTERNAL_CONNECTEDTOINTERNETEx
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobcomm\connmgr.cpp,1560,,tries to
connect to the WPA HTTP server
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobcomm\connmgr.cpp,2170,,Disabled
RAS Autodial for current logon session
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobcomm\connmgr.cpp,1480,,HTTP
status code from WPA HTTP server 407
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobcomm\connmgr.cpp,2184,,Restore
value of RAS Autodial for current logon session
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobcomm\connmgr.cpp,1657,,could
connect to WPA HTTP server
<DateTime>,OOBE Trace,0,,GetPreferredConnection: null
<DateTime>,OOBE Trace,0,,UseModem: false
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,3049,,DISPID_E
XTERNAL_CONNECT
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,3054,,DISPID_E
XTERNAL_RECONNECT
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,4500,,DISPID_E
XTERNAL_ACTIVATE
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,6979,,Waiting
for response from m_pLicenseAgent->AsyncProcessHandshakeRequest()
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,5724,,m_pLicen
seAgent->AsyncProcessHandshakeRequest() failed. Error = 32777
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,311,,Windows
Product Activation error.
<DateTime>,d:\dnsrv\base\ntsetup\oobe\msobmain\msobmain.cpp,313,,ReturnActi
vationStatus: Status = 7, Detail = 32777
<DateTime>,OOBE Trace,0,,Activation failed. Error = 7
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes how to change the Volume Licensing product key.
Introduction
2 Warning
The steps in the article are effective only on Volume License media. If you try these
steps on OEM media or on retail media, you will not change the product key.
When you install Windows XP or Windows Server 2003, the media must match the
product key. That is, the channel (MSDN, retail, OEM, Volume License, and so on), the
SKU (Windows XP Professional, Windows XP Home Edition, and so on), and the
language (English, French, and so on) must match between the product key and the
media. It is necessary so that you can successfully enter the product key. If the
installation media does not match the product key, you receive the following error
message:
If you use a "leaked" product key (a product key that is known to be available to the
public) to deploy Windows XP across multiple computers (a Volume Licensing
installation), you might be unable to install Windows XP Service Pack 1 (SP1) and later
versions of Windows XP, or automatically obtain updates from the Windows Update
Web site. For example, you might receive the following error message when you install
Windows XP SP1 and later versions of Windows XP:
The Product Key used to install Windows is invalid. Please contact your system
administrator or retailer immediately to obtain a valid Product Key. You may also
contact Microsoft Corporation's Anti-Piracy Team by emailing [email protected]
if you think you have purchased pirated Microsoft software. Please be assured that
any personal information you send to the Microsoft Anti-Piracy Team will be kept in
strict confidence.
This article is intended for an advanced computer user. You might find it easier to follow
the steps if you print this article first.
More information
Prerequisites
You must have a valid product key before you can use the information in this article. To
obtain a valid product key, click the following link to contact the Microsoft Volume
Licensing Service Center:
https://www.microsoft.com/licensing/servicecenter/home.aspx
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
If you only have a few volume licensing product keys to change, you can use the
Activation Wizard.
7 Note
We recommend that you run System Restore to create a new restore point before
you follow these steps.
Deactivate Windows
3. In the navigation pane, locate and then click the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WPAEvents
2. In the Open box, type the following command, and then click OK.
%systemroot%\system32\oobe\msoobe.exe /a
5. Type the new product key in the New key boxes, and then click Update.
If you are returned to the previous window, click Remind me later, and then restart
the computer.
6. Repeat steps 1 and 2 to verify that Windows is activated. You receive the following
message: Windows is already activated. Click OK to exit.
7. Click OK.
If you cannot restart Windows after you install Windows XP SP1 or a later version of
Windows XP, try the following steps:
1. Restart your computer and start pressing F8 until you see the Windows Advanced
Options menu.
2. Select Last Known Good Configuration from the menu and press ENTER. This
option starts Windows by using a previous good configuration.
3. Repeat steps 1 through 8 under "Reactivate Windows and add new product key."
If you can install SP1 or a later version of Windows XP and you can restart Windows, you
have resolved the issue. If the issue has not been resolved, try method 2 or see the
"Next Steps" section for more troubleshooting resources.
The sample ChangeVLKey2600.vbs script and the sample ChangeVLKeySP1 script that
are described in this section use the new volume licensing key that you want to enter as
a single argument. It is in a five-part alphanumeric form.
They remove the hyphen characters (-) from the five-part alphanumeric product
key.
They create an instance of the win32_WindowsProductActivation class.
They call the SetProductKey method with the new volume licensing product key.
You can create a batch file or a cmd file that uses either of the following sample
scripts, together with the new product key as an argument.
You can deploy it as part of a startup script or run it from the command line to change
the product key on a single computer.
Examples
For more information about how to script the product key, visit the following Microsoft
Web site:
https://technet.microsoft.com/library/bb457096.aspx
ChangeVLKeySP1.vbs
'
' WMI Script - ChangeVLKey.vbs
'
' This script changes the product key on the computer
'
'***************************************************************************
ON ERROR RESUME NEXT
if Wscript.arguments.count<1 then
Wscript.echo "Script can't run without VolumeProductKey argument"
Wscript.echo "Correct usage: Cscript ChangeVLKey.vbs ABCDE-FGHIJ-KLMNO-
PRSTU-WYQZX"
Wscript.quit
end if
Dim VOL_PROD_KEY
VOL_PROD_KEY = Wscript.arguments.Item(0)
VOL_PROD_KEY = Replace(VOL_PROD_KEY,"-","")'remove hyphens if any
ChangeVLKey2600.vbs
'
' WMI Script - ChangeVLKey.vbs
'
' This script changes the product key on the computer
'
'***************************************************************************
ON ERROR RESUME NEXT
if Wscript.arguments.count<1 then
Wscript.echo "Script can't run without VolumeProductKey argument"
Wscript.echo "Correct usage: Cscript ChangeVLKey.vbs ABCDE-FGHIJ-KLMNO-
PRSTU-WYQZX"
Wscript.quit
end if
Dim VOL_PROD_KEY
VOL_PROD_KEY = Wscript.arguments.Item(0)
VOL_PROD_KEY = Replace(VOL_PROD_KEY,"-","")'remove hyphens if any
Dim WshShell
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.RegDelete "HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\WPAEvents\OOBETimer" 'delete OOBETimer registry value
for each Obj in GetObject("winmgmts:
{impersonationLevel=impersonate}").InstancesOf
("win32_WindowsProductActivation")
Next
The following example shows how to use the ChangeVLKeySP1.vbs script from a
command line:
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
When you troubleshoot Windows activation issues, you may have to rebuild the
Tokens.dat file.
Applies to: Windows 10 - all editions, Windows Server 2012 R2, Windows Server 2019,
Windows Server 2016
Original KB number: 2736303
2. Type the following commands in the order in which they're presented. Press Enter
after each command.
b. For Windows 10, Windows Server 2016 and later versions of Windows:
cd %windir%\system32\spp\store\2.0
For Windows 7, Windows Server 2008 and Windows Server 2008 R2:
cd
%windir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SoftwareP
rotectionPlatform
7 Note
For Windows 8.1 that were upgraded from Windows 8, the location may
still be %windir%\system32\spp\store.
More information
After you rebuild theTokens.dat file, you must reinstall your product key by using one of
the following methods:
At the same elevated prompt command, type the following command, and then
press Enter:
Right-click My Computer, select Properties, and then select Change product key.
7 Note
You should never use the /upk switch to uninstall a product key. To install a
product key over an existing product key, use the /ipk switch.
For more information about Key Management Services (KMS) client setup
keys, see KMS client activation and product keys.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful?
Yes No
This article describes an issue in which you cannot create a database by using VAMT 3.0.
Symptoms
When you try to create a database by using Volume Activation Management Tool
(VAMT) 3.0 on a computer that is running Windows 8 or Windows Server 2012, you
receive the following error message:
Cause
The issue occurs because the account that you use to log on to the computer does not
have permissions to create the database.
Resolution
To resolve the issue, log on to the computer as the local administrator, and then try to
create the database. If the issue still occurs, install Microsoft SQL Server 2008 R2
Management Studio Express (SSMSE), and then grant yourself the relevant permissions.
For more information about downloading SSMS, see Download SQL Server
Management Studio (SSMS).
For more information about SQL Server permissions, see Security and Protection
(Database Engine).
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
7 Note
This article was originally published as a TechNet blog on March 26, 2018.
I recently helped a customer with deploying Windows Server 2016 in their environment.
We took this opportunity to also migrate their activation methodology from a KMS
Server to Active Directory Based Activation.
As proper procedure for making all changes, we started the migration in the customer's
test environment. We began the deployment by following the instructions in Active
Directory-Based Activation vs. Key Management Services . The domain controllers in
the test environment were all running Windows Server 2012 R2, so we didn't need to
prep the forest. We installed the role on a Windows Server 2012 R2 Domain Controller
and chose Active Directory Based Activation as the volume activation method. We
installed the KMS key and gave it a name of "KMS AD Activation (** LAB)." We followed
the blog post step by step.
We started by building four virtual machines, two Windows 2016 Server Standard and
two Windows 2016 Server Datacenter. At this point everything was great. We built a
physical server running Windows 2016 Server Standard, and the machine activated
properly.
Truthfully, the set up and configuration were super easy, so that part was simple and
straight forward. However, all the virtual machines I had built the week prior showed
that they weren't activated. I went back to the physical machine and it was fine. I went to
the customer to discuss what had happened. The first question was "What changed over
the weekend?" And as usual the answer was "nothing." This time, nothing really had
been changed, and we had to figure out what was going on.
I went to one of the problem servers, opened a command prompt, and checked the
output from the slmgr /ao-list command. The /ao-list switch displays all activation
objects in Active Directory.
The results show that we have two activation objects: one for Windows Server 2012 R2,
and the newly created KMS AD Activation (** LAB) which is the Windows Server 2016
license. This confirms the Active Directory is correctly configured to activate Windows
KMS clients.
Knowing that the slmgr command is for license activation, I continued with different
options. I tried the /dlv switch, which will display detailed license information. This
looked fine, I was running the Standard version of Windows Server 2016, there's an
Activation ID, an Installation ID, a validation URL, even a partial Product Key.
Does anyone see what I missed at this point? We'll come back to it after my other
troubleshooting steps but suffice it to say the answer is in this screenshot.
My thinking now is that for some reason, the key is broken, so I use the /upk switch,
which uninstalls the current key. While this was effective in removing the key, it's
generally not the best way to do it. Should the server get rebooted before getting a new
key it may leave the server in a bad state? I found that using the /ipk switch (which I do
later in my troubleshooting) overwrites the existing key and is a safer route to take.
I ran the /dlv switch again, to see the detailed license information. Unfortunately, that
didn't give me any helpful information, just a product key not found error. Because
there's no key since I just uninstalled it.
I figured it was a long shot, but I tried the /ato switch, which should activate Windows
against the known KMS servers (or Active Directory as the case may be). Again, just a
product not found error.
The next thought was that sometimes stopping and starting a service does the trick, so I
tried that next. I need to stop and start the Microsoft Software Protection Platform
Service (SPPSvc service). From an administrative command prompt, I use the trusty net
stop and net start commands. I notice at first that the service isn't running, so I think
However, after starting the service and attempting to activate Windows again, I still get
the product not found error.
I then looked at the Application Event Log on one of the trouble servers. I find an error
related to License Activation, Event ID 8198, that has a code of 0x8007007B.
While looking up this code, I found an article that says the error code means that the file
name, directory name, or volume label syntax is incorrect. Reading through the methods
described in the article, it didn't seem that any of them fit the situation. When I ran the
nslookup -type=all _vlmcs._tcp command, I found the existing KMS server (still lots of
Windows 7 and Server 2008 machines in the environment, so it was necessary to keep it
around), but also the five domain controllers as well. This indicated that it wasn't a DNS
problem and the issues were elsewhere.
So I know DNS is fine. Active Directory is properly configured as a KMS activation
source. The physical server has been activated properly. Could this be an issue with just
VMs? As an interesting side note at this point, my customer informs me that someone in
a different department has decided to build more than a dozen virtual Windows Server
2016 machines as well. So now I assume I've got another dozen servers to deal with that
won't be activating. However, those servers activated just fine.
Well, I headed back to the slmgr command to figure out how to get these monsters
activated. This time I'm going to use the /ipk switch, which will allow me to install a
product key. I went to Appendix A: KMS Client Setup Keys to get the appropriate keys
for the Standard version of Windows Server 2016. Some servers are Datacenter, but I
need to fix this one first.
I used the /ipk switch to install a product key, choosing the Windows Server 2016
Standard key.
From here on out I only captured results from my Datacenter experiences, but they were
the same. I used the /ato switch to force the activation. We get the awesome message
that the product has been activated successfully.
Using the /dlv switch again, we can see that now we have been activated by Active
Directory.
Now, what had gone wrong? Why did I have to remove the installed key and add those
generic keys to get these machines to activate properly? Why did the other dozen or so
machines activate with no issues? As I said earlier, I missed something key in the initial
stages of looking at the issue. I was thoroughly confused, so reached out to the poster
from the initial blog. The poster saw the problem right away and helped me understand
what I had missed early on.
When I ran the first /dlv switch, in the description was the key. The description was
Windows® Operating System, RETAIL Channel. I had looked at that and thought that
RETAIL Channel meant that it had been purchased and was a valid key.
When we look at the output of the /dlv switch from a properly activated server, notice
the description now states the VOLUME_KMSCLIENT channel. This lets us know that it's
indeed a volume license.
So what does that RETAIL channel mean then? Well, it means the media that was used to
install the operating system was an MSDN ISO. I went back to my customer and asked if,
by some chance, there was a second Windows Server 2016 ISO floating around the
network. Turns out that yes, there was another ISO on the network, and it had been
used to create the other dozen machines. They compared the two ISOs and sure enough
the one that was given to me to build the virtual servers was, in fact, an MSDN ISO. They
removed that MSDN ISO from their network and now we have all existing servers
activated and no more worries about the activation failing on future builds.
Feedback
Was this page helpful? Yes No
This article provides troubleshooting information to help you respond to error messages
that you may receive when you try to use a Multiple Activation Key (MAK) or the Key
Management Service (KMS) to perform Volume Activation on one or more Windows-
based computers.
7 Note
This article is intended for technical support agents and IT professionals. If you're
looking for more information about Windows activation error messages, see Get
help with Windows activation errors .
Look for the error code in the following tables, then select the link to see more
information about that error code and how to resolve it.
For more information about volume activation, see Plan for volume activation.
For more information about volume activation for current and recent versions of
Windows, see Volume Activation [client].
For more information about volume activation for older versions of Windows, see
Volume Activation information for Windows Vista, Windows Server 2008, Windows
Server 2008 R2 and Windows 7.
You can also try our Virtual Agent , which can help you quickly identify and
troubleshoot issues related to KMS and MAK activation.
Diagnostic tool
7 Note
This tool is intended to resolve Windows activation issues on computers that run
Enterprise, Professional, or Server editions of Windows.
Microsoft Support and Recovery Assistant (SaRA) simplifies Windows KMS Activation
troubleshooting.
Download the Assistant
0xC004F038
0xC004F039
0xC004F041
0xC004F074
0xC004C008
0x8007007b
0xC004C003
0x8007232B
ノ Expand table
0x80070005 Access denied. The requested action requires elevated privileges. MAK
KMS client
KMS host
0x80070490 The product key you entered did not work. Check the product key MAK
and try again, or enter a different one.
0xC004B100 The activation server determined that the computer could not be MAK
activated.
0xC004C001 The activation server determined the specified product key is MAK
invalid.
0xC004C003 The activation server determined the specified product key is MAK
blocked.
0xC004C008 The activation server determined that the specified product key KMS
could not be used.
0xC004C020 The activation server reported that the Multiple Activation Key has MAK
exceeded its limit.
0xC004C021 The activation server reported that the Multiple Activation Key MAK
extension limit has been exceeded.
0xC004F009 The Software Protection Service reported that the grace period MAK
expired.
0xC004F00F The Software Licensing Server reported that the hardware ID MAK
binding is beyond level of tolerance. KMS client
KMS host
0xC004F014 The Software Protection Service reported that the product key is MAK
not available. KMS client
0xC004F02C The Software Protection Service reported that the format for the MAK
offline activation data is incorrect. KMS client
0xC004F035 The Software Protection Service reported that the computer could KMS client
not be activated with a Volume license product key. KMS host
0xC004F038 The Software Protection Service reported that the computer could KMS client
not be activated. The count reported by your Key Management
Service (KMS) is insufficient. Please contact your system
administrator.
0xC004F039 The Software Protection Service reported that the computer could KMS client
not be activated. The Key Management Service (KMS) is not
enabled.
0xC004F041 The Software Protection Service determined that the Key KMS client
Management Server (KMS) is not activated. KMS needs to be
activated.
0xC004F042 The Software Protection Service determined that the specified Key KMS client
Error code Error message Activation
type
0xC004F050 The Software Protection Service reported that the product key is MAK
invalid. KMS
KMS client
0xC004F051 The Software Protection Service reported that the product key is MAK
blocked. KMS
0xC004F064 The Software Protection Service reported that the non-genuine MAK
grace period expired.
0xC004F065 The Software Protection Service reported that the application is MAK
running within the valid non-genuine period. KMS client
0xC004F06C The Software Protection Service reported that the computer could KMS client
not be activated. The Key Management Service (KMS) determined
that the request timestamp is invalid.
0xC004F074 The Software Protection Service reported that the computer could KMS client
not be activated. No Key Management Service (KMS) could be
contacted. Please see the Application Event Log for additional
information.
To resolve the errors, see the following causes of each error message and
troubleshooting steps.
Causes:
7 Note
This issue doesn't necessarily indicate tampering. Some applications can
install multilingual support even when that edition of Windows isn't licensed
for those language packs.
Solution:
Cause:
User Account Control (UAC) prohibits activation processes from running in a non-
elevated command prompt window.
Solution:
Cause:
This issue can occur if the KMS client can't find the KMS SRV resource records in DNS.
Solution:
For more information about troubleshooting such DNS-related issues, see Common
troubleshooting procedures for KMS and DNS issues.
0x80070490 The product key didn't work
When you encounter this issue, you see this error message:
The product key that you entered didn't work. Check the product key and try again,
or enter a different one.
Causes:
There are two possible reasons why you may encounter this issue:
Solution:
Console
Cause:
Solution 1:
On the KMS host, make sure you've enabled the firewall exception for the Key
Management Service on TCP port 1688.
Solution 2:
Check your DNS SRV records and make sure they point to a valid KMS host.
Solution 3:
If you still see this error after performing solutions 1 and 2, check your network
connections to make sure you can access the server.
You can also follow the instructions in Common troubleshooting procedures for KMS
and DNS issues.
Cause:
You can encounter this issue when the system has network or DNS issues.
Solution:
To resolve this issue, troubleshoot your network connections and DNS by following the
instructions in Common troubleshooting procedures for KMS and DNS issues.
Cause:
This error message appears when the KMS client can't find KMS server resource records
(SRV RRs) in DNS.
Solution 1:
Make sure you've installed a KMS and the DNS publishing is enabled (default). If the
DNS isn't available, point the KMS client to the KMS host by opening an elevated
command prompt and running the following command:
Console
Solution 2:
If you don't have a KMS host, get and install an MAK, then try activating the system
again.
If these solutions don't resolve the issue, see the instructions in Common
troubleshooting procedures for KMS and DNS issues.
Cause:
This error message appears when the KMS client can't find the KMS SRV records in the
DNS.
Solution:
To resolve this issue, follow the instructions in Common troubleshooting procedures for
KMS and DNS issues to troubleshoot your network connections and DNS.
Cause:
You can encounter this issue if the KMS client can't find the KMS SRV resource records in
DNS.
Solution:
To resolve this issue, follow the instructions in Common troubleshooting procedures for
KMS and DNS issues to troubleshoot your network connections and DNS.
The activation server determined that the computer could not be activated.
Cause:
You can encounter this issue when Microsoft doesn't support the MAK you're using.
Solution:
To troubleshoot this issue, verify that the MAK you're using is the same MAK that
Microsoft provided to you. To verify that the MAK is valid, contact the Microsoft
Licensing Activation Centers .
Cause:
You can encounter this issue when the MAK you enter isn't valid.
Solution:
You can try reentering the MAK to make sure you entered the correct information.
Otherwise, verify the MAK you're using is valid by contacting the Microsoft Licensing
Activation Centers .
Cause:
You can encounter this issue if the MAK is blocked on the activation server.
Solution:
Contact the Microsoft Licensing Activation Centers to obtain a new MAK. After you
obtain the new MAK, try installing and activating Windows again.
The activation server determined that the specified product key could not be used.
Cause:
This error message appears when the KMS key has exceeded its activation limit. You can
only activate KMS host keys up to 10 times on no more than six different computers.
Solution:
Contact the Microsoft Licensing Activation Centers to request more activations for
activation server permission.
The activation server reported that the Multiple Activation Key has exceeded its
limit.
Cause:
This error message appears when the MAK exceeds its activation limit. By design, you
can only activate a MAK a limited number of times.
Solution:
Request more activations to increase limit. If you require more activations, contact the
Microsoft Licensing Activation Centers .
The activation server reported that teh Multiple Activation Key extension limit has
been exceeded.
Cause:
This error message appears when the MAK exceeds its activation limit. By design, you
can only activate a MAK a limited number of times.
Solution:
Request more activations to increase extension limit. If you need more activations,
contact the Microsoft Licensing Activation Centers .
The Software Protection Service reported that the grace period expired.
Cause:
This error message appears when the grace period expires before you activate the
system. The system is currently in the Notifications state.
Solution:
The Software Licensing Server reported that the Hardware ID binding is beyond
level of tolerance.
Cause:
This error message appears when the system hardware changes or its drivers update.
Solution 1:
If you're using MAK activation, reactivate the system phone by using either online or
phone activation during the Out of Tolerance (OOT) grace period.
Solution 2:
Restart Windows.
Console
slmgr.vbs /ato
The Software Protection Service reported that the product key is not available.
Cause:
This issue happens when no product keys are installed on the system.
Solution:
1. Check the Pid.txt file located on the installation media in the \sources folder for a
KMS Setup key.
2. Install the key.
The Software Protection Service reported that the format for the offline activation
data is incorrect.
Cause:
This error message appears when the system detects the data entered during phone
activation isn't valid.
Solution:
To resolve this issue, make sure you entered the caller ID (CID) correctly.
Error: Invalid Volume License Key. In order to activate, you need to change your
product key to a valid Multiple Activation Key (MAK) or Retail key. You must have a
qualifying operating system license AND a Volume license Windows 7 upgrade
license, or a full license for Windows 7 from a retail source. ANY OTHER
INSTALLATION OF THIS SOFTWARE IS IN VIOLATION OF YOUR AGREEMENT AND
APPLICABLE COPYRIGHT LAW.
This error message indicates that the computer doesn't have a Windows marker in its
BIOS that identifies it as an OEM system running a qualifying edition of Windows. In
short, this message means the Volume License Key is invalid. This information is required
for KMS client activation.
Cause:
Microsoft only licenses Windows 7 Volume editions for upgrade. Microsoft doesn't
support installing a Volume operating system on a computer that doesn't already have a
qualifying operating system installed.
Solution:
Activate your Volume License Key by using the following steps:
1. Change your product key to a valid Multiple Activation Key (MAK) or Retail key. To
change your key, you must have both a qualifying operating system license and a
Volume license Windows 7 upgrade license, or a full license for Windows 7 from a
retail source.
2. Try to activate your key again.
If you see error message 0x80072ee2 when you attempt to activate your key again, you
need to activate your key by phone.
1. Open a command prompt and run slmgr /dti , then record the value of the
Installation ID.
2. Contact the Microsoft Licensing Activation Center and provide the Installation ID
in order to receive a Confirmation ID.
3. To activate by using the Confirmation ID, run slmgr /atp <Confirmation ID> .
The Software Protection Service reported that the computer couldn't be activated.
The count reported by your Key Management Service (KMS) is insufficient. Please
contact your system administrator.
Cause:
You normally encounter this issue when the count on the KMS host isn't high enough.
For Windows Server, the KMS count must be greater than or equal to five. For Windows
(client), the KMS count must be greater than or equal to 25.
Solution:
Add computers to the KMS pool. Before you can use KMS to activate Windows, you
must have more computers in the KMS pool. To obtain the current count on the KMS
host, run Slmgr.vbs /dli .
The Software Protection Service reported that the computer couldn't be activated.
The Key Management Service (KMS) isn't enabled.
Cause:
Solution:
To resolve this issue, troubleshoot the network connection between the KMS host and
the client. Make sure that a firewall isn't blocking or otherwise filtering TCP port 1688
(default).
The Software Protection Service determined that the Key Management Server (KMS)
isn't activated. KMS needs to be activated.
Cause:
This issue occurs when the KMS host hasn't been activated.
Solution:
To resolve this issue, activate the KMS host by using either online or telephone
activation.
The Software Protection Service determined that teh specified Key Management
Service cannot be read.
Cause:
You may encounter this issue when the KMS client tried to contact a KMS host that
couldn't activate the client software. This scenario is common in mixed environments
with application-specific and operating system-specific KMS hosts.
Solution:
To resolve this issue, make sure your KMS clients are connection to the correct hosts,
especially if you're using specific KMS hosts to activate specific applications or OSes.
The Software Protection Service reported that the product key is invalid.
Cause:
You can encounter an issue if there was a typo or if you try to use a Beta key on a
generally available version of the operating system.
Solution:
To resolve this issue, make sure you're installing the correct KMS key on the
corresponding version of Windows. Make sure you've entered the correct characters and
numbers. If you're copying and pasting the key, make sure the Clipboard didn't replace
the hyphens with em-dashes.
The Software Protection Service reported that the product key is blocked.
Cause:
This error message appears when Microsoft blocks the product key.
Solution:
To resolve this issue, get a new MAK or KMS key, install it on the system, then try
activating again.
0xC004F064 The Software Protection Service reported
that the non-genuine grace period expired
When you encounter this error, you see this error message:
The Software Protection Service reported that teh non-genuine grace period
expired.
Cause:
This error occurs when Windows Activation Tools (WAT) determines that a system that's
trying to be activated isn't authentic.
Solution:
To resolve this issue, contact the Microsoft Licensing Activation Centers for assistance.
The Software Protection Service reported that the application is running within the
valid non-genuine period.
Cause:
You may encounter this error message because WAT has determined the system trying
to activate isn't genuine. However, because of the Non-Genuine Grace Period, the
system continues to run.
Solution:
To resolve this issue, you must get and install a genuine product key, then activate the
system before the grace period ends. If you don't, the system goes into the Notification
state at the end of the grace period.
Cause:
You can encounter this issue if the system time on the client computer is too different
from the time on the KMS host. Time synchronization is important to system and
network security, so desynchronization can cause issues to occur.
Solution:
To resolve this issue, you need to change the system time on the client to match the
KMS host. We recommend you use a Network Time Protocol (NTP) time source or Active
Directory Domain Services for time synchronization. This issue uses UTP time, so time
zone selection doesn't affect it.
The Software Protection Service reported that the computer couldn't be activated.
No Key Management Service (KMS) could be contacted. Please see the Application
Event Log for additional information.
Cause:
This issue occurs when all the KMS host systems your client tires to contact return errors.
Solution:
Feedback
Was this page helpful? Yes No
This article provides solutions to an issue where Windows Activation fails with the error
code 0x8007267C.
Applies to: Windows 10 - all editions, Windows 7 Service Pack 1, Windows Server 2012
R2
Original KB number: 2009462
Symptoms
Windows Activation fails with the error code 0x8007267C.
Cause
This issue will occur if the machine attempting to activate does not have a DNS server
registered in its network properties.
1. On the client getting the error, open a command prompt and run IPCONFIG /all .
2. Verify the assigned IP address, subnet mask, DNS server and default gateway are
set with the correct values for your environment.
3. Verify basic IP connectivity to the DNS Server using the PING command using the
address of the DNS server from step 1.
Troubleshooting TCP/IP
After resolving the connectivity issues to the DNS server, reattempt activation using the
following command from an Elevated Command prompt
Console
Use the following command to change the product key to the MAK product key:
Then, launch the phone activation wizard to complete the activation of the machine slui
04.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article describes the The product key entered does not match any of the Windows
images available for installation. Enter a different product key error that occurs when
you install Windows.
Applies to: Windows 10 - all editions, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2
Original KB number: 2796988
Symptoms
During the installation of Windows, the setup may fail after prompting for language and
keyboard selections. Additionally, you may receive the following error message:
The product key entered does not match any of the Windows images available for
installation. Enter a different product key.
Cause
This problem can occur if the supplied product key doesn't match the media that is
being used to install Windows. The supplied product key may be in an unattended file,
in the EI.CFG file, in the PID.txt file, or in the firmware of the BIOS. Windows computers
that come with the operating system installed ship with the product key in the firmware,
and if that product key doesn't match the media, you'll see the error message above.
For example: Installing Windows Server on a computer than came from the
manufacturer with Windows 10 installed is likely to cause this problem.
Resolution
To resolve this problem, use one of the following methods that applies to the scenario:
1. If there's an Unattend file, Edition Configuration (EI.cfg) file or the Product ID
(PID.txt) file on the system, change the product key to the correct one for the
media you're trying to install.
2. If the system has a Product key in the Motherboard (O. A. 3.0 [OEM Activation]
supplies an OEM product key in the firmware) you should use an Unattend file,
Edition Configuration (EI.cfg) file or the Product ID (PID.txt) file.
More information
When installing Windows, setup.exe uses the following priority logic for product keys:
If a key is supplied, the key is attempted to be use with the image that is available on
the media being installed. If the supplied product key doesn't match step 1 from above
logic, an image in the WIM file, then the setup will fail with the error message
mentioned in Symptoms section. If there's no product key supplied in the step 1 and
step 2, you'll get the product key prompt during setup.
7 Note
Volume License media supplies a product key with the media so it succeeds
with step 1 logic.
You should not see this issue with Volume License media unless you are using
an Unattend file or have modified files on the media to change or replace the
EI.cfg or PID.txt.
How to drop a PID.txt with the product key specified: Windows Setup Edition
Configuration and Product ID Files (EI.cfg and PID.txt)
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article helps fix the 0x80070005 error that occurs when you log on to a computer.
Symptoms
When you log on to a computer that is running Windows, you receive the following
Windows Activation message:
Additionally, the desktop background is black, and you receive the following error
message in the lower-right corner of the screen:
7 Note
To view the System properties, click Start, click Control Panel, click System and
Security, and then click System.
If you use the slmgr.vbs /dlv script to view the licensing status, you receive the following
message:
Error: 0x80070005 Access denied: the requested action requires elevated privileges
7 Note
This error message may also occur when a command that is being executed
requires an elevated command prompt and is unrelated to the issue discussed
here.
If you see a message that Windows might not be genuine, and there's no
error code, go to Genuine Windows: frequently asked questions .
Resolution
To resolve this problem, use the following methods, depending on your scenario.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Profilelist\S-1-5-
20
The permissions may have been removed when a Plug and Play Group Policy Object
(GPO) was applied.
a. On the computer that is experiencing the Activation error message, run the
Resultant Set of Policy wizard. To do this, click Start, type rsop.msc in the Search
box, and then press Enter.
Computer Configuration
Windows Settings
Security Settings
d. If the Plug and Play service is configured through a Group Policy setting, you
see the GPO listed here with settings other than Not Defined. Additionally, you
can see which GPO is applying this setting.
2. Open the GPO that is identified in step 1, and then open the corresponding Group
Policy setting.
3. Click Edit Security, and then click Advanced.
4. In the Advanced Security Settings for Plug and Play window, click Add, and then
add the SERVICE account.
5. Click OK.
6. Select the following permissions in the Allow section, and then click OK:
Query template
Query status
Enumerate dependents
Interrogate
User-defined control
Read permissions
7 Note
7. Run gpupdate /force after you apply the previous permissions to the Group Policy
setting. To do this, click Start, type gpupdate /force in the Search box, and then
press Enter.
8. Make sure that the appropriate permissions are applied. To do this, click Start, type
sc sdshow plugplay in the Search box, and then click OK.
The following are the permissions that are applied to the Plug and Play service in the
security descriptor definition language (SDDL):
D:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)
(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)
(A;;CCLCSWLOCRRC;;;IU)
(A;;CCLCSWLOCRRC;;;SU)
S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
(A;;CC LC SW LO CR RC ;;;SU is an Access Control Entry (ACE) that allows the following
rights to SU (SDDL_SERVICE - Service logon user):
A: Access Allowed
CC: Create Child
LC: List Children
SW: Self Write
LO: List Object
CR: Control Access
RC: Read Control
SU: Service Logon User
If there are no GPOs in place, the default registry permissions have been changed. To
work around this problem, follow these steps:
1. Start Registry Editor on the computer that is receiving the error message. To do
this, click Start, type regedit in the Search box, and then press Enter.
5. Click NETWORK SERVICE, and then select the Full Control and Read permissions.
6. Click OK.
8. After you restart the computer, you may have to activate the copy of Windows.
Complete the activation.
7 Note
This method is intended for advanced computer users and cannot be performed on
computers that are running Windows 7 Home Premium, Windows 7 Home Basic, or
Windows 7 Starter. For help with advanced troubleshooting, ask your system
administrator or Contact Microsoft .
2. Disable the Group Policy settings and force the Group Policy to be reapplied. To do
this, follow these steps:
3. Edit the Group Policy that is identified in Step 1 and change the setting to Not
Defined. Or, follow the steps in Method 1 to add the required permissions for the
Network Service account.
4. Reapply the Group Policy setting. To do this, click Start, type gpupdate /force in
the Search box, and then press Enter.
7 Note
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Profilelist\S-
1-5-18
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Profilelist\S-
1-5-19
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Profilelist\S-
1-5-20
1. Copy the text below into a text editor such as Notepad, and then save the text file
as Profilelist.reg.
2. Merge profilelist.reg. To do this, right-click the file that you saved in step 1, and
then click Merge.
4. Activate Windows.
Check whether the problem is fixed. If the problem is fixed, you're finished with this
section. If the problem isn't fixed, you can contact support .
Advanced information
Because the Licensing service uses Plug and Play to obtain hardware ID information and
binds the license to the computer, this setting can result in an activated system
appearing to be out of tolerance. The default permissions of the Plug and Play policy
don't grant the Licensing service the appropriate rights to access the Plug and Play
service. The Licensing service runs under the Network Service account.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
This article provides a solution to an 0xc004f063 error that occurs when you try to
activate or validate an OEM version of Windows.
Symptoms
When you try to validate an OEM version of Windows 8 or Windows Server 2012, you
may receive the following error message:
Error code : 0xc004f063 The Software Licensing Service reported that the computer
BIOS is missing a required license.
Cause
This error usually occurs if a hardware is changed or any hardware device malfunctions
and Windows is unable to verify the license again. Windows is unable to read the SLIC
table in the BIOS that is required to be able to self-activate the OEM_SLP Key that is
currently in use. This happens due to one of the following reasons:
1. Service Tag or the Service Number is not updated by the OEM vendor after
motherboard replacement.
2. BIOS contains a default or a garbage value for Service Tag.
3. BIOS has incorrect product information.
Resolution
Contact the OEM vendor to update the BIOS that has the updated Serial Number or
Service Tag.
More information
This issue mostly occurs on OEM_SLP machines wherein Windows is bound with the
Service Tag of the machine. If an OEM_SLP Windows is validating its license after any
hardware change apart from the key, it will also verify the Service Tag number in the
BIOS.
7 Note
To check the Service Tag number on a machine, run the command wmic bios get
serialnumber .
Upgrading the BIOS is an effort to put the correct SLIC table on the machine. Software
Licensing Description Table (SLIC) is a digital signature placed inside the BIOS by the
system manufacturer. The OEM-SLP Key, and an XML formatted OEM certificate (issued
by Microsoft to each OEM) will be verified against this OEM-specific SLIC and auto
activate if everything is in order.
Data collection
If you need assistance from Microsoft support, we recommend you collect the
information by following the steps mentioned in Gather information by using TSS for
deployment-related issues.
Feedback
Was this page helpful? Yes No
The topics in this section provide solutions and scenario guides to help you
troubleshoot and self-solve Networking-related issues. The topics are divided into
subcategories. Browse the content or use the search feature to find relevant content.
Feedback
Was this page helpful? Yes No
This article describes how to resolve an issue in which you see an access denied error
when you try to create a domain-based namespace.
Symptoms
When you sign in to Windows by using an account that belongs to the Domain Admins
group, and then you try to create a domain-based namespace on any Distributed File
System (DFS) namespace server, the operation fails. Windows returns an error message
that resembles the following:
However, when this error occurs, you can still successfully create a standalone
namespace.
Cause
When you create a new domain-based namespace, the computer queries the Domain
Name System (DNS) server for domain information. The DNS server responds by
sending a list of the A records of the domain controllers for that domain. The computer
then contacts one of the domain controllers, and tries to use your account credentials to
authenticate by using NTLM authentication.
If your account belongs to the Protected Users group, your account can't use NTLM
authentication. In this situation, authentication fails and generates a
STATUS_ACCOUNT_RESTRICTION error.
Resolution
To resolve the issue, remove your account from the Protected Users group.
More information
Protected Users Security Group
Guidance about how to configure protected accounts
Feedback
Was this page helpful? Yes No
This article provides workarounds to solve the error messages that occur when you try
to use different user credentials to connect to the other network share.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1, Windows
7 Service Pack 1
Original KB number: 938120
Symptoms
Consider the following scenario:
The network folder specified is currently mapped using a different user name and
password. To connect using a different user name and password, first disconnect
any existing mappings to this network share.
If you select OK in response to the error message, you receive the following error
message:
Multiple connections to a server or shared resource by the same user, using more
than one user name, are not allowed. Disconnect all previous connections to the
server or shared resource and try again.
Status
This behavior is by design.
Workaround 1
Use the IP address of the remote server when you try to connect to the network share.
Workaround 2
Create a different Domain Name System (DNS) alias for the remote server, and then use
this alias to connect to the network share.
After you use one of these methods, you can use different user credentials to connect to
the network share. In this situation, the computer behaves as if it is connecting to a
different server.
Feedback
Was this page helpful? Yes No
This article explains how to troubleshoot event ID 1020 events on a Server Message
Block (SMB) file server.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4562940
Symptoms
On a Windows Server-based SMB file server, you observe Event ID 1020 events from
SMB-Server in the Microsoft-Windows-SMBServer/Operational event log. The
information in these events resembles the following message:
When Windows logs these events, you might also observe the following symptoms:
The SMB server's clients experience performance problems. Because the SMB
server accesses the local filesystem on behalf of its SMB clients, performance issues
on the SMB server directly affect the clients. Client applications can experience very
long wait times if their interaction with the SMB server involves several consecutive
operations and each operation experiences a delay.
The SMB server's clients might have trouble accessing shares that the SMB server
manages.
The SMB server's local applications or other components experience performance
issues. Those applications and components might not be able to log such
performance issues.
The SMB server appears to stop responding.
7 Note
The performance problems might not affect all the SMB server's disks at the same
time or to the same degree.
Cause
Event ID 1020 indicates that the SMB server's file system can't complete a read/write
(I/O) operation within the time that's allowed. By default, the time allowed is 15 seconds.
Typically, we expect such operations to finish within a single-digit millisecond time
frame.
Malfunctioning file system filter drivers can cause delays of several seconds. Issues that
involve the SMB server's physical disks can also cause severely reduce performance.
Such issues include the following:
File system delays that are less than the 15-second threshold don't produce a warning
event but do reduce the SMB server's performance.
Resolution
Because the cause of these file system delays might depend on the specifics of your
environment, you typically have to gather more data to isolate your specific issue.
Start by reviewing the SMB server event log. Event ID 1020 events include information
that can help you identify details and patterns. The event data includes the exact
duration of the delay and the SMB command code that encountered the delay. For a list
of SMBv2 command codes, see 2.2.1.2 SMB2 Packet Header - SYNC.
Collect trace logs
To further diagnose whether the problem originates from inside the Windows operating
system (for example, filter drivers) or from outside (for example, hardware, hypervisor,
network, or storage), use an application such as Storport Trace to collect trace data. Use
a tool such as StorPortPacman to check the disk response times. StorPort traces at the
lower end of the Windows storage stack, and the SMB server (or any other application)
encounters the delays at the upper end of the stack. For more information about
StorPortPacman, see Deciphering Storport Traces 101.
High maximum response times at the StorPort level indicate that the cause for the
performance issues resides outside the operating system. To determine what latencies
the system encounters from its logical disks at application (file server) level, enable
Perfmon or WPR tracing. Such trace data also shows latencies that are less than the 15-
second warning threshold. For more information, see Measuring Disk Latency with
Windows Performance Monitor (Perfmon).
Event ID 1031: The server detected a problem and has captured a live kernel dump
to collect debug information.
Event ID 1032: The server detected a problem but was unable to capture a live
kernel dump to collect debug information.
Feedback
Was this page helpful? Yes No
Symptoms
When Windows writes information to the physical disk, it might log the following event
messages in the System log:
Event ID: 50
Event Type: Warning
Event Source: Ftdisk
Description: {Lost Delayed-Write Data} The system was attempting to transfer file
data from buffers to \Device\HarddiskVolume4. The write operation failed, and only
some of the data may have been written to the file.
Data:
0000: 00 00 04 00 02 00 56 00
0008: 00 00 00 00 32 00 04 80
0010: 00 00 00 00 00 00 00 00
0018: 00 00 00 00 00 00 00 00
0020: 00 00 00 00 00 00 00 00
0028: 11 00 00 80
Event ID: 26
Event Type: Information
Event Source: Application Popup
Description: Windows - Delayed Write Failed : Windows was unable to save all the
data for the file \Device\HarddiskVolume4\Program Files\Microsoft SQL
Server\MSSQL$INSTANCETWO\LOG\ERRORLOG. The data has been lost. This error
may be caused by a failure of your computer hardware or network connection.
These event messages mean exactly the same thing and are generated for the same
reasons. This article focuses on event ID 50.
7 Note
The device and path in the description and the specific hexadecimal data in these
messages vary depending on the exact circumstances that caused the event.
More information
There are several different sources for an event ID 50 message. For example, an event ID
50 message that's logged from a MRxSmb source occurs if there's a network
connectivity problem that involves the redirector. This article addresses event ID 50
messages that refer to disk write problems. Review the event ID 50 message to verify
that it refers to a disk write problem and that this article applies.
In this context, Windows logs an event ID 50 message if a generic error occurs when
Windows tries to write information from the file system Cache Manager (not the
hardware-level cache) to the physical disk. This write behavior, known as write-back or
delayed-write caching, is part of the memory management function of Windows. Write-
back caching improves system performance. However, failures in the delayed-write
operations might cause a loss of data or volume integrity.
Typically, when an application sends a write request to Windows, Cache Manager caches
the write request and reports to the application that the write was successful. Later,
Cache Manager writes the data to the physical disk and then clears the cache. If an error
occurs during the write operation, the data is lost when Cache Manager clears the cache.
Applications or processes that write non-critical data, such as logging processes, use
Cache Manager to improve overall performance. Applications that write critical data,
such as SQL Server, do not use Cache Manager. Such applications set a
FILE_FLAG_NO_BUFFERING flag to guarantee that the transaction is completed directly to
Event ID: 50
Event Type: Warning
Event Source: Ftdisk
Description: {Lost Delayed-Write Data} The system was attempting to transfer file
data from buffers to \Device\HarddiskVolume4. The write operation failed, and only
some of the data may have been written to the file.
Data:
0000: 00 00 04 00 02 00 56 00
0008: 00 00 00 00 32 00 04 80
0010: 00 00 00 00 00 00 00 00
0018: 00 00 00 00 00 00 00 00
0020: 00 00 00 00 00 00 00 00
0028: 11 00 00 80
You can identify the disk that was the target of the write operation by using the
symbolic link that's listed for the drive in the "Description" section of the event ID
message, for example: \Device\HarddiskVolume4.
Event ID 50 messages (and also event ID 9, 11, 51 or similar "DISK" messages) include
binary data that you can use to help identify the problem. The message includes the
following data section:
Data:
0000: 00 00 04 00 02 00 56 00
0008: 00 00 00 00 32 00 04 80
0010: 00 00 00 00 00 00 00 00
0018: 00 00 00 00 00 00 00 00
0020: 00 00 00 00 00 00 00 00
0028: 11 00 00 80
7 Note
When you are converting the hexadecimal data in the event ID message to the
status code, remember that the values are represented in the little-endian format.
The following table describes what each offset of this message represents.
ノ Expand table
The final status code is the most important piece of information in an event ID 50
message. This is the error code that's returned when the write request is made, and it's
the key source of information. In the example, the final status code is listed at 0x28 at
the sixth line of the data set. In starts with "0028:" and includes the four octets in this
line:
0028: 11 00 00 80
When you convert the hexadecimal data in the event ID 50 message to the status code,
remember that the values are represented in the little-endian format. Because the status
code is the only piece of information that you're interested in, it might be easier to view
the data in WORDS format instead of BYTES. If you do this, the bytes will be in the
correct format and the data might be easier to interpret quickly.
To change your view of the data, select Words in the Event Properties window. In the
Data Words view, the data section of the example reads as follows:
Output
() Bytes (.)
Words 0000: 00040000 00560002 00000000 80040032 0010: 00000000 00000000
00000000 00000000 0020: 00000000 00000000 80000011
In this case, the final status code is 0x80000011. This status code maps to
STATUS_DEVICE_BUSY and implies that the device is currently busy. This was the reason
For more information about NT status codes, see Using NTSTATUS Values. The list of
codes is also available in the Windows Software Developers Kit (SDK), in the
NTSTATUS.H file.
In the example, the event category code (the code that's associated with event ID 50) is
listed in the second line. This line starts with "0008:" and it includes the last 4 bytes of
the following line:
0008: 00 00 00 00 32 00 04 80
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where information on shared folder sessions
is populated slow in Computer Management console.
Symptoms
When trying to view the information about client sessions by clicking Shared Folders >
Sessions in the Computer Management console, it may take a long time to populate the
information, and the console may stop responding or appear to hang.
Cause
Computer Management will try to resolve the client IP address to user-friendly NetBIOS
name. In and IPv6 and IPv4 hybrid environment, and clients use NetBIOS to access share
folders, if the NetBIOS name cannot be resolved, it shows the IPv6 address immediately.
However, if clients are using ipv4 to access share folder, the failure of resolving to the
NetBIOS name causes the Computer Management console to hang.
Resolution
1. Disable NetBIOS over TCP/IP:
a. Run ncpa.cpl.
b. Right-click the NIC.
c. Select properties.
d. Click TCPIPV4.
e. Click advanced.
f. Click WINS.
g. Choose Disable Netbios over TCPIP.
2. Configure reverse lookup zone in DNS server. It is useful to computers that are
added in domain.
Feedback
Was this page helpful? Yes No
This article describes how to configure a DFSN server to operate in that environment.
Summary
By default, a Microsoft Distributed File System Namespace (DFSN) root referral reply to a
DFS root referral query is in NetBIOS name format ( \\<Server>\<Share> ). It's necessary
in certain environments that rely on NetBIOS and makes it possible for clients that
support NetBIOS-only name resolution to locate and connect to targets in the DFS
namespace. By default, Windows clients work fine with it.
However, some clients don't use NetBIOS. Two examples are clients that aren't running
Windows and clients that operate in an environment without WINS or that use DNS
name suffixes. Those clients are incompatible with the default DFSN behavior.
In these cases, the client may be unable to resolve the server name that is returned from
the root referral query. However, this problem can be addressed easily, because DFSN
can be configured to operate in a DNS-only environment.
7 Note
For namespace servers that are hosting only stand-alone namespaces, some steps
that are described in this article are unnecessary. (Such namespace servers include
clustered namespaces.) By default, DFSN clients can access such stand-alone
namespaces through either \\< Server-NetBIOS>\\<Namespace> or \\<Server-
FQDN>\\<Namespace> namespace paths. However, namespace server configuration is
The steps that are described in this article apply to all DFS namespace servers,
regardless of whether such namespace servers also act as Active Directory domain
controllers.
Four stages
The overall approach consists of the following four stages:
7 Note
Before you continue with the following steps for stage 3, we recommend that you
back up the namespace metadata to guard against unexpected failures or
accidents. The backup steps, together with the other restore steps if you ever need
them, are covered in steps A and C of the Steps for stage 4 section.
7 Note
The DFSN Windows PowerShell cmdlets that are mentioned in this section are
available only starting with Windows Server 2012 or Windows 8.
1. Obtain the list of domain-based namespaces that are hosted on the server. To do
it, use one of the following methods:
PowerShell
PowerShell
2. 7 Note
You can skip the following step for namespace servers that host only stand-
alone namespaces.
PowerShell
PowerShell
servers hosting your namespace, you can skip step C that follows.
3. 7 Note
You can skip the following step for namespace servers that host only stand-
alone namespaces. You can also skip this step if you confirm that there are
multiple namespace servers that are hosting your namespace.
If there's only one namespace server for your namespace, you should temporarily
add a new namespace server before you remove the existing server. (See Add
Namespace Servers to a Domain-based DFS Namespace or New-DfsnRootTarget
cmdlet.) Or, you must save the namespace metadata for a re-creation later. (To do
it, see steps A and C of the Steps for stage 4 section.) However, you should be
aware that the second approach will cause a transient downtime for the
namespace.
4. 7 Note
You can skip the following step for namespace servers that host only stand-
alone namespaces.
Remove each hosted domain-based namespace from the server. To do it, use one
of the following methods:
PowerShell
PowerShell
5. Enable the DFSN FQDN root referral behavior. To do it, use one of the following
methods:
PowerShell
PowerShell
6. Restart the DFSN service. To do it, use one of the following methods:
PowerShell
PowerShell
Net stop dfs; Net start dfs
7. 7 Note
You can skip the following step for namespace servers that are hosting only
stand-alone namespaces.
Restore each namespace that you previously removed from this namespace server.
To do this, use one of the following methods:
PowerShell
PowerShell
XML
2. Make any necessary FQDN-related adjustments to folder targets. For each "Target"
XML element that is contained in a "Link" XML element, change its NetBIOS
reference to its equivalent FQDN reference.
XML
XML
XML
References
For more information about related topics, see:
Feedback
Was this page helpful? Yes No
This article helps to fix the error message "Delayed Write Failed" which states that your
data has been lost.
Symptoms
When writing to a network share, a failure may cause the following event to be written
to the event log:
Event ID: 50 {Delayed Write Failed} Windows was unable to save all the data for the
file <file>. The data has been lost. This error may be caused by a failure of your
computer hardware or network connection. Please try to save this file elsewhere.
Cause
This error can occur if there are pending cached writes to a file located on a remote
network share and the connection to that file is unexpectedly terminated. The
connection to the file could have been terminated for various reasons, including
network communication failures and filter drivers on either the client or the server
canceling the write I/O. When this error occurs, the pending cached write I/O in memory
cannot be written to the target file on the remote network share. The delayed write fails
and the target file may now be corrupt.
More information
It is the responsibility of the application to handle this error. Some applications may try
to reconnect to the remote file and retry the write operation. Other applications may
ignore the error or fail altogether and leave the target file corrupted. Some applications
like Windows Explorer may report the error to the user if a file copy fails. In the scenario
of a failed file copy, the source file remains unchanged and copy operation can be
restarted, overwriting the corrupted targeted remote file.
For more information, see the following link:
https://support.microsoft.com/kb/816004
Feedback
Was this page helpful? Yes No
This article provides some information about the DFS Namespaces service and its
configuration data.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1
Original KB number: 977511
Summary
The Distributed File System (DFS) Namespaces service stores configuration data in
several locations. If some of this data is missing or inaccessible, you may experience
failures and be unable to create a namespace.
Introduction
This article discusses the following topics to help you create a namespace:
More information
7 Note
On the stand-alone namespace servers, registry keys store all the namespace
configuration data.
If any subset of the configuration data is missing or invalid, you may be unable to
manage the namespace. Additionally, you may receive many different error messages
when you manage DFS Namespaces by using the DFS Namespaces Microsoft
Management Console (MMC) snap-in, the Dfsutil.exe tool, or the Dfscmd.exe tool or
when a client accesses the namespace. See the Symptoms and error messages section
for a list of possible error messages.
For more information about how to back up the system state of a server that is running
Windows Server 2003, visit the following Microsoft Web site:
https://technet.microsoft.com/library/cc759141.aspx
For more information about how to back up the system state of a server that is running
Windows Server 2008, visit the following Microsoft Web site:
https://technet.microsoft.com/library/cc770266.aspx
7 Note
The following steps should only be used if recovery of the configuration data is not
possible or is not desired.
For more information about the recovery process for a DFS namespace, click the
following article number to view the article in the Microsoft Knowledge Base:
969382 Recovery process of a DFS Namespace in Windows 2003 and 2008 Server
a. Open the Adsiedit.msc tool. This tool is included in Windows Server 2008 and
requires that the AD DS role or tools are installed. This tool is available in
Windows Server 2003 Support Tools.
For more information about the Adsiedit.msc tool, visit the following Microsoft
Web site:
https://technet.microsoft.com/library/cc773354(WS.10).aspx
7 Note
Active Directory replication latencies may delay this change operation from
propagating to the remote domain controllers.
2. On any namespace servers that are hosting the namespace, verify the removal of
the DFS namespace registry configuration data. If other functioning namespaces
are hosted on the server, make sure that the registry key of only the inconsistent
namespace is removed. To remove the DFS namespace registry configuration data,
follow these steps:
a. In Registry Editor, locate the configuration registry key of the namespace at the
appropriate path by using one of the following paths:
Console
dfsutil /clean /server:<servername> /share:<sharename> /verbose
7 Note
c. On the namespace server, restart the DFS service in Windows Server 2003 or the
DFS Namespaces service in Windows Server 2008 to register the change on the
service.
3. Remove the file share that was associated with the namespace from the
namespace servers. Failure to follow this step may cause the recreation of the
namespace to fail because DFS Namespaces may block the namespace creation.
The system cannot stop sharing <\server\share> because the shared folder
is a Distributed File System (DFS) namespace root
Changing the DFS namespace configuration data should only be considered after you
evaluate all other recovery options. We recommend that you regularly obtain backups of
the system state for the DFS namespace servers and for the domain controllers of
domain-based DFS namespaces. These backups may be used to restore the namespace
configuration to full operation without the risk of having inconsistent DFS namespace
configuration data.
In the Dfsmgmt.msc tool, you may receive the following error messages:
The server you specified already hosts a namespace with this name. Please
select another namespace name or another server to host the namespace.
The namespace is not unique in the domain in which the namespace server
was created. You must go back to choose a new namespace name, or change
the namespace type to stand-alone.
The DFS root "namespace1" already exists. Please give a different name for the
new DFS root.
The following error occurred while creating DFS root on server servername:
Cannot create a file when that file already exists.
Dfsutil.exe
In the Dfsutil.exe tool, you may receive the following error message:
Dfscmd.exe
In the Dfscmd.exe tool, you may receive the following error messages:
System error 2 has occurred. The system cannot find the file specified.
DFS clients
On a computer that is running the DFS client, you may receive the following error
messages:
Windows cannot find '\\ domain.com \namespace\folder'. Make sure you typed
the name correctly, and then try again.
File not found.
Feedback
Was this page helpful? Yes No
This article provides solutions for the issue that DNS CNAME alias can't access SMB file
servers.
Applies to: Windows 10 - all editions, Windows Server 2019, Windows Server 2016,
Windows Server 2012 R2, Windows 7 Service Pack 1
Original KB number: 3181029
Symptoms
Configuration
You're running an SMB file server, such as Windows Server. The server has files and
resources that are configured by using their NetBIOS name, the DNS fully qualified
domain name (FQDN), and their alias (CNAME).
You have a client that's running Windows 7, Windows Server 2008 R2, or a later
version of Windows.
Scenarios
When an application or user uses the actual storage name (the NetBIOS name or
the FQDN) for files or other resources on the server that's using SMB, access is
successful.
When an application or user uses the CNAME alias for files or other resources on
the server that's using SMB, and you try to connect to a share on the file server
with its DNS CNAME alias. For example, you try to connect to a share on the file
server by using its DNS CNAME alias:
Console
Open Folder
\\uncpath is not accessible. You might not have permission to use this
network resource. Contact the administrator of this server to find out if you
have access permissions.
Cause
If you use Network Monitor, Wire Shark, or Microsoft Message Analyzer to
examine the network trace when the SMB Session Setup is successful, the session
goes to the TREE Connect.
However, if you examine the network trace when the SMB Session Setup is
unsuccessful, the session fails with a Kerberos KRB_AP_ERR_MODIFIED error. Here's
an example of an unsuccessful SMB Session Setup request in a network trace:
Output
If the file server name was resolved through DNS, the SMB client appends the DNS
suffix to the user-supplied name. That is, the first component of the SPN will
always be the user supplied name as in the following example:
Console
CNAME.contoso.com\share_name
7 Note
This try would fail on older SMB implementations (Like AIX Samba 3.5.8), that
cannot be configured for Kerberos authentication and does not listen to SMB
direct host port 445, but only on NetBIOS port 139.
If the file server name was resolved through some other mechanism such as
NetBIOS
Link-Local Multicast Name Resolution (LLMNR)
Peer Name Resolution Protocol (PNRP) processes
the SMB client uses the user supplied name such as the following one:
Console
CNAME\share_name
Resolution
To resolve this issue on a file server that is running the SMB version 1 protocol, add the
DisableStrictNameChecking value to the registry:
Registry location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parame
ters
DWORD name: DisableStrictNameChecking
DWORD value: 1
) Important
Do not use DNS CNAMEs in the future for file servers. If you want to still give
alternate names to servers, you can do so with the following command:
NETDOM COMPUTERNAME/ADD
We don't recommend that you resolve this issue for a file server that isn't Windows-
based by typing the following commands in an elevated Command Prompt window on
a Windows-based computer. You would have to be logged on with Domain
Administrator credentials. Then press Enter at the command prompt to register the SPN
for the CNAME of the non-Windows-based File Server storage device:
Console
7 Note
If you use Windows 2012 Clustering, install the hotfix for down-level clients in
which Windows XP or Windows Server 2003 computers cannot connect: Can't
access a resource that is hosted on a Windows Server 2012-based failover
cluster .
If you create a CNAME for the clustered name the clients are connecting to,
you have to make sure that you set the properties on that Clustered name so
that it responds to the CNAMEs: How to configure an alias for a clustered
SMB share with Windows Server 2012 .
Network trace
To collect a network trace, follow these steps:
1. Open an elevated Command Prompt window, type the following command, and
then press Enter:
Console
2. Delete any existing File Server network connections by running the following
command:
Console
a. To delete the DNS cache, type the following command, and then press Enter:
Console
IPCONFIG /FLUSHDNS
b. To delete the NetBIOS cache, type the following command, and then press
Enter:
Console
NBTSTAT /RR
c. To delete the Kerberos cache, type the following command, and then press
Enter:
Console
KLIST /PURGE
d. To delete the ARP cache, type the following command, and then press Enter:
Console
ARP -d
4. Try to connect to the network share by typing the following command and then
pressing Enter:
Console
Console
Console
7 Note
The registry setting files (.HIV) are saved to the TEMP folder on the file server.
Console
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters
\SmbServerNameHardeningLevel
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters
\DisableStrictNameChecking
An enterprise hotfix rollup is available for Windows 7 SP1 and Windows Server 2008 R2
SP1
"Delayed write failed" error message when .pst files are stored on a network file
server that is running Windows Server 2008 R2
You experience a long logon time when you try to log on to a Windows 7-based or
a Windows Server 2008 R2-based client computer that uses roaming profiles
OpsMgr 2012 or OpsMgr 2007 R2 generates a "Heartbeat Failure" message and
then goes into a greyed out state in Windows Server 2008 R2 SP1
References
Error message when you try to access a server locally by using its FQDN or its
CNAME alias after you install Windows Server 2003 Service Pack 1: "Access denied"
or "No network provider accepted the given network path"
MS08-068: Vulnerability in SMB could allow remote code execution
Can't access a resource that is hosted on a Windows Server 2012-based failover
cluster
List of currently available hotfixes for the File Services technologies in Windows
Server 2008 and in Windows Server 2008 R2
List of currently available hotfixes for the File Services technologies in Windows
Server 2012 and in Windows Server 2012 R2
Add DisableStrictNameChecking registry key
DisableStrictNameChecking; server alias doesn't work from the actual server
Why do we need SPN for File Server (NAS / RAS / File Share System) DNS Alias
(Cname)
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where users fail to access a share on a file
server that is running Windows Server 2012 R2.
Symptoms
When domain users try to access a share on a file server that is running Windows Server
2012 R2, they cannot access the share, and they receive the following error message:
Additionally when this problem occurs, Event ID 4 and Event ID 1097 are logged in the
Server log. This problem may occur for several hours or up to a day. Then, the user loses
access to the share on the server.
Event ID 4
Output
Event ID 1097
Output
The processing of Group Policy failed. Windows could not determine the
computer account to enforce Group Policy settings. This may be
transient. Group Policy settings, including computer configuration,
will not be enforced for this computer.
Cause
This problem occurs because the file server cannot decrypt the ticket that was encrypted
in AES256.
Resolution
To resolve this problem, set the value of the SupportedEncryptionTypes attribute to
0x7fffffff. To do this, follow these steps:
7 Note
erberos\parameters .
Status
Microsoft has confirmed that this is a problem in Windows Server 2012 R2.
References
Kerberos
Kerberos Enhancements
You cannot log on to a Windows 7-based or Windows Server 2008 R2-based client
computer after you disable AES encryption for Kerberos authentication
Feedback
Was this page helpful? Yes No
This article provides a solution to error messages that occur on Server Message Block
(SMB) connections.
Symptoms
After a Windows Server 2012-based or Windows 8-based computer fails to connect to a
third-party file server that supports the SMBv2 file protocol, you receive one of the
following error messages or a similar error message, depending on how you access the
third-party file server:
Invalid Signature
Resolution
To resolve this problem, contact the third-party file server vendor to request an update
that enables the file server to support Windows Server 2012 and Windows 8 clients.
Workaround
2 Warning
We don't recommend that you disable the requirement for secure negotiate, as this
reduces computer security. Disable secure negotiate only as a temporary
troubleshooting measure. Don't leave secure negotiate disabled; instead, contact
the third-party file server vendor and request an update that allows their file server
to support Windows Server 2012 and Windows 8 clients correctly.
The ability to disable secure negotiate functionality may be removed in future operating
systems.
To require signing on the SMB client or the SMB server, turn on the
RequireSecuritySignature setting. See your vendor's documentation for
instructions to set the signing setting to required on the vendor's SMB server.
PowerShell
You can disable the Secure Negotiate option by using PowerShell on a Windows
Server 2012 or Windows 8 client. To do it, run the following command:
PowerShell
Set-ItemProperty -Path
"HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters"
RequireSecureNegotiate -Value 0 -Force
7 Note
References
For more information, see New SMB 3.0 features in the Windows Server 2012 file server
Feedback
Was this page helpful? Yes No
This article describes how to resolve a problem that occurs when SMB signing is
disabled for the Workstation or Server service on a domain controller.
Summary
You cannot open file shares or the Group Policy snap-ins on a Windows Server 2003
domain controller or on a Windows 2000 Server domain controller. When you log on to
the domain controller locally and then try to open shares on the domain controller, you
receive repeated password prompts, and you cannot open the shares. You can resolve
this problem by changing the registry.
2 Warning
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or by using another method. These problems might require that you
reinstall the operating system. Microsoft cannot guarantee that these problems can
be solved. Modify the registry at your own risk.
Symptoms
When you try to open Group Policy snap-ins on the domain controller, you receive an
error message that resembles the following:
You do not have permission to perform this operation. Access is denied.
The domain controller logs the following events in the application event log every five
minutes:
When you try to open Group Policy snap-ins on the domain controller, you receive an
error message that resembles the following:
Access is denied. The domain controller logs the following event in the application
event log:
When you log on to the domain controller locally and then try to open shares on the
domain controller, you receive repeated password prompts, and you cannot open the
shares.
Failed to open the Group Policy Object. You may not have the appropriate rights.
In a network trace, if SMB signing is enabled and required at the client and is disabled at
the server, the connection to the TCP session is gracefully closed after the Dialect
Negotiation, and the client receives the following error:
1240 (ERROR_LOGIN_WKSTA_RESTRICTION)
The domain controller logs the following events in the application event log every five
minutes: When you log on to the domain controller locally and then try to open file
shares on the domain controller, you receive an error message that resembles the
following:
\\Server_Name\Share_Name is not accessible. You might not have permission to use
this network resource. Contact the administrator of this server to find out if you
have access permissions.
7 Note
In a network trace, if SMB signing is enabled, and if SMB signing is required at the
client and is disabled at the server, the connection to the TCP session is gracefully
closed after the dialect negotiation. Also, the client receives the following error
message: 1240 (ERROR_LOGIN_WKSTA_RESTRICTION)
When you try to open Group Policy snap-ins on the domain controller, you receive an
error message that is similar to the following:
Failed to open the Group Policy Object. You may not have the appropriate rights.
The domain controller logs the following event in the application event log: When you
log on to the domain controller locally and then try to open file shares on the domain
controller, you receive an error message that is similar to the following:
7 Note
In a network trace, if SMB signing is enabled, and if SMB signing is required at the
client and is disabled at the server, the connection to the TCP session is gracefully
closed after the dialect negotiation. Also, the client receives the following error
message: 1240 (ERROR_LOGIN_WKSTA_RESTRICTION)
Resolution
To resolve this behavior, follow these steps:
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows XP .
Change the value of the enablesecuritysignature registry entry. To do this, follow these
steps:
2. Copy and then paste (or type) the regedit command in the Open box, and then
press Enter.
5. Double-click requiresecuritysignature, type 1 in the Value data box, and then click
OK.
ers
Step 2 - Restart the Server service and the Workstation service After you change the
registry values, restart the Server service and the Workstation service.
) Important
Do not restart the domain controller, because this action may cause Group Policy to
change the registry values back to the earlier values.
To restart the Server service and the Workstation service, follow these steps:
7 Note
1. Open the domain controller's Sysvol share. To do this, click Start, click Run, type
\\Server_Name\Sysvol in the Open box, and then press Enter.
2. If the Sysvol share does not open, repeat Step 1 - Change the registry and Step 2 -
Restart the Server and Workstation services .
3. Repeat Step 1 - Change the registry and Step 2 - Restart the Server and
Workstation services on each affected domain controller to make sure that each
domain controller can access its own Sysvol share.
After you connect to the Sysvol share on each domain controller, open the Domain
Controller Security Policy snap-in, and then set up the SMB signing policy settings. To do
this, follow these steps:
1. Click Start, point to Programs, point to Administrative Tools, and then click
Domain Controller Security Policy.
2. In the left pane, expand Local Policies, and then click Security Options.
7 Note
In Windows 2000 Server, the equivalent policy setting is Digitally sign server
communication (always).
) Important
If you have client computers on the network that do not support SMB signing,
you must not enable the Microsoft network server: Digitally sign
communications (always) policy setting. If you enable this setting, you must
have SMB signing for all client communication, and client computers that do
not support SMB signing will not be able to connect to other computers. For
example, clients that are running Apple Macintosh OS X or Microsoft
Windows 95 do not support SMB signing. If your network includes clients that
do not support SMB signing, set this policy to disabled.
4. Click to select the Define this policy setting check box, click Enabled, and then
click OK.
5. Double-click Microsoft network server: Digitally sign communications (if client
agrees).
7 Note
For Windows 2000 Server, the equivalent policy setting is Digitally sign server
communication (when possible).
6. Click to select the Define this policy setting check box, and then click Enabled.
7. Click OK.
9. Click to clear the Define this policy setting check box, and then click OK.
10. Double-click Microsoft network client: Digitally sign communications (if server
agrees).
11. Click to clear the Define this policy setting check box, and then click OK.
2. Copy and paste (or type) the cmd command in the Open box, and then press
Enter.
3. At the command prompt, type gpupdate /force , and then press Enter.
7 Note
The Group Policy Update utility does not exist in Windows 2000 Server. In
Windows 2000 Server, the equivalent command is secedit /refreshpolicy
machine_policy /enforce .
After you run the Group Policy Update utility, check the application event log to make
sure that the Group Policy settings were updated successfully. After a successful Group
Policy update, the domain controller logs Event ID 1704. To open the Application log in
Event Viewer, follow these steps:
1. Click Start, point to Administrative Tools, and then click Event Viewer.
7 Note
Check the registry values that you changed in Step 1 - Change the registry to make sure
that the registry values have not changed.
7 Note
This step makes sure that a conflicting policy setting is not applied at another
group or organizational unit (OU) level. For example, if the Microsoft network client:
Digitally sign communications (if server agrees) policy is configured as "Not
Defined" in Domain Controller Security Policy, but this same policy is configured as
disabled in Domain Security Policy, SMB signing will be disabled for the
Workstation service.
Step 8 - Check the SMB signing policy settings by using the Resultant Set of Policy
(RSoP) snap-in
If the registry values have changed after you run the Group Policy Update utility, check
the SMB signing policy settings by using the RSoP snap-in in Windows Server 2003. To
do this, follow these steps:
1. Click Start, click Run, type rsop.msc in the Open box, and then click OK.
2. In the RSoP snap-in, the SMB signing settings are located in the following path:
Computer Configuration/Windows Settings/Security Settings/Local
Policies/Security Options
7 Note
If you are running Windows 2000 Server, install the Group Policy Update
utility from the Windows 2000 Server Resource Kit, and then type the
following at the command prompt: gpresult /scope computer /v
3. After you run this command, the Applied Group Policy Objects list appears. This
list shows all Group Policy Objects that are applied to the computer account. Check
the SMB signing policy settings for all these Group Policy Objects.
Additional resources
This behavior occurs if the SMB signing settings for the Workstation service and for the
Server service contradict each other. When you configure the domain controller in this
way, the Workstation service on the domain controller cannot connect to the domain
controller's Sysvol share. Therefore, you cannot start Group Policy snap-ins. Also, if SMB
signing policies are set by the default domain controller security policy, the problem
affects all the domain controllers on the network. Therefore, Group Policy replication in
the Active Directory directory service will fail, and you will not be able to edit Group
Policy to undo these settings.
Feedback
Was this page helpful? Yes No
This article describes information about Windows disabling guest access in SMB2 and
SMB3 by default, and provides settings to enable insecure guest logons in Group Policy.
However, this is generally not recommended.
Symptoms
Starting from Windows 10, version 1709 and Windows Server 2019, SMB2 and SMB3
clients no longer allow the following actions by default:
SMB2 and SMB3 have the following behavior in these versions of Windows:
7 Note
You can't access this shared folder because your organization's security
policies block unauthenticated guest access. These policies help protect your
PC from unsafe or malicious devices on the network.
Also, if a remote server tries to force you to use guest access, or if an administrator
enables guest access, the following entries are logged in the SMB Client event log:
Log entry 1
Output
Guidance
This event indicates that the server tried to log on the user as an unauthenticated guest
but was denied by the client. Guest logons don't support standard security features such
as signing and encryption. So, guest logons are vulnerable to man-in-the-middle attacks
that can expose sensitive data on the network. Windows disables insecure (nonsecure)
guest logons by default. We recommend that you don't enable insecure guest logons.
Log entry 2
Output
Guidance
This event indicates that an administrator has enabled insecure guest logons. An
insecure guest logon occurs when a server logs on the user as an unauthenticated
guest. It typically occurs in response to an authentication failure. Guest logons don't
support standard security features, such as signing and encryption. So, allowing guest
logons makes the client vulnerable to man-in-the-middle attacks that can expose
sensitive data on the network. Windows disables insecure guest logons by default. We
recommend that you don't enable insecure guest logons.
Cause
This change in default behavior is by design and is recommended by Microsoft for
security.
A malicious computer that impersonates a legitimate file server could allow users to
connect as guests without their knowledge. We recommend that you don't change this
default setting. If a remote device is configured to use guest credentials, an
administrator should disable guest access to that remote device and configure correct
authentication and authorization.
Windows client and Windows Server haven't enabled guest access or allowed remote
users to connect as guest or anonymous users since Windows 2000. Only third-party
remote devices might require guest access by default. Microsoft-provided operating
systems don't.
Resolution
Configure your third-party SMB server device to require a username and password for
SMB connections. If your device allows guest access, any device or person on your
network can read or copy all of your shared data without any audit trail or credentials.
If you can't configure your third-party device to be secure, you can enable insecure
guest access with the following Group Policy settings:
1. Open the Local Group Policy Editor (gpedit.msc) on your Windows device.
2. In the console tree, select Computer Configuration > Administrative Templates >
Network > Lanman Workstation.
3. For the setting, right-click Enable insecure guest logons and select Edit.
4. Select Enabled > OK.
7 Note
If you need to modify the Active Directory domain-based group policy, use Group
Policy Management (gpmc.msc).
For monitoring and inventory purposes, this group policy sets the following DWORD
registry value to 1 (insecure guest auth enabled) or 0 (insecure guest auth disabled):
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\LanmanWorkstation\
AllowInsecureGuestAuth
To set the value without using Group Policy, set the following DWORD registry value to 1
(insecure guest auth enabled) or 0 (insecure guest auth disabled):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters
AllowInsecureGuestAuth
7 Note
As usual, the value setting in Group Policy will override the value setting in the non-
Group Policy registry value.
Starting from Windows 11 Insider Preview Build 25267, Pro editions disable insecure
guest authentication by default like Enterprise and Education editions.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters]
AllowInsecureGuestAuth . Home and Pro editions allow guest authentication by default
7 Note
By enabling insecure guest logons, this setting reduces the security of Windows
clients.
More information
This setting has no effect on SMB1 behavior. SMB1 continues to use guest access and
guest fallback.
7 Note
SMB1 is uninstalled by default in the latest Windows client and Windows Server
configurations. For more information, see SMBv1 is not installed by default in
Windows 10 version 1709, Windows Server version 1709 and later versions.
Feedback
Was this page helpful? Yes No
This article discusses how to troubleshoot the high CPU usage issue on the SMB server.
In most cases, you'll notice the issue of high CPU usage in the system process. Before
you proceed, use Process Explorer to make sure that srv2.sys, or ntfs.sys is consuming
excessive CPU resources.
Generally, this issue can be caused by some form of command queuing in the SAN. You
can use Perfmon to capture a Microsoft-Windows-StorPort tracing, and analyze it to
accurately determine storage responsiveness.
Disk IO latency
Disk IO latency is a measure of the delay between the time that a disk IO request is
created and completed.
The IO latency that is measured in Perfmon includes all the time that is spent in the
hardware layers plus the time that is spent in the Microsoft Port Driver queue
(Storport.sys for SCSI). If the running processes generate a large StorPort queue, the
measured latency increases. This is because IO must wait before it's dispatched to the
hardware layers.
The "_Total" instance is an average of the latencies for all physical disks in the computer.
Each of other instances represents an individual physical disk.
7 Note
Do not confuse these counters with Avg. Disk Transfers/sec. These are completely
different counters.
For the "physical disk performance object," the data is captured at the "Partition
manager" level in the storage stack.
When we measure the counters that are mentioned in the previous section, we're
measuring all the time that is spent by the request below the "Partition manager" level.
When the IO request is sent by the partition manager down the stack, we time stamp it.
When it returns, we time stamp it again and calculate the time difference. The time
difference is the latency.
By doing this, we're accounting for the time that is spent in the following components:
Class Driver - This manages the device type, such as disks, tapes, and so on.
Port Driver - This manages the transport protocol, such as SCSI, FC, SATA, and so
on.
Device Miniport Driver - This is the device driver for the Storage Adapter. It's
supplied by the manufacturer of the devices, such as Raid Controller, and FC HBA.
Disk Subsystem - This includes everything that is below the Device Miniport Driver.
This could be as simple as a cable that is connected to a single physical hard disk,
or as complex as a Storage Area Network. If the issue is determined to be caused
by this component, you can contact the hardware vendor for more information
about troubleshooting.
Disk queuing
There's a limited amount of IO that a disk subsystem can accept at a given time. The
excess IO gets queued until the disk can accept IO again. The time that IO spends in the
queues below the "Partition manager" level is accounted for in the Perfmon physical disk
latency measurements. As queues grow larger and IO must wait longer, the measured
latency also grows.
There are multiple queues below the "Partition manager" level, as follows:
We also account for the time that the hard disk spends actively servicing the IO and the
travel time that is taken for the request to return to the "Partition manager" level to be
marked as completed.
Finally, we have to pay special attention to the Port Driver Queue (for SCSI Storport.sys).
The Port Driver is the last Microsoft component to touch an IO before we hand it off to
the manufacturer-supplied Device Miniport Driver.
If the Device Miniport Driver can't accept any more IO because its queue or the
hardware queues below it are saturated, we'll start accumulating IO on the Port Driver
Queue. The size of the Microsoft Port Driver queue is limited only by the available
system memory (RAM), and it can grow very large. This causes large measured latency.
To determine which SMB shares have ABE enabled, run the following PowerShell cmdlet:
PowerShell
You can check disk performance when enumeration is slow by opening the folder locally
through a console or an RDP session.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where the %HOMEPATH% , %HOMESHARE% , and
%HOMEDRIVE% variables are resolved incorrectly.
Symptoms
One of the features of the Microsoft Distributed File System (DfS) is to allow users to
map drives directly to folders and subfolders under a DfS share. If a user's home folder
is on a DfS share, the %HOMEDRIVE% variable is mapped only to the DfS root, and not to
the complete path. This behavior is evident when it's viewed from Windows NT Explorer.
In addition, the %HOMEPATH% and %HOMESHARE% variables are not resolved correctly.
For example, if "Dfs_root" is the DFS root on \\Pkdfs and the user's home folder is
\\Pkdfs\Dfs_root\Home\User1 :
\\Pkdfs\Dfs_root\Home\User1 .
Resolution
To resolve this problem, obtain the latest service pack for Windows NT Server 4.0,
Terminal Server Edition.
Status
Microsoft has confirmed that it's a problem in the Microsoft products that are listed at
the beginning of this article. This problem was first corrected in Windows NT 4.0 Server,
Terminal Server Edition, Service Pack 5.
Feedback
Was this page helpful? Yes No
This article lists the hotfixes that are currently available for users who have installed the File
Services technologies on a Windows Server 2012-based computer or a Windows Server 2012 R2-
based computer.
Summary
File Services provides technologies that help you manage storage, enable file replication, manage
shared folders, provide fast file searching, and enable access for UNIX client computers. This
article also lists the hotfixes that are currently available for users who use File Services on
Windows 8-based computers or Windows 8.1-based computers.
This article contains lists of Microsoft Knowledge Base articles that describe the currently
available fixes. The article is divided into two sections. The first section applies to Windows Server
2012 and to Windows 8, and the second section applies to Windows Server 2012 R2 and to
Windows 8.1. Each section is divided into subsections for different component drivers: SRV,
MRXSMB, and RDBSS. In general, the SRV drivers should be updated on the server or client
computer that is hosting the data. The MRXSMB and RDBSS drivers should be updated on the
server or client computer that is initiating access to the data. If you are unsure about which
component should be updated on which computer, you can update all three component drivers
on both the computer that is hosting the data and the computer that is accessing the data.
A servicing approach of installing the monthly rollups provides customers with a consistent
model for staying current and secure. You may substitute a more recent monthly rollup in place
of an older monthly rollup. The remainders of the updates in this list are still needed as some
components in those updates released prior to October 2016 and are not included in a more
recent monthly rollup.
1. KB 2984005 - September 2014 update rollup for Windows RT, Windows 8, and Windows
Server 2012
2. KB 4520007 - October 8, 2019-KB4520007 (Monthly Rollup) or later
NTFS component
ノ Expand table
10- 3121255 0x00000024 Stop error in This hotfix To apply this update, you
Jan- FsRtlNotifyFilterReportChange and contains an must have Windows 8 or
2016 copy file may fail in Windows update for Windows Server 2012
Ntfs.sys for installed. Available on
Windows Server Windows Update. Also
2012. included in July 11, 2017-
KB4025331 (Monthly
Rollup) and later monthly
rollups.
SRV component
ノ Expand table
15- 4493451 April 9, 2019-KB4493451 This hotfix contains the Included in April 9, 2019-
April- (Monthly Rollup) 6.2.9200.22707 version KB4493450 (Security-only
2020 of srvnet.sys, srv2.sys. update).
Included in April 9, 2019-
KB4493451 (Monthly
Rollup) and later monthly
rollups.
11- 2984005 September 2014 update This update rollup To apply this update
Aug- rollup for Windows RT, contains the most rollup, you must have
2014 Windows 8, and current version of Windows 8, or Windows
Windows Server 2012 srvsvc.dll. Server 2012 installed.
MRXSMB component
ノ Expand table
Date Knowledge Title Why we recommend this hotfix Hotfix type and
added Base article availability
15- 4516055 September 10, This update rollup contains the Included in September
Apr- 2019- 6.2.9200.22859 version of 10, 2019-KB4516062
2020 KB4516055 mrxsmb.sys, 6.2.9200.22702 version (Security-only update).
(Monthly Rollup) of mrxsmb10.sys, and Included in September
6.2.9200.22365 version of 10, 2019-KB4516055
mrxsmb20.sys. (Monthly Rollup) and
later monthly rollups.
RDBSS component
ノ Expand table
15- 4520007 October 8, 2019- This update contains the Included in October 8, 2019-
April- KB4520007 6.2.9200.22874 version of KB4519985 (Security-only
2020 (Monthly Rollup) rdbss.sys. update).
Included in October 8, 2019-
KB4520007 (Monthly Rollup)
and later monthly rollups.
7 Note
The latest fixes for these SMB components can be achieved by installing KB 4525243 .
ノ Expand table
13- 3121255 0x00000024 Stop error in This update To apply this update,
May- FsRtlNotifyFilterReportChange and contains the you must be running
2016 copy file may fail in Windows 6.3.9600.18183 Windows 8.1 or
version of ntfs.sys. Windows Server 2012
R2 and April 2014
Update 2919355.
Available from
Windows Update.
Also included in May 9,
2017-KB4019215
(Monthly Rollup) and
later monthly rollups.
SRV component
ノ Expand table
15- 4493446 April 9, 2019- This hotfix contains the Included in April 9, 2019-
April- KB4493446 6.3.9600.19309 version of KB4493467 (Security-only
2020 (Monthly Rollup) srv.sys, srv2.sys, and update).
srvnet.sys. Included in April 9, 2019-
KB4493446 (Monthly
Date Knowledge Title Why we recommend this Hotfix type and
added Base Article hotfix availability
MRXSMB component
ノ Expand table
Date Knowledge Title Why we recommend this hotfix Hotfix type and
added Base article availability
15- 4525243 November 12, This update rollup contains the Included in November
April- 2019- 6.3.9600.19537 version of 12, 2019-KB4525250
2020 KB4525243 mrxsmb.sys, 6.3.9600.19293 version (Security-only update).
(Monthly Rollup) of mrxsmb10.sys, and Included in November
6.3.9600.18586 version of 12, 2019-KB4525243
mrxsmb20.sys. (Monthly Rollup) and
later monthly rollups.
RDBSS component
ノ Expand table
ノ Expand table
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters\
ExtendedSessTimeout
ノ Expand table
03-Jun- 3130902 Stop error 0x9E and This update contains the To apply this update, you
2016 failover cluster can't most current version of must be running Windows
come online in Nfssvc.exe, Nfssvr.sys, and Server 2012. Available for
Windows Server 2012 Msnfsflt.sys. individual download.
ノ Expand table
03-Jun- 3042826 POSIX subsystem This hotfix contains the To apply this hotfix, you
2016 crashes when you try most current version of must be running Windows 8
to create a Telnet Psxdll.dll, Psxdllsvr.dll, or Windows Server 2012.
session in Windows Psxss.exe, Posix.exe. Available for individual
download.
7 Note
The latest fixes for these Network File System (NFS) components can be achieved by
installing KB 4503276 .
ノ Expand table
Date Knowledge Title Why we recommend this Hotfix type and
added Base article hotfix availability
15- 4487016 February 19, 2019- This hotfix contains the Included in February 19,
April- KB4487016 6.3.9600.18751 version of 2019-KB4487016 (Preview
2020 (Preview of Nfssvc.exe, 6.3.9600.19240 of Monthly Rollup) and
Monthly Rollup) version of Nfssvr.sys . later monthly rollups.
15- 4503276 June 11, 2019- This hotfix contains the Included in June 11, 2019-
April- KB4503276 6.3.9600.19364 version of KB4503290 (Security-only
2020 (Monthly Rollup) Rpcxdr.sys . update).
Included in June 11, 2019-
KB4503276 (Monthly
Rollup) and later monthly
rollups.
ノ Expand table
Date Knowledge Title Why we recommend this hotfix Hotfix type and
added Base article availability
15- 4038792 September 12, This hotfix contains the Included in September
Apr- 2017-KB4038792 6.3.9600.18751 version of 12, 2017-KB4038792
2020 (OS Build Monthly Nfsclnt.exe , 6.3.9600.18385 (OS Build Monthly
Rollup) version of Nfsrdr.sys and Rollup) and later
6.3.9600.18384 version of monthly rollups.
Nfsnp.dll .
On the client, applications perform system calls by requesting operations on remote files. These
requests are handled by the redirector subsystem ( rdbss.sys ) and by the SMB mini-redirector
( mrxsmb.sys ), both of which translate the requests into SMB protocol sessions and requests over
TCP/IP. Starting with Windows Vista, the SMB 2.0 protocol is supported. The mrxsmb10.sys driver
handles legacy SMB traffic, and the mrxsmb20.sys driver handles SMB 2.0 and SMB 3.0 traffic.
On the server, SMB connections are accepted, and SMB requests are processed as local file
system operations through NTFS and the local storage stack. The srv.sys driver handles legacy
SMB traffic, and the srv2.sys driver handles SMB 2.0 traffic. The srvnet.sys component
implements the interface between networking and the file server for both SMB protocols. File
system metadata and content can be cached in memory via the system cache in the kernel
( ntoskrnl.exe ).
The following screenshot provides an overview of the different layers through which a user
request on a client computer must go to perform file operations over the network on a remote
SMB file server by using SMB 2.0.
Windows Server 2012 includes both the Server for NFS and Client for NFS components. However,
Windows 8 includes only Client for NFS.
Microsoft Services for NFS provides a file-sharing solution for enterprises that have a mixed
Windows and UNIX environment. This communication model consists of client computers and a
server. Applications on the client request files that are located on the server through the
redirector ( Rdbss.sys ) and NFS mini-redirector ( Nfsrdr.sys ). The mini-redirector uses the NFS
protocol to send its request through TCP/IP. The server receives multiple requests from the
clients through TCP/IP and routes the requests to the local file system ( Ntfs.sys ), which accesses
the storage stack.
References
For more information about currently available hotfixes for the File Services technologies in
Windows Server 2008 and Windows Server 2008 R2, see KB2473205 .
For more information about performance tuning, see the Tuning parameters for SMB file servers
section in Performance Tuning for File Servers.
Feedback
Was this page helpful? Yes No
This article describes how to create, test, and remove a virtual directory on an existing
Web site to a folder that resides on a remote computer.
A remote virtual directory is a directory that's not contained within the Web site's home
directory but appears to client browsers as though it's within the home directory. A
remote virtual directory has an alias that is mapped to a Universal Naming Convention
(UNC) share location. A client appends the alias to the URL of the Web site to browse
the Web content in that virtual directory. The following table illustrates these mappings:
ノ Expand table
Both virtual directories and physical directories (directories without an alias) are listed in
Internet Services Manager. A virtual directory is indicated by a folder icon that has a
globe in the corner.
7 Note
You can also publish Web content to the remote share after the virtual directory is
created.
2. Click Start, point to Programs > Administrative Tools, and then click Internet
Services Manager.
3. In the Internet Information Services window, expand server name (where server
name is the name of the server).
4. Right-click the Web site that you want (for example, Default Web Site), point to
New, and then click Virtual Directory.
5. On the Welcome to the Virtual Directory Creation Wizard page, click Next.
6. On the Virtual Directory Alias page, type the alias that you want (for example,
Sales), and then click Next.
7. On the Web Site Content Directory page, type the UNC path to the remote folder
that you've created (for example, \\Server\Share), and then click Next.
8. On the User Name and Password page, type the user name and password that has
sufficient privileges to gain access to the remote folder.
7 Note
To maintain the highest levels of security, use an account that has the
minimum permissions that are necessary to provide access to the remote
content.
9. Click Next, retype the password that you used in step eight in the Confirm
Password dialog box, and then click OK.
10. On the Access Permissions page, click to select the check boxes of the permissions
that you want to set for the virtual directory.
By default, Read permissions and Run scripts permissions are already selected. For
example, if you want to allow users to change the content in the virtual directory,
click to select the Write check box.
11. Click Next, and then click Finish.
7 Note
The virtual directory inherits the configuration and security settings of the
Web site in which it is created.
2. In the Address box, type the URL to your Web server (for example,
http://WebServer ), and then click Go.
3. Append the alias of the virtual directory to the address that you typed in step two
(for example, http://WebServer/Sales ), and then click Go.
7 Note
When you delete a virtual directory, the network share and its content are not also
deleted.
1. Click Start, point to Programs > Administrative Tools, and then click Internet
Services Manager.
2. In the Internet Information Services window, click to expand server name (where
server name is the name of the server).
3. Expand the Web site that contains the virtual directory that you want to delete. For
example, expand Default Web Site.
4. Right-click the virtual directory that you want (for example, Sales) and then click
Delete.
7 Note
The Web content remains in the remote folder to which the virtual directory
was mapped.
Feedback
Was this page helpful? Yes No
This article discusses how to decommission a root server that hosts a domain-based
Microsoft Distributed File System (DFS) root in Microsoft Windows Server 2003.
More information
To decommission a root server that hosts a domain-based DFS root, follow these steps:
Use the Distributed File System snap-in to remove the root server from the
DFS namespace. To do this:
a. Click Start, point to All Programs, point to Administrative Tools, and then
click Distributed File System.
c. In the right pane, right-click the root target that you want to remove, and
then click Remove Target.
d. Click Yes.
Use the version of the DFS utility (Dfsutil.exe) that is included in the Windows
Server 2003 Support Tools to remove the root server from the DFS
namespace. To do this, follow these steps.
7 Note
To install the DFS utility that is included in the Windows Server 2003
Support Tools, right-click Suptools.msi in the Support\Tools folder on
the Windows Server 2003 CD-ROM, and then click Install.
a. Click Start, click Run, type cmd in the Open box, and then click OK.
b. Type the following command, and then press ENTER:
Dfsutil /UnmapFtRoot /Root:DFS root /Server: RootTargetServer
/Share:DFS share name
7 Note
2. On the decommissioned root target, remove DFS information from the registry by
using the following Dfsutil.exe command:
Dfsutil /Clean /Server:RootTargetServer /Share:DFS share name
3. On the decommissioned root server, at a command prompt, type net stop dfs, and
then press ENTER.
4. On the decommissioned root server, at a command prompt, type net start dfs, and
then press ENTER.
7 Note
After you remove a DFS root target, DFS stops giving referrals to the
decommissioned server within 15 minutes of the update to the DFS Active
Directory directory service object. The DFS Active Directory object resides on
the local domain controller and is issued by the PDC emulator master. The
time that the update can take depends on Active Directory replication
schedules.
Feedback
Was this page helpful? Yes No
This article describes how to remove default administrative shares, and how to prevent
these shares from being automatically created in Windows Server.
Introduction
By default, Windows Server automatically creates special hidden administrative shares
that administrators, programs, and services can use to manage the computer
environment or network. These special shared resources aren't visible in Windows
Explorer or in My Computer. However, you can view them by using the Shared Folders
tool in Computer Management. Depending on the configuration of your computer,
some or all of the following special shared resources may be listed in the Shares folder
in Shared Folders:
DriveLetter$: It's a shared root partition or volume. Shared root partitions and
volumes are displayed as the drive letter name appended with the dollar sign ($).
For example, when drive letters C and D are shared, they're displayed as C$ and
D$.
IPC$: It's a resource that shares the named pipes that you must have for
communication between programs. This resource cannot be deleted.
PRINT$: It's a resource that is used during the remote administration of printers.
FAX$: It's a shared folder on a server that is used by fax clients during fax
transmission.
7 Note
NETLOGON and SYSVOL aren't hidden shares. Instead, they are special
administrative shares.
Generally, we recommend that you don't modify these special shared resources.
However, if you want to remove the special shared resources and prevent them from
being created automatically, you can do it by editing the registry.
Fix it for me
To fix this problem automatically, select the Fix this problem link. Then, select Run in the
File Download dialog box, and follow the steps in this wizard.
Notes
This wizard may be in English only; however, the automatic fix also works for other
language versions of Windows.
If you aren't on the computer that has the problem, you can save the automatic fix
to a flash drive or to a CD, and then you can run it on the computer that has the
problem. Now go to the Did this fix the problem? section.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information, see How to back up and restore the
registry in Windows .
To remove administrative shares and prevent them from being automatically created in
Windows, follow these steps:
1. Select Start, and then select Run.
utoShareServer
7 Note
4. On the Edit menu, select Modify. In the Value data box, type 0, and then select OK.
6. Stop and then start the Server service. To do it, follow these steps:
a. Select Start, and then select Run.
b. In the Open box, type cmd, and then select OK.
c. At the command prompt, type the following lines. Press Enter after each line:
net stop server
net start server
d. Type exit to close the Command Prompt window.
References
For more information about how to manage shared resources by using Shared Folders
in Windows Server, see the Shared Folders Help files. To do it, select Start, point to
Administrative Tools, and then select Computer Management. In the console tree,
right-click Shared Folders, and then select Help.
Feedback
Was this page helpful? Yes No
This article describes the inter-process communication share (IPC$) and null session
behavior in Windows.
The IPC$ share is created by the Windows Server service. This special share exists to
allow for subsequent named pipe connections to the server. The server's named pipes
are created by built-in operating system components and by any applications or
services that are installed on the system. When the named pipe is being created, the
process specifies the security associated with the pipe. Then it makes sure that access is
only granted to the specified users or groups.
However, an administrator has controls over any named pipes that were enabled. They
can be accessed anonymously by using the Network access: Named Pipes that can be
accessed anonymously security policy setting. If the policy setting is configured to have
no entries, such as a Null value, no named pipes can be accessed anonymously. And you
must ensure that no applications or services in the environment rely on anonymous
access to any named pipes on the server.
Windows Server 2003 no longer prevents anonymous access to IPC$ share. The
following security policy setting defines whether the Everyone group is added to an
anonymous session:
If this setting is disabled, the only resources that can be accessed by an anonymous user
are those resources granted to the Anonymous Logon group.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where mapped network drive is disconnected
after you install or upgrade to Symantec AntiVirus 10.0 or to Symantec Client Security
3.0.
Symptoms
After you install or upgrade to Symantec AntiVirus 10.0 or to Symantec Client Security
3.0 on a Microsoft Windows Server 2003-based computer or on a Microsoft Windows
XP-based computer, you receive the following message for a mapped network drive in
Windows Explorer:
However, you can still access the contents of the mapped drive. Additionally, when you
try to remove the mapped drive in Windows Explorer, you receive the following error
message:
Cause
This problem occurs because of an issue in Symantec AntiVirus 10.0 and in Symantec
Client Security 3.0.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
1. Click Start, point to Run, type regedit, and then click OK.
ts2
3. Right-click the mapped drive that you want to remove. For example, right-click
##Server_Name#Share_Name, and then click Delete.
7 Note
Replace the Server_Name placeholder with the name of the server that hosts the
mapped network drive. Replace the Share_Name placeholder with the name of the
mapped network drive.
More information
Third-party information disclaimer
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Feedback
Was this page helpful? Yes No
This article provides workaround for the issue where the folder name unexpectedly
changes back to Documents when you redirect the Documents folder to a network
share.
Symptoms
When you redirect the Documents folder on a Windows Vista-based or Windows 7-
based computer to a network share, the folder name unexpectedly changes back to
Documents. You expect the folder name to be the user name.
This behavior may create many Documents folders on the network share. If you try to
rename one Documents folder, all the other Documents folders change to that name.
Workaround
To work around this behavior, use one of the following methods.
Method 1
Create a subfolder under the redirected folder in the Universal Naming Convention
(UNC) path. For example, use the following UNC
path:\\server\users\username\Documents.
Method 2
Grant the user exclusive rights to the redirected folder. To do this, follow these steps:
2. In the Start Search box, type gpmc.msc, right-click gpmc.msc, and then click Run
as administrator.
7 Note
If you are prompted for an administrator password, type the password. If you
are prompted for confirmation, provide confirmation.
3. Right-click the Group Policy Objects node, and then click New. Type the name of
the policy. For example, in the New GPO dialog box, type Windows Vista Folder
Redirection Policy.
4. Right-click the Group Policy object that you created in step 3, and then click Edit.
5. Under User Configuration, expand Windows Settings, and then expand Folder
Redirection.
8. In the Documents Properties dialog box, click the Settings tab, and then configure
the following:
Click to select the Grant the user exclusive rights to Documents check box.
Click to select the Move the contents of Documents to the new location
check box.
9. Click OK.
Method 3
Do not grant the Read permission to the administrator for the Desktop.ini files on the
server. To do this, follow these steps:
7 Note
If more than one Desktop.ini file exists, follow these steps for all the Desktop.ini
files.
1. Right-click the Desktop.ini file, click Properties, and then click the Security tab.
2. In the Group or user names pane, click Administrators.
3. Click to select the Deny check box for the Read permission.
4. Click OK.
7 Note
Method 2 works only for new users. To update the names of the existing folders on
the server, we recommend that you use Method 3.
Status
This behavior is by design.
More information
After you do this, the name of the Documents folder is supposed to change to the user
name.
Feedback
Was this page helpful?
Yes No
This article describes how to troubleshoot the failures that occur during an SMB
Negotiate, Session Setup, and Tree Connect request.
Negotiate fails
The SMB server receives an SMB NEGOTIATE request from an SMB client. The
connection times out and is reset after 60 seconds. There might be an ACK message
after about 200 microseconds.
If you're using Windows Server 2008 R2, there are hotfixes for this problem. Make sure
that the SMB client and the SMB server are up to date.
If the fully qualified domain name (FQDN) or Network Basic Input/Output System
(NetBIOS) name of the server is used in the Universal Naming Convention (UNC) path,
Windows will use Kerberos for authentication.
After the Negotiate response, there will be an attempt to get a Kerberos ticket for the
Common Internet File System (CIFS) service principal name (SPN) of the server. Look at
the Kerberos traffic on TCP port 88 to make sure that there are no Kerberos errors when
the SMB client is gaining the token.
7 Note
The errors that occur during the Kerberos Pre-Authentication are OK. The errors
that occur after the Kerberos Pre-Authentication (instances in which authentication
does not work), are the errors that caused the SMB problem.
The cause of common Tree Connect errors can be found in 3.3.5.7 Receiving an SMB2
TREE_CONNECT Request. The following are the solutions for two common status codes.
[STATUS_BAD_NETWORK_NAME]
Make sure that the share exists on the server, and that it's spelled correctly in the
SMB client request.
[STATUS_ACCESS_DENIED]
Verify that the disk and folder that are used by the share exists and is accessible.
If you're using SMBv3 or later, check whether the server and the share require
encryption, but the client doesn't support encryption. To do this, take the following
actions:
PowerShell
PowerShell
Windows 8, Windows Server 2012, and later versions of Windows support client-
side encryption (SMBv3 and later).
Windows 7, Windows Server 2008 R2 and earlier versions of Windows don't
support client-side encryption.
Samba and third-party device might not support encryption. For more information,
you might have to consult product documentation.
References
For more information, see the following articles.
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2016, Windows Server 2019, Windows Server 2022
Original KB number: 4458042
Symptoms
You use a network adapter that has remote direct memory access (RDMA) enabled. After
you enable SMB Signing or SMB Encryption, the network performance of SMB Direct
together with the network adapter is significantly reduced.
Output
Output
Output
Cause
Several features such as Storage Spaces Direct (S2D) or Cluster Shared Volumes (CSV)
use SMB as a protocol transport for intra-cluster communication. Therefore, the
performance of S2D may be significantly affected by enabling SMB Signing or SMB
Encryption that uses the RDMA network adapter.
When either SMB Signing or SMB Encryption is enabled, SMB stops using RDMA direct
data placement (also known as RDMA read/write). This is a fallback policy, and this
behavior is by design for the highest level of security. Therefore, SMB falls back to use
the RDMA connection in a purely send-and-receive mode. Data flows in a non-optimal
path because the maximum MTU limit is 1,394 bytes. This causes message
fragmentation and reassembly, and overall decreased performance.
This issue may occur after you follow the Security baseline for Windows 10 v1607
("Anniversary Update") and Windows Server 2016 to enable SMB Signing.
Or, if you use the following Group Policy settings to enable SMB Signing:
Resolution
SMB Signing and SMB Encryption have some trade-offs in performance. If network
performance is important to your deployment scenarios (such as with Storage Spaces
Direct), we recommend that you not deploy SMB Signing and SMB Encryption.
Windows Server 2022 SMB Direct now supports encryption. Data is encrypted before
placement, leading to relatively minor performance degradation. Furthermore, Windows
Server 2022 failover clusters now support granular control of encrypting intra-node
storage communications for Cluster Shared Volumes (CSV) and the storage bus layer
(SBL). This means that when using Storage Spaces Direct and SMB Direct, you can
decide to encrypt east-west communications within the cluster itself for higher or lower
security on a per SMB instance basis.
If you are deploying in a highly secure environment with Windows Server 2016 and
Windows Server 2019, we recommend that you apply the following configurations:
2. Based on the SMB client and SMB server version, evaluate the most appropriate
solution to optimize performance. Be aware that SMB Signing provides message
integrity, and SMB Encryption provides message integrity plus privacy to provide
the highest level of security.
This article provides some information about NFS Server and File Permissions.
Summary
This article describes how to set file permissions on your Windows NT network file
system (NFS) exports to work with UNIX NFS workstations.
More information
You do not need to perform these steps when using only anonymous authentication,
although the results can give you some insight into how NTFS file permissions are
reflected onto UNIX workstations.
7 Note
1. Always set the NTFS permissions on your export (and all folders and files
underneath the export) to Full Control for Everyone, the Administrators group, and
the Administrator user.
2. If your export folder is empty, create a dummy file called dummyfile in your NFS
export folder.
3. If you are not using a network information service (NIS) server, copy the
Etc/Passwd and Etc/Group files in binary mode from the appropriate UNIX
computer to the Winnt\System32\drivers\etc folder.
7 Note
Leave the password fields blank. It is recommended that UIDs and GIDs be
unique as a whole, as well as user names and groups as a whole. For example,
do not use 1001 for a user and a group, and do not have a wheel user in
addition to a wheel group.
4. Map each user and each group to a unique Windows NT user and group. You can
do this using Server for NFS User Manager.
5. Map the UNIX root user to the Windows NT Administrator user and the group root
or wheel to the Windows NT Administrators group.
1. Log on as root (only root can mount an NFS export). Mount the export on your
UNIX workstation by typing
Console
Console
ls -l
Console
Console
In some UNIX operating systems, the chown command does not take a group
parameter. In these situations, you need to type chgrp -R group /mnt in
addition to this command.
Console
Console
ls -l
Console
If you are unable to change the permissions on a file or if you receive "access denied"
error messages, use the following steps:
1. On the Windows NT Server-based NFS computer, assign Full Control to the export
for Everyone, the Administrators group, and the Administrator user.
2. On the UNIX NFS client, copy the file to a different name (you must do it as a user,
not as root). Delete the original file in Windows NT and rename the file to its
original name.
Some Windows NT users and groups cannot be mapped to equivalent UNIX users or
groups. They may be displayed as nobody4 or nogroup. Special groups that exhibit this
behavior include:
Everyone
Network
Interactive
System
Authenticated users
Feedback
Was this page helpful? Yes No
This article describes Server Message Block (SMB) 2.x and 3.x signing, and how to
determine whether SMB signing is required.
Introduction
SMB signing (also known as security signatures) is a security mechanism in the SMB
protocol. SMB signing means that every SMB message contains a signature that is
generated by using the session key. The client puts a hash of the entire message into
the signature field of the SMB header.
SMB signing first appeared in Microsoft Windows 2000, Microsoft Windows NT 4.0, and
Microsoft Windows 98. Signing algorithms have evolved over time. SMB 2.02 signing
was improved by the introduction of hash-based message authentication code (HMAC)
SHA-256, replacing the old MD5 method from the late 1990s that was used in SMB1.
SMB 3.0 added AES-CMAC algorithms. In Windows Server 2022 and Windows 11, we
added AES-128-GMAC signing acceleration. If you want the best performance and
protection combination, consider upgrading to the latest Windows versions.
Note In these policies, "always" indicates that SMB signing is required, and "if server
agrees" or "if client agrees" indicates that SMB signing is enabled.
ノ Expand table
- Server – Server –
RequireSecuritySignature=1 RequireSecuritySignature=0
Reference
Configure SMB Signing with Confidence
How to Defend Users from Interception Attacks via SMB Client Defense
SMB 2 and SMB 3 security in Windows 10: the anatomy of signing and cryptographic
keys
SMBv1 is not installed by default in Windows 10 version 1709, Windows Server version
1709 and later versions
Netdom computername
Feedback
Was this page helpful? Yes No
This article provides a resolution for the problems that may occur when administrative
shares are missing.
Summary
This article describes the symptoms that may occur when one or more of the hidden
administrative shares are missing on your computer. The article also provides
information about how to resolve this problem.
If you have already determined that your computer is missing one or more of the
hidden administrative shares, see the "Cause" and "Resolution" sections. Realize that
missing administrative shares typically indicate that the computer in question has been
compromised by malicious software. We recommend that users format and reinstall
Windows on compromised servers.
Symptoms
You may experience a variety of issues when administrative shares are removed or are
otherwise missing from your computer.
If you use the net share command or MPSReports, the output may show that your
computer is missing the IPC$, ADMIN$, or C$ share. If you re-create a missing share, it
may be missing again after the next startup or logon. This issue may occur even if you
set the AutoShareServer and AutoShareWks registry DWORD values to 1.
You may find unknown processes that start from the Startup folder or from the Run key
in the registry. Antivirus software may detect viruses, worms, Trojans, or backdoors. Or
the FTP root on a Web server may be filled with unknown files.
The following list is a comprehensive list of the problematic behavior that may be
associated with this issue.
If the affected computer is a domain controller, you may receive error messages on
client computers during network logon or during the times when they try to join
the domain. Sometimes, you can log on with client computers, but you may
receive an error message that is similar to either of the following ones:
The domain password you supplied is not correct, or access to your logon
server has been denied.
The logon server did not recognize your domain password, or access to the
server has been denied.
When you try to join the domain, you may receive an error message that is
similar to:
When you try to access or view the affected computer remotely by using a UNC
path, a mapped drive, the net use command, the net view command, or by
browsing the network in Network Neighborhood or My Network Places, you may
receive an error message that is similar to one of the followings:
System error 53 has occurred. The network path was not found.
You may receive errors when you try to perform administrative tasks on a domain
controller. For example, MMC snap-ins such as Active Directory Users and
Computers or Active Directory Sites and Services may not start, and you may
receive an error message that is similar to the following one:
When you try to add a user to a security group, you may receive an error message
that is similar to:
Object Picker cannot open because no locations from which to choose objects
can be found.
When you try to run Netdom.exe to find the FSMO roles, you may receive an error
message that is similar to the following one:
Unable to update the password. The value provided as the current password is
incorrect.
When you try to run Dcdiag.exe, you may receive an error message that is similar
to the following one:
The results from Dcdiag.exe may also list LDAP bind errors that are similar to the
following one:
When you try to run Netdiag.exe, you may receive an error message that is similar
to:
If you run a network trace when you try to connect to the affected computer, you
may see results that are similar to the following one:
Console
C session setup & X, Username = username, and C tree connect & X, Share
= \\<Server_Name>\IPC$
R session setup & X - DOS Error, (67) BAD_NET_NAME
On the server, the WINS service may not start or the WINS console may display a
red X, or both.
NetBT 4311 events that are similar to the following ones may be logged in Event
Viewer:
The Terminal Services Licensing console may not start, and you may receive an
error message that is similar to:
Cause
These issues may occur after a malicious program removes the administrative shares on
a computer that is running Windows Server.
Infection by one of these malicious programs can come directly from the Internet or
from another computer on the local network that is infected. It generally indicates that
security on the network is weak. Therefore, if you see these symptoms, we recommend
that you examine all other computers on the network for malicious programs by using
antivirus software and spyware detection tools. We also recommend that you perform a
security analysis to identify vulnerabilities on the network. See the "Resolution" section
for information about how to detect malicious programs and how to analyze network
security.
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft does not guarantee the
accuracy of this third-party contact information.
7 Note
The Win32.Agobot program is only an example. Malicious programs become
obsolete as antivirus vendors discover them and add them to their virus definitions.
However, malicious users frequently develop new programs and variants to avoid
detection by antivirus software.
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, click the following article number to view the article in the Microsoft
Knowledge Base:
322756 How to back up and restore the registry in Windows
1. Examine the AutoShareServer and AutoShareWks registry values to make sure that
they are not set to 0:
a. Click Start, click Run, type regedit, and then press ENTER.
b. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameter
s
7 Note
If these values do not exist, you do not have to create them because the
default behavior is to automatically create the administrative shares.
2. Restart the computer. Typically, computers that are running Windows Server
automatically create the administrative shares during startup.
3. After the computer restarts, verify that the administrative shares are active. To
examine the shares, use the net share command. To do it, follow these steps:
a. Click Start, click Run, type cmd, and then press ENTER.
b. At the command prompt, type net share, and then press ENTER.
c. Look for the Admin$, C$, and IPC$ administrative shares in the list of shares.
If the administrative shares are not listed, the computer may be running a malicious
program that removes the shares during startup. To look for malicious programs, follow
these steps:
1. Use the latest virus definitions to run a complete antivirus scan on the computer.
You can use your antivirus software or use one of several free virus-scanning
services that are available on the Internet. See the "More Information" section for
links to virus definition updates and to free online scans from antivirus software
vendors.
) Important
2. If the antivirus scan identifies a malicious program on the system, use the antivirus
vendor's removal instructions. Additionally, review the threat assessment and the
technical details about the program on your antivirus vendor's Web site. In
particular, check to see if the program includes backdoor capability. Backdoor
capability means that the program provides a way for the malicious user to regain
control of the system if the program is discovered and removed.
If the technical details about the program indicate that it has backdoor capability,
we recommend that you format the computer's hard disk and reinstall Windows
securely. For information about improving security of Windows-based computers
and servers, visit the following Microsoft Security Guidance Center
3. If the antivirus scan does not identify a malicious program on the system, it does
not mean that the computer is not infected by a malicious program. More likely, it
may mean that the malicious program is a new program or variant, and that the
latest virus definitions do not detect it. In this case, contact the antivirus vendor to
report the problem, or open a support incident with Microsoft Product Support
Services (PSS) to investigate.
4. After you complete the antivirus scan, examine the computer for other malicious
programs, such as spyware or malicious user tools. See the "More Information"
section for links to spyware and to malicious user detection tools.
Feedback
Was this page helpful? Yes No
This article describes the methods by which to recover a Distributed File System
Namespace (DFSN) in Windows Server.
Rapid publishing
Rapid publishing articles provide information directly from within the Microsoft support
organization. The information contained herein is created in response to emerging or
unique topics, or is intended supplement other knowledge base information.
More information
The recovery process of a DFS Namespace depends on how the namespace
configuration data was lost, the type of Namespace (domain or standalone), and what
types of backups exist of the data. The data may have been inappropriately modified
through the DFS management tools, deleted directly within Active Directory or the
registry, or corrupted. Backups types of the configuration data include System-state
backups of a domain controller, backups of DFS Roots/Namespace servers, exported
data via the dfsutil.exe utility, and DFS service registry keys.
Background:
Before beginning the recovery process, determine if the loss of the DFS Namespace was
due to accidental administrative deletion of the namespace contents or by
loss/corruption of the DFS configuration data.
Domain DFSN
Active Directory configuration data is deleted?
Restore the Active Directory DFS configuration data from backup, see recovery
option 1 of Domain DFS Root and Links
Use exported copy of the DFSN domain namespace using DFSUTIL, see recovery
option 2 of DFS Root and Links
Recreate the namespace, see recovery option 3 of DFS Root and Links
Registry data deleted?
Use system-state backup of Namespace server to recover the registry
Recreate the namespace, see recovery option 3 of DFS Root and Links
The following chart details how the data (Active Directory or registry of a DFS
namespace server) is impacted by various operations against a DFS namespace:
ノ Expand table
2008):
SiteCosting:ENABLED
This DFS namespace contains a single folder/link called "Documentation" and contains
two folder/link targets, \\2003server1\documentation and
\\2003server2\documentation.
The DFS configuration Data queried by DFSUtil is stored within the following location
within Active Directory:
CN=Dfs-Configuration,CN=System,DC=<domain DN>
In Windows Server 2003, each Domain DFS Root/Namespace is stored within an "fTDfs"
object that contains an attribute "pKT" containing the configuration data (namespace
settings, namespace servers, folder targets, etc). For instance, the "DATA" namespace
listed in the dfsutil.exe output above is located with an fTDfs object at this location:
CN=DATA,CN=Dfs-Configuration,CN=System,DC=<domain DN>. No parts of this object
should ever be modified directly.
CN=Dfs-Configuration,CN=System,DC=<domain DN>
|_msDFS-NamespaceAnchor
|_msDFS-Namespacev2
|_msDFS-Linkv2
Each DFS Namespace/Root server utilizes registry data to identify the root(s) it hosts.
Without this information, the DFS service would not obtain the configuration data from
Active Directory and would fail to host the root(s).
For 2003/2008 domain-based DFS roots, this key stores the root associations:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfs\Roots\Domain
For "Windows Server 2008 mode" roots, the following key stores the root associations:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfs\Roots\DomainV2
Within this key exists a subkey for each root hosted by the server and specifies the root
share via two values "LogicalShare" and "RootShare". The key for the "DATA" root would
be as follows:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfs\Roots\Domain\DATA
For standalone DFS roots, configuration data isn't stored within Active Directory.
Configuration data is stored within the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfs\Roots\Standalone
Beneath the "Standalone" key exists subkeys for the specific standalone root(s) hosted
by the server, and within each, subkeys containing configuration data for the hosted
folders/links.
The file server shares specified by the "LogicalShare" and "RootShare" registry values
must exist and be accessible for proper operation of a DFS root. Access will be denied to
a root if the share is missing or is configured with inappropriate permissions. It is
recommended to never directly edit these registry values.
Backup:
To back up a DFS Namespace server, a system-state backup is required. The backup will
contain the registry configuration for the server's DFS service. If the domain-based
namespace server is also a domain controller, the system-state will also include a
backup of the Active Directory database, where domain-based DFS namespaces store
the configuration data. For namespace servers not running on domain controllers,
ensure at least one domain controller is backed up regularly to prevent the loss of
configuration data in the event a domain controller experiences a failure. Lastly, ensure
the DFS-related folders residing on the server are included within the backup.
For additional details about system-state backups and restorations, please see the
following articles:
Note the typical shelf life of a system-state backup of Active Directory is only 60 days:
Useful shelf life of a system-state backup of Active Directory
An alternate method to save the DFS configuration data is via the DFSUtil.exe utility. The
output created via the "export" option may be used to recreate the missing DFS
configuration information lost through accidental deletion.
Recovery:
Once the scope of the modifications has been identified, the appropriate recovery
process should be performed.
Option 1 - Restore the Active Directory DFS configuration data from backup
For domain-based DFS, modification of a DFS root via a management tool has the
largest potential impact to the namespace. This is because whenever modifications are
performed via DFS API's, all root servers are notified of the changes and they will update
their registry as required. Thus, restoration of the DFS configuration within Active
Directory from backups may also require the task of recovering the registry of root
servers.
Authoritatively restore the DFS configuration blob. This requires the startup of a DC in
DS restore mode, restoring the Active Directory database from a backup that still
contains a valid copy of the DFS configuration, marking the DFS root directory object as
authoritative, and replicating this throughout the domain. DFS roots, by default, obtain
DFS configuration data from the PDC FSMO role owner domain controller. To prevent
replication latencies from impacting the time until the roots begin hosting the restored
namespace(s), consider using the PDC FSMO as the domain controller to restore.
7 Note
2. Type .\administrator as the user name, type the DSRM password for the server, and
then press ENTER.
3. Click Start, right-click Command Prompt, and then click Run as Administrator.
4. At the command prompt, type the following command, and then press ENTER:
Console
-machine:\<BackupComputerName>
Where:
5. Identify the version that you want to restore. You must enter this version exactly in
the next step.
6. At the command prompt, type the following command (wrapped for readability),
and then press ENTER:
Console
-backuptarget:<targetDrive>: -machine:<BackupComputerName>
-quiet
2. At the ntdsutil: prompt, type authoritative restore, and then press ENTER.
3. To restore a subtree of objects, type the following command and then press
ENTER:
For example, to restore all DFS Namespace objects in the domain contoso.com ,
type:
2 Warning
All DFS namespaces will be affected by this operation, returning them to the
state contained in the backup.
To restore a single DFS Namespace object for a root named "DATA" in the domain
contoso.com , type:
Restoring a subtree of objects ensures the operation will complete successfully for
both v1 and v2 namespaces.
5. At the authoritative restore: and ntdsutil: prompts, type quit, and then press
ENTER.
Each domain DFS namespace/root server must have proper registry data under the
location HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfs\Roots\Domain in order to properly
host the restored DFS root(s). If the DFS namespace was deleted via a DFS management
tool, you may have to manually create the keys and "LogicalShare" and "RootShare"
values on each root. Once the registry data is in place, restart the DFS service on each
root to reinitialize DFS and obtain the restored configuration data.
For example, to create the "LogicalShare" and "RootShare" for a DFS Namespace named
"Data" whose shared folder for the root is named "DataShare", the following steps are
used:
1. Click Start, click Run, type regedit in the Open box, and then click OK.
2. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfs\Roots\Domain
An export of the DFS configuration consists of a text file generated via dfsutil.exe and
the following command:
Console
Console
1. If the root doesn't already exist, create it using DFS Management. Add all
appropriate root targets. Dfsutil.exe will fail to import the configuration if the root
itself doesn't already exist and will not add root targets as defined in the file.
However, you may review the contents of the export file to identify which root
targets should be manually added.
2. Import the configuration file to create all of the hosted links via the commands:
Windows Server 2003:
Console
Console
(Where the domain is contoso.com , "DATA" is the root's name, and DATA-dfs-
Root.txt is the export file)
Attempting the import before the root has been created will result in the error
"Element not found."
Attempting to add a root target that already has registry configuration data
associated with the root results in the errors "The device is not ready for use" or
"Cannot create a file when that file already exists." To remove the registry data
from the affected server, utilize the "clean" option within DFSUtil:
Console
Console
3. Verify the import was successful. You may have to reopen any DFS management
tools to observe the imported links.
Console
(Where "servername" is the server that needs to be added as a new root target and
"sharename" is the name of the share to host the root)
Console
If the ftDfs object within Active Directory was directly deleted, restore the object as
detailed in Option 1 of the "Domain DFS Root and Links" section. There should be no
need to repair missing registry data, as a direct deletion of the fTDfs object is performed
without using DFS API's and no notifications sent to the DFS roots of the deletion.
If an export of the DFS configuration exists, the process will be similar to that in Option
2 of the "Domain DFS Root and Links" section.
Lastly, you may also recreate the DFS namespace, ensuring each DFS root has been
properly cleaned of the previous configuration. See Option 3 of the "Domain DFS Root
and Links" section for more details.
If a DFSUTIL.EXE export exists for the root, it may be imported via the commands:
Windows Server 2003:
Console
Console
Shared folders
Restore the system-state from a backup made prior to the loss. The system-state
includes the registry data for the server to host the shares. Ensure the folder(s) for the
share(s) also are present on the server.
If a system-state backup of a DFS Namespace server is not available but share registry
information exists, this information may be used to restore the share configuration of
the server. Shares and assigned share permissions are stored in the following registry
key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares
To save this registry key using the registry editor, click Export on the File menu.
This registry key may be imported to the DFS Namespace server or used as a reference
of the share names and location of shared folders for manual creation.
To restore or import the registry key using the registry editor, click Import on the File
menu.
Once the shares have been recovered, restart the Namespace server's DFS service to
initialize the namespace.
Disclaimer
Microsoft and/or its suppliers make no representations or warranties about the
suitability, reliability or accuracy of the information contained in the documents and
related graphics published on this website (the "materials") for any purpose. The
materials may include technical inaccuracies or typographical errors and may be revised
at any time without notice.
To the maximum extent permitted by applicable law, microsoft and/or its suppliers
disclaim and exclude all representations, warranties, and conditions whether express,
implied or statutory, including but not limited to representations, warranties, or
conditions of title, non infringement, satisfactory condition or quality, merchantability
and fitness for a particular purpose, with respect to the materials.
Feedback
Was this page helpful? Yes No
This article provides a solution to fix error 1338 or error 87 that occurs when you copy
files and their associated file security from a CIFS file server.
Symptoms
Robocopy may report one the following errors for some files, when copying files and
their associated file security from a CIFS file server:
The error only occurs when copying file security, for example, by specifying /SEC or
/COPYALL on the Robocopy command line. If file security is not copied, all files are
Cause
The error is caused by the CIFS file server returning invalid security information for a file.
For example, if the CIFS file server returns a NULL Security ID (SID) for a file's Owner, or a
file's Primary Group, when Robocopy tries to copy this information to the destination
file, Windows will return error 87 The parameter is incorrect or error 1338 The security
descriptor is invalid. This is by design - file security information in Windows is expected
to contain both Owner and Primary Group SIDs.
Resolution
On the CIFS file server, use the appropriate tools to correct the security information for
affected files, and ensure that all affected files have both an Owner SID and a Primary
Group SID.
More information
This is by design - file security information in Windows is expected to contain both
Owner and Primary Group SIDs. For more information about Security Descriptors and
Access Control Lists:
Feedback
Was this page helpful? Yes No
Server Message Block (SMB) file transfer speeds can slow down depending on the size
and quantity of your files, your connection type, and the version of apps you use. This
article provides troubleshooting procedures for slow file transfer speeds through SMB.
Slow transfer
You can troubleshoot slow file transfers by checking your current storage use. If you
observe slow transfers of files, consider the following steps:
robocopy /J
Test the storage speed. Copy speeds are limited by storage speed.
File copies sometimes start fast and then slow down. A change in copy speed
occurs when the initial copy is cached or buffered, in memory or in the RAID
controller's memory cache, and the cache runs out. This change forces data to be
written directly to disk (write-through).
Look for packet loss in the trace. Packet loss can cause throttling by the TCP
congestion provider.
For SMBv3 and later versions, verify that SMB Multichannel is enabled and
working.
On the SMB client, enable large MTU in SMB, and disable bandwidth throttling by
running the following cmdlet:
PowerShell
During file transfer, file creation causes both high protocol overhead and high file
system overhead. For large file transfers, these costs occur only one time. When a large
number of small files are transferred, the cost is repetitive and causes slow transfers.
Issue details
Network latency, create commands, and antivirus programs contribute to a slower
transfer of small files. The following are technical details about this problem:
SMB calls a create command to request that the file is created. Code checks
whether the file exists and then creates the file. Otherwise, some variation of the
create command creates the actual file.
You should verify that the Office and SMB binaries are up-to-date, and then test by
having leasing disabled on the SMB server. To verify both conditions have resolved,
follow these steps:
1. Run the following PowerShell cmdlet in Windows 8 and Windows Server 2012 or
later versions of Windows:
PowerShell
You can also run the following command in an elevated Command Prompt
window:
Console
REG ADD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\param
eters /v DisableLeasing /t REG\_DWORD /d 1 /f
7 Note
After you set this registry key, SMB2 leases are no longer granted, but oplocks
are still available. This setting is used primarily for troubleshooting.
2. Restart the file server or restart the Server service. To restart the service, run the
following commands:
Console
To avoid this issue, you can also replicate the file to a local file server. For more
information, see saving Office documents to a network server is slow when using EFS.
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot issues that are related to SMB multichannel.
PowerShell
After that, make sure the network interface is listed in the output of the following
cmdlets:
PowerShell
Get-SmbServerNetworkInterface
PowerShell
Get-SmbClientNetworkInterface
You can also run the Get-NetAdapter cmdlet to view the interface index to verify the
result. The interface index shows all the active SMB adapters that are actively bound to
the appropriate interface.
The following cmdlet reveals which connection profile is being used. You can also use
the Network and Sharing Center to retrieve this information.
PowerShell
Get-NetConnectionProfile
Under the File and Printer Sharing group, check the firewall inbound rules to make sure
that SMB-In is enabled for the correct profile.
You can also enable File and Printer Sharing in the Network and Sharing Center
window. To do this, select Change advanced sharing settings in the menu on the left,
and then select Turn on file and printer sharing for the profile. This option enables the
File and Printer Sharing firewall rules.
Make sure that the SMBv3.x connection is being negotiated, and that nothing in
between the server and the client is affecting dialect negotiation. SMBv2 and earlier
versions don't support multichannel.
Look for the NETWORK_INTERFACE_INFO packets. This is where the SMB client requests a list
of adapters from the SMB server. If these packets aren't exchanged, multichannel
doesn't work.
The server responds by returning a list of valid network interfaces. Then, the SMB client
adds those to the list of available adapters for multichannel. At this point, multichannel
should start and, at least, try to start the connection.
There's a routing issue on the client. This is typically caused by an incorrect routing
table that forces traffic over the wrong interface.
Multichannel constraints have been set. For more information, see New-
SmbMultichannelConstraint.
Something blocked the network interface request and response packets.
The client and server can't communicate over the extra network interface. For
example, the TCP three-way handshake failed, the connection is blocked by a
firewall, session setup failed, and so on.
If the adapter and its IPv6 address are on the list that is sent by the server, the next step
is to see whether communications are tried over that interface. Filter the trace by the
link-local address and SMB traffic, and look for a connection attempt. If this is a
NetConnection trace, you can also examine Windows Filtering Platform (WFP) events to
Feedback
Was this page helpful? Yes No
This article helps to fix the error message "System error 67 has occurred. The network
name cannot be found".
Symptoms
If you try to log on to a computer by using your domain account, the domain controller
stops responding. Additionally, you cannot access your folder by using the universal
naming convention (UNC) network path, and you receive the following error message:
Cause
This issue occurs if one of the following conditions is true:
The network components on the domain controller are not configured correctly.
You did not update the network drivers on the domain controller or the drivers
don't work with Microsoft Windows Server 2003.
Resolution
To resolve this issue, use either of the following methods.
Method 1
Update the network adaptor driver on the domain controller.
7 Note
Make sure that you use a network adaptor driver that works with the operating
system that you are using.
Method 2
If Network Address Translator (NAT) is installed but is not configured correctly, disable
the Internet Protocol (IP) NAT driver, and then restart the computer. You can follow
these steps:
Workaround
To work around this issue, restart the Distributed File System service on the domain
controller.
Feedback
Was this page helpful? Yes No
This article provides a solution to the system error 1331 that occurs when you connect
to a share.
Symptoms
When you attempt to connect to a share, you may receive the following error message:
The computer may also display a "System error 1331" error message, which is the
equivalent of the preceding "Logon failure: account currently disabled" error message.
7 Note
There are no events logged in Event Viewer that are related to these errors.
Cause
This problem can occur when you attempt to access a share that is located on a
computer in a domain (either parent or child) from another domain, or when you
attempt to gain access to a share that is located in the same domain.
This problem occurs most commonly when a Windows computer that has been a
member of one domain is moved to another domain. The computer account for the
computer that has been moved displays a red "X". For this problem to occur in a single-
domain environment, the computer account had to have been set to disabled.
Resolution
To resolve this problem, delete the disabled computer account in Active Directory Users
and Computers.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
at the beginning of this article.
More information
The resolution in this article has also been documented to resolve the problem that
causes the following error message:
Feedback
Was this page helpful? Yes No
In the network trace for the SMB issue, you notice that a TCP Reset abort occurred
during the Validate Negotiate process. This article describes how to troubleshoot the
situation.
Cause
This issue can be caused by a failed negotiation validation. This typically occurs because
a WAN accelerator modifies the original SMB Negotiate packet.
Microsoft no longer allows modification of the Validate Negotiate packet for any reason.
This is because this behavior creates a serious security risk.
Workaround
You can temporarily disable the Validate Negotiate process. To do this, locate the
following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters
In Windows PowerShell, you can run the following cmdlet to set this value:
PowerShell
Set-ItemProperty -Path
"HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters"
RequireSecureNegotiate -Value 0 -Force
7 Note
The Validate Negotiate process can't be disabled in Windows 10, Windows Server
2016, or later versions of Windows.
If either the client or server can't support the Validate Negotiate command, you can
work around this issue by setting SMB signing to be required. SMB signing is considered
more secure than Validate Negotiate. However, there can also be performance
degradation if signing is required.
Reference
3.3.5.15.12 Handling a Validate Negotiate Info Request
3.2.5.14.12 Handling a Validate Negotiate Info Response
Feedback
Was this page helpful? Yes No
This article describes how to troubleshoot Transmission Control Protocol (TCP) three-
way handshake failure during SMB connection.
When you analyze a network trace, you notice that there's a TCP three-way handshake
failure that causes the SMB issue to occur.
Generally, the cause is a local or infrastructure firewall that blocks the traffic. This issue
can occur in either of the following scenarios.
Console
PowerShell
Console
Console
Run a scenario trace, and look for WFP drops in SMB traffic (on TCP port 445).
Optionally, you could remove the anti-virus programs because they aren't always
WFP-based.
Make sure that the appropriate "File and Printer Sharing (SMB-In)" rules are
enabled in Windows Firewall with Advanced Security > Inbound Rules.
7 Note
Feedback
Was this page helpful? Yes No
This article provides a solution to solve Distributed File System Namespace (DFSN)
access failures.
Symptoms
On a computer that is running Windows XP or Window Server 2003, when you try to
access to a DFSN, you receive the following error message:
Configuration information could not be read from the domain controller, either
because the machine is unavailable, or access has been denied.
On Windows Vista and later versions of Windows, you may receive one of the following
error messages:
Cause
This error typically occurs because the DFSN client cannot complete the connection to a
DFSN path.
Connectivity
In this article, connectivity refers to the client's ability to contact a domain controller or a
DFSN server. If a client cannot complete a network connection to a domain controller or
to a DFSN server, the DFSN request fails.
Determine whether the client was able to connect to a domain controller for domain
information by using the DFSUtil.exe /spcinfo command. The output of this command
describes the trusted domains and their domain controllers that are discovered by the
client through DFSN referral queries. This is known as the Domain Cache.
In the following example, both the DNS domain name contoso.com and the NetBIOS
domain name CONTOSO are discovered by the client. Two domain controllers were
identified for the domain name CONTOSO: 2003server2 and 2003server1. If the client
accesses the DNS name contoso.com in a request, the entries are displayed under the
contoso.com entry.
Output
[*][2003server1.contoso.com]
[*][CONTOSO]
[*][contoso.com]
[+][CONTOSO]
[-2003server2]
[+2003server1]
[-][contoso.com]
Entries that are marked by an asterisk (*) were obtained through the Workstation
service. The other entries were obtained through referrals by the DFSN client. The
entries that are marked by a plus sign (+) are the domain controllers that are currently
used by the client. For more information about referral processes, see How DFS Works.
start \\192.168.1.11
net view \\192.168.1.11
A successful connection lists all shares that are hosted by the domain controller.
The following output details the expected entries within the client's referral cache after
the client accesses the DFSN path \\contoso.com\dfsroot\link . The root has two targets
(rootserver1 and rootserver2). The link has a single target (fileserver).
Output
Entry: \contoso.com\dfsroot
ShortEntry: \contoso.com\dfsroot
Expires in 300 seconds
UseCount: 0 Type:0x81 ( REFERRAL_SVC DFS )
0:[\ROOTSERVER1\dfsshare] State:0x119 ( ACTIVE )
1:[\ROOTSERVER2\dfsshare] State:0x09 ( )
Entry: \contoso.com\dfsroot\link
ShortEntry: \contoso.com\dfsroot\link
Expires in 1800 seconds
UseCount: 0 Type:0x1 ( DFS )
0:[\fileserver\data] State:0x131 ( ACTIVE )
If you cannot find an entry for the desired namespace, this is evidence that the domain
controller did not return a referral. DFSN service failures are discussed later in this
article.
If you see an entry for the namespace (that is, \contoso.com\dfsroot ), the entry proves
that the client was able to contact a domain controller, but then did not reach any DFSN
namespace targets. If not any of the namespace targets that are listed are designated as
ACTIVE, that indicates that all targets were unreachable.
Try to access to each namespace server by using IP addresses. For this test, you must
specify only the IP address of the server, and you must not include the namespace share
(that is, net view \\192.168.1.11 but not net view \\192.168.1.11\dfsroot ). Otherwise,
you may unknowingly be referred to another DFS root server. If this occurs, you will
receive misleading results. Note any error messages that are reported during these
actions.
You must investigate and resolve any failures of a domain controller or of DFS
namespace server communications. For more information about TCP/IP networking
details and about troubleshooting utilities, see TCP/IP Technical Reference.
Name resolution
Clients must resolve the name of the DFS namespace and of any servers that are hosting
the namespace. Review the output that was previously generated by the dfsutil
/pktinfo and dfsutil /spcinfo commands. The server names that are listed must be
You can use the following methods to verify proper name resolution functionality.
NetBIOS name resolution failures may occur because name records are missing or
because you received the wrong IP address for the name. To test this, try to access
the domain controller by using only its NetBIOS computer name (that is, by using
the command net view \\2003server1 ). Then, verify that the shares that are listed
are those that are expected to be hosted by the server. As an administrator, you
can view the client's NetBIOS name cache by using the nbtstat -c command to
review all resolved names and their IP addresses. Consider the following example.
ノ Expand table
Name NetBIOS Remote Type Cache Name Table Host Address Life [sec]
DNS names
By default, DFSN stores NetBIOS names for root servers. DFSN can also be
configured to use DNS names for environments without WINS servers. For more
information, see How to configure DFS to use fully qualified domain names in
referrals .
You can view the client's DNS resolver cache to verify resolved DNS names. To do
this, open a command prompt, and type the ipconfig /displaydns command.
Windows IP Configuration
2003server1
Record Name . . . . . : 2003server1.contoso.com
Record Type . . . . . : 1
Time To Live . . . . : 882
Data Length . . . . . : 4
Section . . . . . . . : Answer
A (Host) Record . . . : 192.168.1.11
Network capture
A network capture may help you diagnose a name resolution failure. Before you
perform a capture, flush cached naming information on the client. If you do this,
you will not expose any problems that may exist in the capture because cached
referral data or names will not be requested again over the network. To flush the
name caches, run the following commands in this order:
nbtstat -RR
ipconfig /flushdns
dfsutil /pktflush
dfsutil /spcflush
For more information about the Microsoft Network Monitor 3, see Information about
Network Monitor 3 .
For more information about the network traffic that is observed between a client and a
domain-based DFS environment, see How DFS Works.
For more information about DNS and WINS, see Name Resolution Technologies.
First, verify that the DFS service is started on all domain controllers and on DFS
namespace/root servers. If the service is started in all locations, make sure that no DFS-
related errors are reported in the system event logs of the servers.
When an administrator makes a change to the domain-based namespace, the change is
made on the Primary Domain Controller (PDC) emulator master. Domain controllers and
DFS root servers periodically poll PDC for configuration information. If the PDC is
unavailable, or if "Root Scalability Mode" is enabled, Active Directory replication
latencies and failures may prevent servers from issuing correct referrals. For more
information about Root Scalability Mode, see Reviewing DFS Size Recommendations.
One method to evaluate replication health is to interrogate the status of the last
inbound replication attempt for each domain controller. To do this, run the
repadmin.exe command. The required syntax for this command is as follows:
7 Note
In this command, * represents all domain controllers that are to be queried, and
DN_of_domain represents the distinguished name of the domain, such as
dc=contoso,dc=com.
Review the status and time of the last successful replication to make sure that DFSN
configuration changes have reached all domain controllers. You should investigate any
failures that are reported for inbound replication to a DC.
DFSN configuration problems may also prevent access to the namespace. One common
scenario in which this occurs is a client that belongs to a site that contains no
namespace or folder targets. If the namespace is configured to issue referral targets only
within the client's site (the insite option), DFSN will not provide a referral. To evaluate
whether the insite option is configured on a namespace, open a command prompt, and
then type the dfsutil /path:\\contoso.com\dfs /insite /display command.
Similarly, Active Directory site configuration problems may prevent DFSN servers from
correctly determining the client site. Therefore, these problems may cause referral
failures if insite is configured. The DFSN service maps the client to a site by analyzing the
source IP address of the client's referral request. The DFS service also maps each root
target server to a site by resolving the target server's name to an IP address. To evaluate
whether a domain controller or a DFS root can determine the correct site of the system,
run either of the following commands locally on the domain controllers and on the DFS
namespace server:
dfsutil /sitename:root_target_name
dfsutil /sitename:client_ip_address
References
Designing the Site Topology
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix common DFS-
Namespace issues.
Troubleshooting checklist
Examine the SMB traffic to see if the issue is with getting the referral list from the
namespace server or connecting to the referred file server. To do so, follow these steps:
First, filter the trace by the SMB traffic for the DFS Namespace IP address. Example filter:
tcp.port==445 .
1. The protocol is named DFSC by packet capture parsers. Look for the DFSC traffic in
the filtered results or append the filter with DFSC in netmon or MA: tcp.port==445
and DFSC .
2. The client should send a DFS referral request to the DFS Namespace server. If no
DFS referral is being sent, and there's no indication of a firewall or anti-virus block,
restart the DFS client to clear any DFS referral caching. Then, start the data
collection steps over again.
3. The server should send a DFS referral response to the DFS client.
4. The referral step has completed successfully if a referral list has been returned. Skip
to step 4 if the referral process completed successfully.
5. Verify whether the DFS Referral Request arrived at the DFS Namespace server.
Standard TCP/IP and firewall troubleshooting applies if the referral doesn't arrive.
The most likely cause is the traffic being dropped or blocked somewhere.
Look for the DFS client to resolve DNS (assuming it isn't cached) and make a connection
to a file server.
1. It's possible that Windows won't attempt to contact a referral if there are other
networking issues, such as a DNS resolution failure.
2. To ensure that Windows will perform DNS resolution, you can flush the DNS cache
after starting the trace and before reproducing the issue. This operation allows you
to verify that DNS resolution is working correctly.
a. In Windows 8 and later versions of Windows, use PowerShell cmdlet: Clear-
DnsClientCache .
Data collection
Before contacting Microsoft support, you can gather information about your issue.
Prerequisites
1. TSS must be run by accounts with administrator privileges on the local system, and
EULA must be accepted (once EULA is accepted, TSS won't prompt again).
2. We recommend the local machine RemoteSigned PowerShell execution policy.
7 Note
If the current PowerShell execution policy doesn't allow running TSS, take the
following actions:
Set the RemoteSigned execution policy for the process level by running the
cmdlet PS C:\> Set-ExecutionPolicy -scope Process -ExecutionPolicy
RemoteSigned .
To verify if the change takes effect, run the cmdlet PS C:\> Get-
ExecutionPolicy -List .
Because the process level permissions only apply to the current PowerShell
session, once the given PowerShell window in which TSS runs is closed, the
assigned permission for the process level will also go back to the previously
configured state.
3. Start the traces on the client and the server by using the following cmdlets:
Client:
PowerShell
Server:
PowerShell
4. Accept the EULA if the traces are run for the first time on the server or the client.
7 Note
If you collect logs on both the client and the server, wait for this message on
both nodes before reproducing the issue.
The traces will be stored in a zip file in the C:\MS_DATA folder, which can be uploaded to
the workspace for analysis.
Reference
Frequently Asked Questions
Feedback
Was this page helpful? Yes No
Try our Virtual Agent - It can help you quickly identify and fix common SMB issues.
This article is designed to help you troubleshoot Server Message Block (SMB) issues.
Most users are able to resolve their issue by using the solutions that are provided here.
SMB terminology
Communicating correct terminology is a key aspect of quality SMB troubleshooting.
Therefore, you should learn basic SMB terminology to ensure the accuracy of data
collection and analysis.
SMB Server (SRV) (also known as the file server) is always the system that hosts the
file system.
SMB Client (CLI) is always the system that tries to access the file system.
These terms are consistent regardless of the operating system version or edition. For
example, if a Windows Server 2016-based computer tries to reach the SMB share
\\MyWorkstation\Data on a Windows 10-based computer, Windows Server 2016 is the
SMB Client and Windows 10 is the SMB Server.
Troubleshooting checklist
Check that the correct SMB network protocol is installed. The SMBv1 network
protocol is no longer installed by default.
Disable SMBv1.
If SMBv1 is disabled on a device that supports only SMBv1, you can't access that
device. In this situation, upgrade your system.
You can't disable SMBv2 or SMBv3 separately because these versions are part of
the same driver.
Analyze the traffic: SMB is an application-level protocol that uses TCP/IP as the
network transport protocol. Therefore, an SMB-related issue might indicate that
there are underlying TCP/IP-related issues.
Analyze the protocol: To understand the exact commands and options that are
used, look at the actual SMB protocol details in the network trace.
Update SMB-related system files: Keep the system files updated. Make sure that
the latest update rollup is installed.
SMB file information
SMB Client binaries that are listed under %windir%\system32\Drivers:
RDBSS.sys
MRXSMB.sys
MRXSMB10.sys
MRXSMB20.sys
MUP.sys
SMBdirect.sys
Srvsvc.dll
SRVNET.sys
SRV.sys
SRV2.sys
SMBdirect.sys
We recommend that you update the following components before you troubleshoot
SMB issues:
iSCSI: A file server requires file storage. If your storage has iSCSI components,
update those components.
Network: Update the network components.
Windows Core: For better performance and stability, update Windows Core.
7 Note
You can use this command on remote computers, also. Run Net help use for more
options.
) Important
To troubleshoot this issue, you can configure the option to use the client access network
for Cluster Shared Volumes (CSV). Or, upgrade to Windows Server 2012 R2 or a later
version. That system automatically redirects clients to the cluster node that has the best
access to the volume of the file share. For more information, see the following Blog
Archive article: Automatic SMB Scale-Out Rebalancing in Windows Server 2012 R2.
To troubleshoot this issue, disable the RSS capability on the physical network adapter, or
use SMB Multichannel constraints to restrict SMB communication to one or more
defined network interfaces. For more information, see the New-
SmbMultichannelConstraint SMB Share cmdlet in Windows PowerShell.
To troubleshoot this issue, update the network adapter firmware and driver from the
manufacturer's website.
On server operating systems, SMB Multichannel starts quickly only one time per session.
On client operating systems, you can configure a registry entry to start SMB
Multichannel more quickly. For more information, see the following Blog Archive blog
article: How much traffic needs to pass between the SMB Client and Server before
Multichannel actually starts?.
You might have to disable RSS on both network adapters to aggregate throughput. For
more information, see the following Blog Archive blog article: Windows Server 2012 File
Server Tip: Make sure your network interfaces are RSS-capable.
To troubleshoot this issue, use multiple virtual network adapters to make sure that you
have multiple TCP connections. For more information, see the following Blog Archive
blog article: Windows Server 2012 File Server Tip: Make sure your network interfaces are
RSS-capable.
On Windows Server 2012 R2, the LanmanServer service automatically starts the
SmbDirect service. However, if the LanmanWorkstation service happens to start first and
tries to open an RDMA connection before the SmbDirect service loads, Windows logs
event ID 30818. When the client initially communicates with the server over TCP/IP, it
uses the RDMA interface. Therefore, no user action is needed to recover.
Workaround
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For protection, back up
the registry before you modify it so that you can restore it if a problem occurs. For
more information about how to back up and restore the registry, see How to back
up and restore the registry in Windows .
To work around this issue on Windows Server 2012 R2, configure the SmbDirect service
to start automatically. To do this, follow these steps:
1. Open Registry Editor, and then navigate to the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\smbdirect
3. In the Value data box, change the value (the default value is 3, which means on-
demand) to 2 (automatic).
After you make this change, you should be able to restart the computer without
Windows logging event ID 30818 messages. If Windows continues to log these events,
some other issue might be preventing the RDMA interface from initializing.
If this is a fresh deployment of Windows Server that has no roles or features enabled,
you can safely ignore this event.
SMB known issues
TCP three-way handshake failure
Slow files transfer speed
Negotiate, Session Setup, and Tree Connect Failures
TCP connection is aborted during Validate Negotiate
SMB Multichannel troubleshooting
High CPU usage issue on the SMB server
Troubleshoot the Event ID 50 Error Message
SMBv1 is not installed by default
Access Denied when you access an SMB file share
Data collection
Before you contact Microsoft Support, you can gather information about your issue.
Prerequisites
Run TSS in the security context of an account that has administrator privileges on
the local system. The first time that you run it, accept the EULA. (After you accept
the EULA, TSS won't prompt you again.)
We recommend that you use the RemoteSigned PowerShell execution policy at the
LocalMachine scope.
7 Note
If the current PowerShell execution policy doesn't allow you to run TSS, take the
following actions:
1. Set the RemoteSigned execution policy for the process level by running the
Set-ExecutionPolicy -scope Process -ExecutionPolicy RemoteSigned cmdlet.
2. To verify that the change takes effect, run the Get-ExecutionPolicy -List
cmdlet.
These process-level permissions apply to only the current PowerShell session. After
you close the PowerShell window in which TSS runs, the assigned permission for
the process level reverts to the previously-configured state.
Gather key information before contacting Microsoft
support
1. Download TSS on all nodes, and expand the file into the C:\tss folder.
3. Start the traces on the client and the server by running the following cmdlets:
Client:
PowerShell
Server:
PowerShell
4. Accept the EULA if the traces are run for the first time on the server or the client.
7 Note
If you collect logs on both the client and the server, wait for this message to
appear on both nodes before you reproduce the issue.
TSS stores the traces in a compressed file in the C:\MS_DATA folder. You can upload the
file to the workspace for analysis.
References
Advanced Troubleshooting Server Message Block (SMB)
Enable or disable SMB versions
File sharing using the SMBv3
SMB compression
Feedback
Was this page helpful? Yes No
This article describes a problem that occurs if you're behind a proxy server or behind a
firewall that doesn't support HTTP 1.1 range requests.
Symptoms
When you try to download a file by using the Background Intelligent Transfer Service
(BITS), you're unsuccessful. Additionally, the following error message is logged in the
Application log:
Event Type:Error
Event Source:Windows Server Update Services
Event Category:(2)
Event ID:364
Date: date
Time: time
User:N/A
Computer: ServerName
Description: Content file download failed. Reason: The server does not support the
necessary HTTP protocol. Background Intelligent Transfer Service (BITS) requires that
the server support the Range protocol header.
Specifically, you experience this problem if you try to perform one or both of the
following actions:
The proxy server environment doesn't support the HTTP 1.1 range request feature.
You're behind a SonicWALL firewall device, and the Enable HTTP Byte-Range
request with Gateway AV setting isn't enabled for the device.
When you copy a file by using BITS in background mode, the file is copied in multiple
small parts. To perform this kind of copy operation, BITS uses the HTTP 1.1 Content-
Range header. If you're behind a proxy server or behind a firewall that removes this
header, the file copy operation is unsuccessful.
7 Note
When BITS copies files in foreground mode, BITS doesn't use this header.
1. Click Start, click Run, type one of the following commands, and then click OK.
If you're using WSUS 2.0 with an MSDE or WMSDE database that was created by a
default WSUS installation, type the following command:
Console
%programfiles%\Update Services\tools\osql\osql.exe -S
%Computername%\WSUS -E -b -n -Q "USE SUSDB update tbConfigurationC set
BitsDownloadPriorityForeground=1"
If you configured WSUS 2.0 to use an existing installation of Microsoft SQL Server,
type the following command:
Console
%programfiles%\Update Services\tools\osql\osql.exe" -S %Computername% -
E -b -n -Q "USE SUSDB update tbConfigurationC set
BitsDownloadPriorityForeground=1"
If you're using WSUS 3.0 with a Windows Internal Database that was created by a
default WSUS installation, type the following command:
Console
%programfiles%\Update Services\Setup\ExecuteSQL.exe -S
%Computername%\MICROSOFT##SSEE -d "SUSDB" -Q "update tbConfigurationC
set BitsDownloadPriorityForeground=1"
```console
%programfiles%\Update Services\Setup\ExecuteSQL.exe -S %Computername% -
d "SUSDB" -Q "update tbConfigurationC set
BitsDownloadPriorityForeground=1"
SonicWALL support
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft does not guarantee the
accuracy of this third-party contact information.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where a backlog is reported for a Read-Only
member after you remove a replication file filter.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 4021676
Symptoms
Consider the following scenario:
You are running Windows Server 2019, Windows Server 2016, or Windows Server
2012 R2.
The system uses Distributed File System Replication (DFSR) and includes Read-Only
replicated folders.
You are prestaging data regardless of the replication filter from DFSR Read/Write
to Read-Only member candidates. Therefore, files that are in the filter set now exist
on all members.
After the initial replication, you remove a replication file filter.
When DFSR members detect the filter change, they all run a DirWalkerTask look-
up for content.
On a Read-Only member, this process creates a UID for the file object and
increments the version vector Global Version Sequence Number (GVSN). However,
the local change is not propagated.
The Read/Write partner creates its own UID for the same file, and the Read-Only
member detects a name conflict.
Per standard conflict resolution, the newer local version of the file is selected. The
Read-Only member reports Local version dominates and subsumes the update
from the Read/Write partner.
The Read-Only member increments its GVSN and generates a tombstone for the
UID from the Read/Write partner. However, neither change is propagated.
In this scenario, a backlog is reported from the Read-Only member to the Read/Write
partner because the DFSR service has two local changes that are not replicated to its
partner. The first report entry is for the local change when DFSR introduces the file as a
new object. The second entry is created when DFSR generates a tombstone for the file
version from the Read/Write partner that lost the conflict resolution. It does this by
deleting that file version.
7 Note
When the same file is later changed on the Read/Write member, the Read-Only
member reuses the tombstone record in its database by reporting it as "Remote
version dominates" and then providing its own UID version. This action generates
conflict event 4412. Additionally, the Read-Only member clears its backlog.
Cause
This behavior is by design. The Read-Only member applies the standard conflict
resolution mechanism to new replication content if a filter is removed and existing
content has to be integrated into DFSR.
Resolution
In most circumstances, you can safely ignore backlogs that are reported in the DFSR
Read-Only member to Read/Write partner direction. This is because a Read-Only
member is not intended to have real changes.
If only a few files are affected, consider making generic changes to the files on the
Read/Write member.
Generally, an initial sync is required for the Read-Only member to remove such a
backlog.
More information
When you use Windows PowerShell scripts and the Get-DfsrBacklog cmdlet to create an
overview for multiple DFSR setups, you may want to consider the following logic to
exclude backlog outputs from Read-Only members to their partners:
PowerShell
#new variable for the DFSR subcription for the RF, containing the
value/attribute "ReadOnly"; obtained by Get-DfsrMembership
#now gather only the Backlog output, when the senders configuration for this
RF is not Read-only
if ($DfsrSubscription.ReadOnly -eq 0)
{
Get-DfsrBacklog -Groupname $RGName -Foldername $RFName -
SourceComputerName $SMem -DestinationComputerName $RMem -verbose
}
else
{
Write-Host "Backlog detection skipped because Sending Member ($SMem) is
Read-only for this RF ($RFName)"
}
Result: Instead of backlog output from the Read-Only member, you now see the
following report entry:
7 Note
Even after the initial backlog clears, Read-Only members may again show a backlog
of updates after some time. If these updates are version vector tombstones (also
known as VersionVectorTombstones), you can ignore them. Such updates do not
include actual changes. A Read-Only member generates version vector tombstone
updates under the following conditions:
For more information about these functions, see The UID of version vector tombstones
in Processing Updates.
These generic updates increase version sequence numbers (and therefore change the
GVSN version chain vector) on the Read-Only member. However, the Read-Only
member never shares these updates with its replication partners, so the updates are
never tracked by using the global version vector on the other members. Therefore, a
backlog count shows a visible delta between the Read-Only member and its replication
partners.
To keep such updates from generating confusing data, scripts that gather backlog data
should exclude Read-Only members.
Feedback
Was this page helpful? Yes No
This article provides a resolution for the issue that the ConflictAndDeleted folder size
may exceed its configured limitation.
Symptoms
In Windows Server, the size of the ConflictAndDeleted folder may exceed its configured
limitation. By default, the limitation of the ConflictAndDeleted folder is 660 megabytes
(MB). When this problem occurs, the ConflictAndDeleted folder may exhaust available
disk space on the volume on which the folder resides. Additionally, the Distributed File
System (DFS) Replication service cannot replicate any files.
Cause
This problem occurs because the ConflictAndDeletedManifest.xml file is corrupted. This
file stores information about the current contents of the ConflictAndDeleted folder. The
DFS Replication service writes to the ConflictAndDeletedManifest.xml file when files are
added or removed from the ConflictAndDeleted folder.
Resolution
To resolve this problem, use WMIC commands to delete the contents of the
ConflictAndDeleted folder and the ConflictAndDeletedManifest.xml file. Run the WMIC
commands in a Command Prompt window (cmd.exe). To clean up the
ConflictAndDeleted folder content of a replicated folder, run the following command:
Console
Console
7 Note
7 Note
If you have not run a WMIC command on the computer before, a short pause
occurs while the computer installs WMIC.
Depending on the size of the ConflictAndDeleted folder, this process may take a few
minutes. The process empties the ConflictAndDeleted folder and reduces or deletes the
ConflictAndDeletedManifest.xml file.
7 Note
Status
Microsoft has confirmed that it is a problem in the Microsoft products that are listed in
the "Applies to" section.
Feedback
Was this page helpful? Yes No
This article describes how to directly modify the permissions on the configuration
objects for each replication group.
Introduction
Distributed File System (DFS) replication uses the Active Directory directory service to
store configuration objects. When you use Active Directory, you can delegate user rights
more exactly. The DFS Management feature provides high-level delegation support. This
support lets you grant users the ability to create a replication group. This support also
lets you grant users administrative rights on a replication group that has already been
created.
Configuration objects
It is useful to have an overview of all objects before you view each object in detail. This
section describes the objects that are used to configure DFS replication. The permissions
to these objects determine which users can perform specific operations on replication
groups.
Global objects
Global objects configure the replica set as a whole. For example, global objects
configure the number of replicated folders. Global objects also configure the
connections between each member of the replication group.
msDFSR-GlobalSettings
This object is created at the following times:
The only security modification to this object that we recommend is to grant users the
right to create msDFSR-ReplicationGroup child objects in this container. To use DFS
Management for this task, perform the Delegate Management Permissions action on the
Replication node.
msDFSR-ReplicationGroup
This object contains all the global settings that are specific to a single replication group.
To modify the permissions on this container in DFS Management, perform the Delegate
Management Permissions action on a replication group. You can grant a user
administration rights on a replication group. You can also grant the user control of the
msDFSR-ReplicationGroup object and of all the child objects for a replication group. The
following attributes are stored in this object:
1. Description
The replication group description.
2. msDFSR-Topology
The default schedule.
msDFSR-Content
This object is created under the msDFSR-ReplicationGroup object when the replication
group is created. The msDFSR-Content object contains a msDFSR-ContentSet object for
each replicated folder in the replication group.
7 Note
msDFSR-ContentSet
Description
The description of the replicated folder.
msDFSR-FileFilter
File filter for files is excluded from replication.
msDFSR-DirectoryFilter
Directory filter for folders is excluded from replication.
msDFSR-DfsPath
Path of DFS folder when the replicated folder is published to a DFS namespace.
msDFSR-Topology
This object is created under the msDFSR-ReplicationGroup object when the replication
group is created. The msDFSR-Topology object contains a msDFSR-Member object for
each member of the replication group.
7 Note
msDFSR-Member
A msDFSR-Member object is created for each member of the replication group. This
object references the computer object for the member. This object contains a msDFSR-
Connection object for each connection where this member is the receiving member of
the connection. The following attributes are stored in this object:
msDFSR-ComputerReference
A reference to the computer object for the member.
msDFSR-Connection
A msDFSR-Connection is created as a child of a msDFSR-Member object for each
incoming replication connection to that member. The following attributes are stored in
this object:
msDFSR-Enabled
The enabled state of the connection.
msDFSR-Schedule
The custom schedule of the connection.
msDFSR-Keywords
Keywords for the connection.
msDFSR-RdcEnabled
The enabled state of the rRemote Differential Compression.
Server-local objects
Server-local objects exist in the computer account for each server that participates in a
replication. These objects configure individual members of the replication group.
msDFSR-LocalSettings
This object is the top-level container for DFS replication objects on a computer account.
msDFSR-Subscriber
msDFSR-MemberReference
A reference to the msDFSR-Member object.
msDFSR-Subscription
The msDFSR-Subscription object contains settings that are unique to each replicated
folder on the server. The following attributes are stored in this object:
msDFSR-RootPath
The local path of the replicated folder.
msDFSR-StagingPath
The staging path of the replicated folder.
msDFSR-StagingSizeInMb
The size of the staging folder.
msDFSR-ConflictSizeInMb
The size of the conflict folder.
msDFSR-Enabled
The enabled state of the subscription.
msDFSR-Flags
A flag that controls whether deleted files are moved to the conflict folder.
Detailed delegation
Grant permissions to create a replication group
This action is one of the two delegation actions that are available in DFS
Management. To manually perform this action in Active Directory Users and
Computers, follow these steps:
To grant a user control of all existing and future replication groups in a domain,
follow these steps:
To grant a user rights only to modify, to add, or to delete a replicated folder, follow
these steps:
Feedback
Was this page helpful? Yes No
This article discusses an issue where the Distributed File System Replication (DFSR)
service fails to replicate files after restoring a virtualized server's snapshot.
Symptoms
Using any virtualization product, you create a guest snapshot of a server replicating files
with DFSR. You later restore that snapshot, returning the server to an earlier point in
time.
No files replicate inbound or outbound for several minutes, then DFSR events 5014
and 5004 are logged indicating replication is resuming.
Any files created, deleted, or modified after the snapshot was taken but prior to
restoration replicate inbound.
Any files created, deleted, or modified after the restoration don't replicate
outbound.
Any changes to files on partner servers will replicate inbound, regardless of up-to-
dateness, overwriting all changes made locally and potentially deleting newer data.
After a period of time, the DFSR databases will write errors and warnings in the
event log and rebuild automatically. After the rebuild completes successfully, DFSR
will again log internal errors and rebuild the database. This will continue infinitely.
Additional Information:
Volume: C:
GUID: <GUID>
Log Name: DFS Replication
Source: DFSR
Date: <DateTime>
Event ID: 2104
Task Category: None
Level: Error
Keywords: Classic
User: N/A
Computer: 2008r2-06-f.contoso.com
Description:
The DFS Replication service failed to recover from an internal database error
on volume C:. Replication has been stopped for all replicated folders on this
volume.
Additional Information:
Error: 9214 (Internal database error (-1605))
Volume: 92404560-E6C8-11DF-BCA2-806E6F6E6963
Database: C:\System Volume Information\DFSR
Log Name: DFS Replication
Source: DFSR
Date: <DateTime>
Event ID: 2004
Task Category: None
Level: Error
Keywords: Classic
User: N/A
Computer: 2008r2-06-f.contoso.com
Description:
The DFS Replication service stopped replication on volume C:. This failure can
occur because the disk is full, the disk is failing, or a quota limit has been
reached. This can also occur if the DFS Replication service encountered errors
while attempting to stage files for a replicated folder on this volume.
Additional Information:
Error: 9014 (Database failure)
Volume: 92404560-E6C8-11DF-BCA2-806E6F6E6963
Log Name: DFS Replication
Source: DFSR
Date: <DateTime>
Event ID: 2106
Task Category: None
Level: Information
Keywords: Classic
User: N/A Computer: 2008r2-06-f.contoso.com
Description:
The DFS Replication service successfully recovered from an internal database
error on volume C:. Replication has resumed on replicated folders on this
volume.
Additional Information:
Volume: 92404560-E6C8-11DF-BCA2-806E6F6E6963
Database: C:\System Volume Information\DFSR
Any servers that replicate with the restored computer will repeatedly show in their
%systemroot%\debug\dfsr*.log files:
Cause
Snapshots aren't supported by the DFSR database or any other Windows multi-master
databases. This lack of snapshot support includes all virtualization vendors and
products. DFSR doesn't implement USN rollback quarantine protection like Active
Directory Domain Services.
Snapshot restore is only supported for read-only members as their version vector isn't
tracked on partners and a USN rollback can't happen.
Resolution
To resolve this issue, contact Microsoft Support. The resolution involves special database
recovery steps that can be used to fix the affected server without impacting other
computers.
Recreating the replication group or replicated folder will not fix the issue on the restored
server and shouldn't be used as a troubleshooting step.
More information
For more information around snapshots and USN rollback protection, review:
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where the Distributed File System
Replication (DFSR) database fails on a DFSR Replication member.
Symptom
The DFSR database may fail on a DFSR Replication member.
The DFSR service stops replication with error Event ID 2104. Since clients still use this
member as change target, you do not want to lose the changes and need a solution
without restoring content from a backup. When you manually rebuild the DFSR
database by deleting the database from <Volume>:\System Volume Information\DFSR
and restarting DFSR service, DFSR performs initial replication from any other still-
enabled member as non-master and moves conflicting files to the ConflictAndDeleted
folder or new files to PreExisting. This may cause unnecessary manual clean up and
recovery.
The idea to avoid this condition is to reinitialize the affected replicated folder in an order
that ensures that the affected member becomes the designated primary member of the
corresponding replicated folders.
Resolution
When a DFSR database crash affected member needs to become primary master of a
replicated folder:
1. Check that all members are set to disabled for the folder, check for event 4008 on
all of them when you need to change the setting.
2. Force Active Directory replication when members in different Active Directory sites
and use DFSRDIAG POLLAD /MEM:<MEMBER> to update the DFSR service after
each change in the configuration.
3. Enable the folder on the designated primary member first and wait for Event ID
4112 indicating that This member is the designated primary member for this
replicated folder.
4. Enable other member(s) for the replicated folder and wait for Event ID 4104
indicating that The DFS Replication service successfully finished initial replication on
the replicated folder.
Feedback
Was this page helpful? Yes No
This article describes an issue in which you receive the DFS Replication event 2212, and
DFSR stops after you restart Windows Server 2008. A short time later, event 2214 is
logged in the DFS Replication log.
Symptoms
When you restart the Distributed File System Replication (DFSR) service on a server that
is running Windows Server 2008, or you restart the server, the following event may be
logged in the DFS Replication log:
Source: DFSR
Level: Warning
Keywords: Classic
User: N/A
Computer: MyDfsrMember.contoso.com
Description:
Cause
This issue occurs because the Service Control Manager (SCM) uses the default time-out
value of 20 seconds for stopping a service. In some complex DFSR implementations, this
time-out value may be too short, and DFSR stops before the appropriate database is
closed. At service restart, DFSR detects this condition and performs the database
recovery.
Resolution
To resolve this issue, you can change the default time-out value that is used by the SCM
by adding the following registry value:
1. Click Start, click Run, type regedit , and then click OK.
3. On the Edit menu, point to New, and then click String Value.
If the time interval is something other than 60 seconds, you can set the value of the
WaitToKillServiceTimeout registry value to the difference in time, in milliseconds,
between the following two events in the DFSR event log:
1006 - The DFS Replication service is stopping.
Feedback
Was this page helpful? Yes No
This article describes an issue that triggers event ID 2213 in Windows 2008 or Windows
2012.
Summary
Microsoft has introduced new functionality to the DFS Replication (DFSR) service for
Windows Server 2008 R2 through hotfix 2663685 . After you install hotfix 2663685 or a
later version of Dfsrs.exe in Windows Server 2008 R2, the DFSR Service no longer
performs automatic recovery of the Extensible Storage Engine (ESE)) database after the
database experiences a dirty shutdown. Instead, when the new DFSR behavior is
triggered, event ID 2213 is logged in the DFSR log. A DFSR administrator must manually
resume replication after a dirty shutdown is detected by DFSR.
The DFSR service maintains one ESE database per volume on volumes that host a
replicated folder. DFSR uses this database to store metadata about each file and folder
in the replicated folder. The integrity of the database must be maintained to make sure
that the service continues to work correctly.
When DFSR is notified that the service must shut down, it starts to commit all
outstanding changes to the ESE database. Dirty shutdown in DFSR occurs when the
DFSR service cannot commit all pending changes to the DSFR ESE database before the
DFSR service is shut down. During startup, the DFSR service checks the integrity of the
database.
Dirty shutdown recovery may cause large backlogs, and these, in turn, may cause
replication conflicts. In some cases, before the fix in hotfix 2780453 was released, the
winning file may not be the version that the end-user wants. The update to stop
replication during dirty shutdown was intended as a safeguard that lets administrators
back up the data to capture deltas since the last backup was taken before replication is
resumed.
After you install hotfix 2780453, you no longer have to pause replication during a dirty
shutdown. The fix from hotfix 2780453 is included in all Windows 2012 default media.
Best practices
Best practices for AutoRecovery based on server role, OS, and patch level:
ノ Expand table
DC On On On
Cluster Node On On On
Read-only DFSR On On On
Server
Key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DFSR\Parameters
Value: StopReplicationOnAutoRecovery
Type: Dword
Data: 0
2. To resume the replication for this volume, use the ResumeReplication WMI method
of the DfsrVolumeConfig class. For example, from an elevated command prompt,
run the following command:
Console
Console
Executing(file://ww2008r2dc1/root/microsoftdfs:DfsrVolumeConfig.VolumeGuid=%2
2F1CF316E-6A40-11E2-A826-00155D41C919%22)-
%3EResumeReplication()">\WW2008R2DC1\root\microsoftdfs:DfsrVolumeConfig.Vo
lumeGuid="F1CF316E-6A40-11E2-A826-00155D41C919")->ResumeReplication()
Method execution successful.Out Parameters:instance of __PARAMETERS{
ReturnValue = 0;};
For PowerShell users, you have to add single quotation marks to the WMIC command to
run it from PowerShell, as follows:
PowerShell
If you disable and enable the replicated folder before you run the WMIC command,
initial synchronization does not occur because the volume manager is offline.
Power outages or any other hard reboot of a DFSR server may also trigger a dirty
shutdown recovery. To reduce the chances of a dirty shutdown, make sure that your
DFSR servers are connected to an uninterruptible power supply (UPS) to allow them to
gracefully shut down.
A DSFR server that needs more time to shut down typically logs events 2212 and 2214
on most server restarts or restarts of the service. Or if AutoRecovery from a dirty
shutdown is enabled, event 2213 is logged on every server restart or restart of the DFSR
service.
Path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
Value: WaitToKillServiceTimeout
Type: String
Data: 300000
This value is in milliseconds. This example displays five minutes of shutdown time. The
value can be increased or decreased as necessary. This value affects all services, not just
DFSR. We recommend that you set this value to the lowest value that still gives DFSR
sufficient time to shut down cleanly. Use the following process to determine how long
your DFSR service needs to shut down:
) Important
See the note about installing 2549760 in the following Notes about
WaitToKillServiceTimeOut section.)
2. Monitor the next few restarts of the server for DFSR events 1006 (DFSR is stopping)
and 1008 (DFSR Stopped). Note the time that elapsed between events 1006 and
1008.
To make sure that SCM works correctly where the WaitToKillServiceTimeout setting
is concerned, make sure that hotfix 2549760 is installed on Windows Server 2008
R2.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where DFSR Diagnostics Report shows
sharing violations events even though the files have already been replicated.
Symptoms
When you run the Distributed File System Replication (DFSR) Diagnostics Report (DFSR
Health Report) on a Microsoft Windows Server 2008-based computer or on a Windows
Server 2003-based computer, the report contains many entries for the sharing violations
events. However, when you check the files on the replication partner, you find that the
files have already been replicated.
Cause
This issue occurs in the current implementation of DFSR because no anti-events are
triggered when the files are replicated. Therefore, the reporting state of the files remains
as sharing violated.
Workaround
To determine the real state of the file, use the DFSRDIAG BACKLOG command to check for
sharing violations. The command output provides a list of the first 100 files that are not
replicated.
More information
There two kinds of DFSR events for sharing violations: Event ID 4302 and Event ID 4304.
The DFSR Diagnostics combines both kinds of events, and reports them only as Event ID
4302.
The following information explains more about these two kinds of events.
Event ID 4302: A local sharing violation occurs when the service can't receive an updated
file because the local file is being used. This occurs on the receive side of the file change.
The file is already replicated. However, it can't be moved from the installing directory to
the final destination.
Event ID 4304: The service can't stage a file for replication because of a sharing violation.
This occurs on the "send" side of the file change. DFSR wants to stage or copy the file
for replication. However, an exclusive lock prevents this.
Feedback
Was this page helpful? Yes No
This article describes the way to change these DFSR debug log settings is via the WMI
Command-line interface WMIC.
Symptoms
By default DFSR debug logging is already turned on in a quite verbose setting to log up
to 100 files with 200000 lines in the %windir%\debug folder, as a compressed Winzip
compatible file: DFSRxxxxx.log.gz and DFSRxxxxx.log (currently used). This will consume
about 75-100 MB disk space and represents a kind of history of DFSR activity. In certain
troubleshooting conditions, it may be necessary to extend this history, since older
information will be overwritten.
The recommended way to change these debug log settings is via the WMI Command-
line interface WMIC.
The changes will be immediately realized by the DFSR service without the need to
restart DFSR.
Default: 4
Range: 1-5
Default: 200000
Default: 1000
Range: 1 to 100000
Default: %windir%\debug
7 Note
The path must be created manually before, if not available the default value
%windir%\debug will be used.
Default: TRUE
ConflictHighWatermarkPercent: 90
ConflictLowWatermarkPercent: 60
DebugLogFilePath: C:\WINDOWS\debug
DebugLogSeverity: 4
Description:
DsPollingIntervalInMin: 60
EnableDebugLog: TRUE
EnableLightDsPolling: TRUE
LastChangeNumber: 1
LastChangeSource:
LastChangeTime: 20050830140044.000000-000
MaxDebugLogFiles: 200
MaxDebugLogMessages: 400000
RpcPortAssignment: 0
StagingHighWatermarkPercent: 90
StagingLowWatermarkPercent: 60
You can also realize the debug log settings in the header of every log file:
More information
DFSR Registry setting for more verbose event logging
Value Data: 1
7 Note
Although the registry value doesn't exist by default, the following events are
suppressed by default unless verbose event logging is enabled:
2002 EVENT_DFSR_VOLUME_INITIALIZED
3002 EVENT_DFSR_RG_INITIALIZED
3004 EVENT_DFSR_RG_STOPPED
4002 EVENT_DFSR_CS_INITIALIZED
5006 EVENT_DFSR_CONNECTION_OUTCONNECTION_ESTABLISHED
5004 EVENT_DFSR_CONNECTION_INCONNECTION_ESTABLISHED
MaxDebugLogFiles Note
The maximum is 10,000 on Windows Server 2003 R2 and 100,000 on all later operating
systems. The default is 100 logs in Windows Server 2003 R2 and Windows Server 2008,
and 1000 logs in Windows Server 2008 R2 and later operating systems.
Disclaimer
Microsoft and/or its suppliers make no representations or warranties about the
suitability, reliability, or accuracy of the information contained in the documents and
related graphics published on this website (the "materials") for any purpose. The
materials may include technical inaccuracies or typographical errors and may be revised
at any time without notice.
To the maximum extent permitted by applicable law, Microsoft and/or its suppliers
disclaim and exclude all representations, warranties, and conditions whether express,
implied, or statutory, including but not limited to representations, warranties, or
conditions of title, non-infringement, satisfactory condition or quality, merchantability
and fitness for a particular purpose, with respect to the materials.
Feedback
Was this page helpful? Yes No
This article provides a workaround for the delays on DFSR replication partners after
security setting changes on folders.
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2
Original KB number: 3212430
Symptoms
Assume that you have the Distributed File System (DFS) Replication role service installed
in Windows Server 2012 R2, Windows Server 2016 or Windows Server, version 1709,
Windows Server Standard, version 1803 or Windows Server Datacenter, version 1803.
When you change the security settings of a folder through Windows Explorer, the
change appears only on replication partners for subordinate files but not immediately
on the folder itself or its subfolders.
For example, if you grant a user Modify permissions to a folder on a domain controller,
the user can access the files on a replication partner only under the folder. The user
does not immediately have permissions to access the folders (parent folder and
subfolders).
7 Note
The changes appear on replication partners for the folders after 7 to 10 minutes.
Cause
This issue occurs because when you make folder security changes remotely or locally,
there's a delay before the redirector sends the Close statement for the parent folder.
Therefore, the receiving NTFS driver doesn't immediately stamp the change with a USN
Close statement in the NTFS Journal for the DFSR USN consumer.
Workaround
To work around this issue, use one of the following methods:
Avoid changing folder permissions remotely even if you use Windows Server Core
Edition. Instead, make security changes on the target itself. You may also consider
having at least two domain controllers with GUI implemented one with the primary
domain controller (PDC) emulator operations master (also known as flexible single
master operations or FSMO) role for introducing the changes locally, and one as
potential backup for this operations master role.
On the server on which you use Windows Explorer to make security setting
changes, create the NoRemoteRecursiveEvents and the NoRemoteChangeNotify
registry entries, and set the registry value to 1 in one of the following registry
subkeys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explo
rer
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explor
er
7 Note
You must restart the computer to make these registry entries work.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where SYSVOL DFSR migration fails after you
in-place upgrade a domain controller to Windows Server 2019.
Summary
In a domain that is configured to use the File Replication Service, the SYSVOL folder is
not shared after you in-place upgrade a Windows Server 2019-based domain controller
from an earlier version of Windows. Until this directory is shared, the domain controller
does not respond to DCLOCATOR requests for LDAP, Kerberos, and other DC workloads.
Symptoms
In a domain that uses the legacy File Replication Service for SYSVOL, you in-place
upgrade a domain controller to Windows Server 2019.
When you try to migrate the domain to Distributed File System (DFS) Replication, the
following issues occur:
All Windows Server 2019-based domain controllers in the domain stop sharing the
SYSVOL folder and stop responding to DCLOCATOR requests.
All Windows Server 2019-based domain controllers in the domain have the
following event log errors:
Additional Information:
Sysvol NTFRS folder: C:\Windows\SYSVOL\domain
Sysvol DFSR folder: C:\Windows\SYSVOL_DFSR\domain
Error: 367 (The process creation has been blocked.)
The DFSRMIG.EXE /GetMigrationState command generates the following output for all
Windows Server 2019 domain controllers:
Dfsrmig /getmigrationstate
The following domain controllers have not reached Global state ('Prepared'):
7 Note
Cause
The File Replication Service (FRS) was deprecated in Windows Server 2008 R2 and is
included in later operating system releases for backwards compatibility only. Starting in
Windows Server 2019, promoting new domain controllers requires the DFS Replication
(DFSR) to replicate the contents in the SYSVOL share. If you try to promote a Windows
Server 2019-based computer in a domain that still using FRS for SYSVOL replication, the
following error occurs:
Workaround
There are several workarounds for this issue, depending on which migration global state
you specified earlier.
Issue occurs in the Preparing or Redirecting phase
1. If you have already run DFRSMIG /SetGlobalState 1 or DFRSMIG /SetGlobalState 2
previously, run the following command as a Domain Admin:
Console
DFRSMIG /SetGlobalState 0
2. Wait for Active Directory replication to propagate throughout the domain, and for
the state of Windows Server 2019 domain controllers to revert to the Start phase.
3. Verify that SYSVOL is shared on those domain controllers and that SYSVOL is
replicating as usual again by using FRS.
4. Make sure that at least one Windows Server 2008 R2, Windows Server 2012 R2, or
Windows Server 2016 domain controller exists in that domain. Verify all Active
Directory partitions and the files in the SYSVOL are fully sourced from one or more
source domain controllers and that they are replicating Active Directory as usual
before you demote all of your Windows Server 2019 domain controllers in the next
step. For more information, see Troubleshooting Active Directory Replication
Problems.
6. Migrate SYSVOL to DFSR normally on the remaining Windows Server 2008 R2,
Windows Server 2012 R2, and Windows Server 2016 domain controllers.
Option 1
You still have one or more Windows Server 2008 R2, Windows Server 2012 R2, or
Windows Server 2016 domain controllers in that domain. Verify all Active Directory
partitions and the files in the SYSVOL are fully sourced from one or more source domain
controllers and that they are replicating Active Directory as usual before you demote all
of your Windows Server 2019 domain controllers in the next step. For more information,
see Troubleshooting Active Directory Replication Problems.
Option 2
All domain controllers in the domain are running Windows Server 2019.
7 Note
1. In the ADSIEDIT.MSC tool, change the following distinguished name value and
attribute on the PDC Emulator:
CN=DFSR-GlobalSettings,CN=System,DC=<domain>,DC=<TLD> msDFSR-Flags =
0
3. On all Windows Server 2019 domain controllers, change the DWORD type registry
value Local State to 0:
Registry value: 0
Data type: REG_DWORD
4. On all Windows Server 2019 domain controllers, restart the following services by
running the following commands:
Console
5. Verify that SYSVOL has shared on those domain controllers and that SYSVOL is
replicating as usual again by using FRS.
6. Promote one or more Windows Server 2008 R2, Windows Server 2012 R2, or
Windows Server 2016 domain controllers in that domain. Verify all Active Directory
partitions and the files in the SYSVOL are fully sourced from one or more source
domain controllers and that they are replicating Active Directory as usual before
you demote all of your Windows Server 2019 domain controllers in the next step.
For more information, see Troubleshooting Active Directory Replication Problems.
8. Migrate SYSVOL to DFSR as usual on the remaining Windows Server 2008 R2,
Windows Server 2012 R2, and Windows Server 2016 domain controllers.
10. Optional: Demote the Windows Server 2008 R2, Windows Server 2012 R2, or
Windows Server 2016 DC that you added in step 6.
References
For more information about how to migrate FRS to DFSR for SYSVOL, see the following
articles:
Feedback
Was this page helpful? Yes No
This article discusses how to troubleshoot journal_wrap errors on Sysvol and DFS replica
sets.
7 Note
This article applies to Microsoft Windows 2000. Be aware that support for Windows
2000 ended on July 13, 2010. For more information about the Microsoft Support
Lifecycle policy, see the following Microsoft website: Microsoft Support Lifecycle
Policy
Summary
The File Replication Service (FRS) is a multithreaded, multi-master replication engine
that replaces the LMREPL (LanMan Replication) service in the 3.x and 4.0 versions of
Microsoft Windows NT. Windows 2000 domain controllers and servers use FRS to
replicate system policy and logon scripts for Windows 2000 and for earlier clients that
are located in the System Volume (Sysvol).
FRS can also replicate content between Windows 2000 servers that host the same fault-
tolerant Distributed File System (DFS) roots or child-node replicas.
This article describes how FRS uses and relies on the USN change journal for the NTFS
file system.
More information
The USN journal is a log of fixed size that records all changes that occur on NTFS 5.0-
formatted partitions. NTFRS monitors the NTFS USN journal file for closed files in FRS
replicated directories as long as FRS is running.
Journal wrap errors occur if a sufficient number of changes that occur while FRS is
turned off in such a way that the last USN change that FRS recorded during shutdown
no longer exists in the USN journal during startup. The risk is that changes to files and
folders for FRS replicated trees may have occurred while the service was turned off, and
no record of the change exists in the USN journal. To guard against data inconsistency,
FRS asserts into a journal wrap state.
To perform maintenance on FRS replica set members, administrators may stop the FRS
service for long periods of time. In this case, administrators may not realize the potential
impact. Also, error conditions may cause the FRS service to shut down, and this causes a
journal wrap error. In large replica sets, replica members may encounter the following
error during an authoritative restore (BURFLAGS=D4):
journal_wrap_error
Consider the scenario where computers run versions of the Ntfrs.exe file on the
following system versions:
For Windows 2000 computers that use versions of the Ntfrs.exe file from Windows 2000
Service Pack 2 (SP2) or from Windows 2000 SP2 hotfix (WINSE 11773), the service
performs a programmatic nonauthoritative restore when the journal_wrap_error is
detected.
By default, versions of the Ntfrs.exe file from Windows 2000 Service Pack 3 (SP3) and
from Windows 2000 SP3 hotfix don't perform an automatic nonauthoritative restore (for
example, SP3 leaves content in place as 2195 and SP1 left the context in place) when
journal wrap errors are detected. SP3 versions of NTFRS may be configured to function
like SP2 when the "Enable journal wrap automatic restore" registry entry is set to 1 in the
following registry subkey: HKLM\System\Ccs\Services\Ntfrs\Parameters
) Important
We don't recommend that you use this registry setting, and this setting should not
be used versions of Windows after the Service Pack 3 version of Windows 2000. The
recommended method for performing a nonauthoritative restore on FRS members
of DFS or SYSVOL replica sets is to use the FRS BurFlags registry value. For more
information about how to use the BurFlags registry value, click the following article
number to see the article in the Microsoft Knowledge Base: 290762 Using the
BurFlags registry key to reinitialize File Replication service replica sets
FRS is a service that must always be running on Windows domain controllers and
members of FRS-replicated DFS sets.
If you increase the USN journal size, and therefore you increase the number of changes
that the journal can hold before the journal "wraps," this reduces the possibility that the
USN journal wrap will occur. The USN journal size can be changed by setting the
following registry key: HKLM\System\CCS\Services\NTFRS\Parameters\"Ntfs Journal size
in MB" (REG_DWORD)
Valid settings range from 8 megabytes to 128 megabytes (MB). The default is 32 MB.
This setting applies to all volumes that are hosting an FRS replica tree. You have to stop
and then restart the NTFRS service for the increases to the USN journal size to occur.
However, to decrease the USN journal size, you must reformat all volumes that contain
FRS-replicated content.
The number of changes that a given USN journal file can hold can be estimated by using
the following formula: journal size /((60 bytes + (length of file name)) * 2) The number
"2" in this formula stems from two journal entries for each file change: 1 for open and 1
for close. Divide the journal size by the size per change to determine the approximate
number of changes that can occur before the journal wrap error is encountered. If we
assume that the file names are in an "8.3" file format, this maps to approximately
200,000 files and/or directories for a 32-MB journal file. The number of changes would
be less if long file names are used.
In Windows 2000 Service Pack 2, valid settings range between 8 MB and 128 MB, and
the default is 32 MB. In Windows 2000 Service Pack 3, valid settings range between 4
MB and 10,000 MB, and the default is 512 MB. These settings apply to all volumes that
host an FRS replica tree.
As a guideline, Microsoft suggests that you configure 128 MB of journal for every
100,000 files that are managed by replication on that volume.
For more information, click the following article numbers to view the articles in the
Microsoft Knowledge Base:
290762 Using the BurFlags registry key to reinitialize File Replication service replica
sets
Feedback
Was this page helpful? Yes No
This article provides the steps to troubleshoot the missing SYSVOL and Netlogon shares
in Windows Server 2012 R2.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1
Original KB number: 2958414
Symptoms
SYSVOL and Netlogon shares aren't shared on a domain controller. The following
Cause
Domain controllers without SYSVOL shared can't replicate inbound because of upstream
(source) domain controllers being in an error state. Frequently (but not limited to), the
upstream servers have stopped replication because of a dirty shutdown (event ID 2213).
Resolution
This section contains recommended methods for troubleshooting and resolving missing
SYSVOL and Netlogon shares on domain controllers that replicate by using the DFS
Replication service.
The process reinitializes DFS Replication if SYSVOL isn't shared on domain controllers
according to How to force an authoritative, or non-authoritative synchronization for
DFSR-replicated SYSVOL (like "D4/D2" for FRS) . It's unnecessary in most cases, and it
may cause data loss if done incorrectly. In addition, it prevents determining the cause of
the issue and averting future occurrences of the issue.
What follows are general steps to investigate the missing shares. Determine if the
problem is caused by a one-time occurrence, or if the upstream domain controller(s)
can't support replication by using DFS Replication.
Deleting the DFS Replication database from the volume shouldn't be required and is
discouraged. It causes DFS Replication to consider all local data on the server to be
nonauthoritative. By letting DFS Replication recover the database gracefully (as
instructed in the 2213 event), the last writer will still win any conflicting versions of
SYSVOL data.
You may manually check whether SYSVOL is shared or you can inspect each domain
controller by using the net view command:
Console
To check DFS Replication's state on domain controllers, you may query WMI. You
can query all domain controllers in the domain for the SYSVOL Share replicated
folder by using WMI as follows:
Console
7 Note
If any domain controllers don't report the SYSVOL Share replicated folder as being
in a state 4 (normal), check the event log of those domain controller(s) to evaluate
their condition. Review each domain controller for recent errors or warnings in the
DFS Replication event log, such as the warning event ID 2213 that indicates that
DFS Replication is currently paused.
Console
To query all domain controllers in the domain, run the following command:
Console
For each domain controller enabled for content freshness, evaluate if DFS
Replication has logged an event ID 4012 that indicates replication of the folder has
stopped because replication has failed for longer than the MaxOfflineTimeInDays
parameter.
For any domain controllers running Windows Server 2008 R2, first install DFS
Replication updates to prevent data loss and to fix known issues. It's a best
practice to use the latest version of DFS Replication. See List of currently available
hotfixes for Distributed File System (DFS) technologies for the latest version of
DFS Replication.
Do a backup of SYSVOL data (if present) on each domain controller. Backups may
be a file copy of the SYSVOL contents to a safe location or, it may be a backup that
uses backup software.
Determine whether a dirty shutdown was detected (event ID 2213) on either domain
controller. You may find the second domain controller is waiting to complete
initialization of SYSVOL . The reason is, after promotion, it will log a 4614 event that
indicates that DFS Replication is waiting to do initial replication. In addition, it won't log
a 4604 event signaling that DFS Replication has initialized SYSVOL .
Or, if the second domain controller is healthy and SYSVOL is shared, take the
following steps:
4. Enable the first domain controller's membership, and wait for the 4614 and
4604 events that report completion of the initial synchronization. If necessary,
restore any updated files from PreExisting to the original location.
If the first domain controller is in the event ID 2213 state, and the second domain
controller has never completed initialization after it was promoted, and content
freshness hasn't been triggered. Take the following steps:
2. After replication resumes, it will log an event ID 4602 that indicates that DFS
Replication initialized the SYSVOL replicated folder and specified it as the
primary member.
Or, if the first domain controller is in the 2213 state and the second domain
controller is healthy ( SYSVOL is shared), run the ResumeReplication WMI method
on the first domain controller. It will log event ID 2214 at the completion of dirty
shutdown recovery.
Determine whether a dirty shutdown was detected and whether DFS Replication is
paused on any domain controllers (event ID 2213). You may find a domain controller is
waiting to complete initialization of SYSVOL after promotion. It will log a 4614 event that
indicates that DFS Replication is waiting to do initial replication. It also won't log a 4604
event signaling that DFS Replication has initialized SYSVOL .
If content freshness is enabled, and there are three or more domain controllers in
the domain.
Content freshness protection will log an event ID 4012 that indicates that
replication has stopped because replication on the folder has failed for longer than
the MaxOfflineTimeInDays parameter. To reinitialize DFS Replication on the affected
domain controller(s), follow the instructions in How to force an authoritative and
non-authoritative synchronization for DFSR-replicated SYSVOL (like "D4/D2" for
FRS) .
If all domain controllers have logged the 4012 event and their state is 5, follow the
instructions in How to force an authoritative and non-authoritative synchronization
for DFSR-replicated SYSVOL (like "D4/D2" for FRS) to completely initialize
SYSVOL . It's the only situation to set a DFS Replication server as authoritative. Make
sure that the domain controller configured as authoritative has the most up-to-
date copy of all SYSVOL contents.
Or, if one or more domain controllers are blocking replication because of content
freshness, they each must be non-authoritatively recovered. Follow these steps:
1. Back up all SYSVOL contents of the domain controller(s). Typically, policy edits
are done on the PDC Emulator, but it isn't guaranteed. Any data present on
the recovered domain controller(s) not matching the partners will go into the
PreExisting or Conflict and Deleted folder, or both.
3. Enable the membership and wait for the 4614 and 4604 events to report
completion of the initial synchronization. Restore any required files from
backup or from PreExisting and Conflict and Deleted as necessary.
If content freshness isn't enabled or triggered, and there are three or more domain
controllers in the domain
The Service Control Manager (SCM) uses the default time-out time of 20 seconds for
stopping a service. In some complex DFS Replication implementations, this time-out
value may be too short, and DFS Replication stops before the appropriate database is
closed. At service restart, DFS Replication detects this condition, and then does the
database recovery. WaitToKillServiceTimeout may be used to grant DFS Replication more
time to commit changes to the database during shutdown. For more information, go to
article You receive DFSR event ID 2212 after you restart the DFSR service .
After you have restored DFS Replication of SYSVOL , DFS Replication health must be
carefully monitored in the environment to prevent this scenario. Regular review of DFS
Replication event logs, collecting of DFS Replication health reports, and collecting of
replication state (by using the WMI query in the Check DFS Replication state section
under Step 1 - Evaluate the state of DFS Replication on all domain controllers) are
recommended.
Feedback
Was this page helpful? Yes No
This article describes a Distributed File System Replication (DFS-R) and Distributed File
System Namespace (DFS-N) deployment scenario that Microsoft does not support.
Unsupported scenario
When you deploy DFS-R and DFS-N together with user home folders or with roaming
user profiles, the following scenario is not supported by Microsoft:
You deploy a single file server for each branch office. User home folders and
roaming user profiles of users in the branch office are stored on the branch office
file server.
You use DFS-R over WAN links from multiple branch office file servers to a central
hub server for centralized backup. You configure the hub server with read-only
replicated folders or read/write replicated folders.
You configure a DFS namespace to create a unified namespace.
You configure one namespace folder to have multiple folder targets. And, you add
the shared folder of the central file server as a second DFS-N folder target. You
enable all namespace folder targets, or you enable only one folder target at a time.
You configure the target priority of DFS-N so that the client refers to the branch
office file server first. When the branch office file server is not available, the client
will be redirected to the central file server. You may also specify that roaming users
be directed to a file server that contains their user data or user profile and that is
closest to their physical location.
7 Note
Although this scenario cites home folders and roaming user profiles as specific
content examples, the same issue applies to any fast-changing content that may
not have been replicated to a replication partner when the referral redirects the
user from a different partner to that partner. Additionally, the "central" file server
and "branch office" file server are examples, any similar deployment configurations
are equally susceptible to the problems outlined in this article. Therefore, they are
not supported by Microsoft. A similar deployment example is that two branch
office servers replicate fast-changing content between one another.
User home folders or user profiles that are replicated by using DFS-R between the
branch office file servers and the central file server may not be up to date. The
issue may occur for one of the following reasons:
Large replication backlogs
Heavy system load
Bandwidth throttling
Replication schedules
DFS-R does not perform transactional replication of user profile data. A
transactional replication either replicates all changes to a user profile or replicates
nothing at all. Therefore, some files of a user profile may have been replicated,
whereas other files may not have been replicated before the user was failed over
to the central file server.
The client computer may be failed over to the central file server by the DFS-N
client in one of the following scenarios:
There are transient network glitches when the client computer accesses data
over Server Message Block (SMB) from the branch office file server.
There are specific error codes when the client computer accesses data over SMB
from the branch office file server. The redirection may occur even when the
branch office file server is available. Therefore, a user may be redirected to the
central file server even if you configure the target referral priority of the branch
office file server at a higher level.
Feedback
Was this page helpful? Yes No
This article provides a solution to an error that occurs when you try to access a server
locally by using its FQDN or its CNAME alias.
7 Note
This article contains information that shows you how to help lower security settings
or how to turn off security features on a computer. You can make these changes to
work around a specific problem. Before you make these changes, we recommend
that you evaluate the risks that are associated with implementing this workaround
in your particular environment. If you implement this workaround, take any
appropriate additional steps to help protect your system.
Symptoms
Consider the following scenario. You install Microsoft Windows Server 2003 Service Pack
1 (SP1) on a Windows Server 2003-based computer. After you do this, you experience
authentication issues when you try to access a server locally by using its fully qualified
domain name (FQDN) or its CNAME alias in the Universal Naming Convention (UNC)
path: \\servername\sharename.
7 Note
You can access the server by using its FQDN or its CNAME alias from another
computer in the network other than this computer on which you installed Windows
Server 2003 SP1. Additionally, you can access the server on the local computer by
using the following paths:
\\IPaddress-of-local-computer
\\Netbiosname or \\ComputerName
Cause
This problem occurs because Windows Server 2003 SP1 includes a new security feature
named loopback check functionality. By default, loopback check functionality is turned
on in Windows Server 2003 SP1, and the value of the DisableLoopbackCheck registry
entry is set to 0 (zero).
7 Note
Resolution
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection,
back up the registry before you modify it. Then, you can restore the registry if a
problem occurs. For more information about how to back up and restore the
registry, see How to back up and restore the registry in Windows .
7 Note
This workaround may make your computer or your network more vulnerable to
attack by malicious users or by malicious software such as viruses. We do not
recommend this workaround but are providing this information so that you can
implement this workaround at your own discretion. Use this workaround at your
own risk.
To resolve this problem, set the DisableStrictNameChecking registry entry to 1. Then use
either of the following methods, as appropriate for your situation.
1. Click Start, click Run, type regedit, and then click OK.
6. In the Value data box, type the CNAME or the DNS alias, that is used for the local
shares on the computer, and then click OK.
7 Note
the DisableLoopbackCheck registry entry to 1, follow these steps on the client computer:
1. Click Start, click Run, type regedit, and then click OK.
7 Note
You must restart the server for this change to take effect. By default, loopback
check functionality is turned on in Windows Server 2003 SP1, and the
DisableLoopbackCheck registry entry is set to 0 (zero). The security is reduced when
you disable the authentication loopback check, and you open the Windows Server
2003 server for man-in-the-middle (MITM) attacks on NTLM.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
at the beginning of this article.
More information
After you install security update 957097, applications such as SQL Server or Internet
Information Services (IIS) may fail when making local NTLM authentication requests.
For more information about how to resolve this issue, see the "Known issues with this
security update" section of KB article 957097 .
Feedback
Was this page helpful? Yes No
This article describes Active Directory-integrated Domain Name System (DNS) zone
serial number behaviors.
Applies to: Windows Server 2012 R2, Windows Server 2008 R2 Service Pack 1
Original KB number: 282826
Summary
When a DNS server receives an update directly (either from the administrator, or
through dynamic updates), it always increases the serial number of the zone.
If the serial number of the replicated record is higher than the serial number in the
SOA record of the local copy of the zone, the local zone serial number is set to the
serial number in the replicated record.
7 Note
Each DNS record in the zone has a copy of the zone serial number at the time
when the record was last modified.
If the serial number of the replicated record is the same or lower than the local
serial number, and if the local DNS server is configured not to allow zone transfer
of the zone, the local zone serial number is not changed.
If the serial number of the replicated record is the same or lower than the local
zone serial number, if the DNS server is configured to allow a zone transfer of the
zone, and if the local zone serial number has not been changed since the last zone
transfer occurred to a remote DNS server, then the local zone serial number will be
incremented. Otherwise that is if a copy of the zone with the current local zone
serial number has not been transferred to a remote DNS server, the local zone
serial number is not changed.
More information
In a scenario where a third-party DNS server is configured as secondary for an Active
Directory-integrated zone, the first (preferred) primary server becomes unavailable, and
the secondary server attempts a zone transfer from another primary server for the zone,
then the secondary DNS server (by using IXFR) may not notice that the zone was
updated if the serial number of the zone is lower on the latter primary server. In this
scenario, the secondary successfully performs zone transfer after the primary's serial
number becomes greater than the serial number in the SOA record in the zone on the
secondary server.
7 Note
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where unwanted network interface controllers
(NICs) are registered in Domain Name System (DNS) on a multihomed domain
controller (DC).
Symptoms
On Domain Controllers with more than one NIC where each NIC is connected to
separate Network, there's a possibility that the Host A DNS registration can occur for
unwanted NICs.
If one of the following conditions is true, the client will fail to contact the DC causing
authentication and many other issues:
The client queries for DC's DNS records, and gets an unwanted record.
The client queries for DC's DNS records, and gets a record of a different network
that isn't reachable to the client.
Cause
The DNS server will respond to the query in a round robin fashion if the DC has multiple
NICs registered in DNS. The DNS will serve the client with all the records available for
that DC.
To prevent this issue, we need to make sure the unwanted NIC address isn't registered in
DNS.
Below are the services that are responsible for Host A record registration on a DC:
1. Netlogon service
2. DNS server service (if the DC is running DNS server service)
3. DHCP client or DNS client (2003/2008)
If the NIC card is configured to register the connection address in DNS, then the
DHCP/DNS client service will register the record in DNS. Unwanted NIC should be
configured not to register the connection address in DNS.
If the DC is running DNS server service, then the DNS service will register the interface
"Host A" record that it has set to listen on. The Zone properties, the Name server tab list
out the IP addresses of interfaces present on the DC. If it has listed both the IPs, then
DNS server will register "Host A" record for both the IP addresses.
We need to make sure only the required interface listens for DNS and the zone
properties, name server tab has required IP address information.
Resolution
To avoid this problem, perform the following three steps (It's important that you follow
all the steps to avoid the issue).
On the unwanted NIC TCP/IP Properties, select Advanced > DNS, and then
unselect Register this connections Address in DNS.
2. Open the DNS server console, highlight the server on the left pane, and then select
Action > Properties. On the Interfaces tab, select listen on only the following IP
addresses. Remove unwanted IP address from the list.
3. On the Zone properties, select Name server tab. Along with FQDN of the DC, you'll
see the IP address associated with the DC. Remove unwanted IP address if it's
listed.
After doing it, delete the existing unwanted Host A record of the DC.
More information
Hardware details: IBM servers with two NICs.
1. Ethernet NIC
2. USB NIC (it also can be considered for multiple Ethernet NICs)
Feedback
Was this page helpful? Yes No
This article describes best practices for the configuration of Domain Name System (DNS)
client settings. The recommendations in this article are for the installation of supported
Windows Server environments where there is no previously defined DNS infrastructure.
If the server is the first and only domain controller that you install in the domain,
and the server runs DNS, configure the DNS client settings to point to that first
server's IP address. For example, you must configure the DNS client settings to
point to itself. Do not list any other DNS servers until you have another domain
controller hosting DNS in that domain.
During the DCPromo process, you must configure additional domain controllers to
point to another domain controller that is running DNS in their domain and site,
and that hosts the namespace of the domain in which the new domain controller is
installed. or if using a 3rd-party DNS to a DNS server that hosts the zone for that
DC's Active Directory domain. Do not configure the domain controller to utilize its
own DNS service for name resolution until you have verified that both inbound
and outbound Active Directory replication is functioning and up to date. Failure to
do so may result in DNS "Islands".
For more information about a related topic, click the following article number to
view the article in the Microsoft Knowledge Base:
275278 DNS Server becomes an island when a domain controller points to itself
for the _msdcs.ForestDnsName domain
After you've verified that replication has completed successfully, DNS may be
configured on each Domain Controller in either of two ways, depending on the
requirements of the environment. The configuration options are:
Configure the Preferred DNS server in TCP/IP properties on each Domain
Controller to use itself as Primary DNS Server.
Advantages: Ensures that DNS queries originating from the Domain
Controller will be resolved locally if possible. Will minimize impact of Domain
Controller's DNS queries on the network.
Disadvantages: Dependent on Active Directory replication to ensure that
DNS zone is up to date. Lengthy replication failures may result in an
incomplete set of entries in the zone.
Configure all Domain Controllers to use a centralized DNS server as their
Preferred DNS Server.
Advantages:
Minimizes the reliance on Active Directory replication for DNS zone
updates of Domain Controller locator records. It includes faster discovery
of new or updated Domain Controller locator records, as replication lag
time isn't an issue.
Provides a single authoritative DNS server, which may be useful when
troubleshooting Active Directory replication issues
Disadvantages:
Will more heavily use the network to resolve DNS queries originating from
the Domain Controller
DNS name resolution may depend on network stability. Loss of
connectivity to the Preferred DNS server will result in failure to resolve
DNS queries from the Domain Controller. It may result in apparent loss of
connectivity, even to locations that aren't across the lost network
segment.
A combination of the two strategies is possible, with the remote DNS server set as
Preferred DNS server, and the local Domain Controller set as Alternate (or vice
versa). While this strategy has many advantages, there are factors that should be
considered before making this configuration change:
The DNS client does not utilize each of the DNS servers listed in TCP/IP
configuration for each query. By default, on startup the DNS client will attempt
to use the server in the Preferred DNS server entry. If this server fails to respond
for any reason, the DNS client will switch to the server listed in the alternate
DNS server entry. The DNS client will continue to use this alternate DNS server
until:
It fails to respond to a DNS query, or:
The ServerPriorityTimeLimit value is reached (15 minutes by default).
7 Note
Only a failure to respond will cause the DNS client to switch Preferred DNS servers;
receiving an authoritative but incorrect response does not cause the DNS client to
try another server. As a result, configuring a Domain Controller with itself and
another DNS server as Preferred and Alternate servers helps to ensure that a
response is received, but it does not guarantee accuracy of that response. DNS
record update failures on either of the servers may result in an inconsistent name
resolution experience.
Don't configure the DNS client settings on the domain controllers to point to DNS
servers of your Internet Service Provider (ISP). If you configure the DNS client
settings to point to your ISP's DNS servers, the Netlogon service on the domain
controllers doesn't register the correct records for the Active Directory directory
service. With these records, other domain controllers and computers can find
Active Directory-related information. The domain controller must register its
records with its own DNS server.
To forward external DNS requests, add the ISP's DNS servers as DNS forwarders in the
DNS management console. If you don't configure forwarders, use the default root hints
servers. In both cases, if you want the internal DNS server to forward to an Internet DNS
server, you also must delete the root "." (also known as "dot") zone in the DNS
management console in the Forward Lookup Zones folder.
If the domain controller that hosts DNS has several network adapters installed, you
must disable one adapter for DNS name registration.
For more information about how to configure DNS correctly in this situation, click the
following article number to view the article in the Microsoft Knowledge Base:
292822 Name resolution and connectivity issues on a Routing and Remote Access
Server that also runs DNS or WINS
To verify your domain controller's DNS client settings, type the following command at a
command prompt to view the details of your Internet Protocol (IP) configuration:
ipconfig /all
To modify the domain controller's DNS client configuration, follow these steps:
4. Select Advanced, and then select the DNS tab. To configure the DNS information,
follow these steps:
a. In the DNS server addresses, in order of use box, add the recommended DNS
server addresses.
b. If the For resolution of unqualified names setting is set to Append these DNS
suffixes (in order), Microsoft recommends that you list the Active Directory DNS
domain name first (at the top).
c. Verify that the DNS Suffix for this connection setting is the same as the Active
Directory domain name.
d. Verify that the Register this connection's addresses in DNS check box is
selected.
e. Select OK three times.
5. If you change any DNS client settings, you must clear the DNS resolver cache and
register the DNS resource records. To clear the DNS resolver cache, type the
following command at a command prompt: ipconfig /flushdns
To register the DNS resource records, type the following command at a command
prompt: ipconfig /registerdns
6. To confirm that the DNS records are correct in the DNS database, start the DNS
management console. There should be a host record for the computer name. (This
host record is an "A" record in Advanced view.) There also should be a Start of
Authority (SOA) record and a Name Server (NS) record that points to the domain
controller.
Configure the DNS client settings on the domain controller to point to a DNS
server that's authoritative for the zone that corresponds to the domain where the
computer is a member. A local primary and secondary DNS server is preferred
because of Wide Area Network (WAN) traffic considerations.
If there's no local DNS server available, point to a DNS server that's reachable by a
reliable WAN link. Up-time and bandwidth determine reliability.
Don't configure the DNS client settings on the domain controllers to point to your
ISP's DNS servers. Instead, the internal DNS server should forward to the ISP's DNS
servers to resolve external names.
Configure the primary and secondary DNS client settings to point to local primary
and secondary DNS servers (if local DNS servers are available) that host the DNS
zone for the computer's Active Directory domain.
If there are no local DNS servers available, point to a DNS server for that
computer's Active Directory domain that can be reached through a reliable WAN
link. Up-time and bandwidth determine reliability.
Don't configure the client DNS settings to point to your ISP's DNS servers. If you
do so, you may experience issues when you try to join the Windows Server-based
server to the domain, or when you try to log on to the domain from that computer.
Instead, the internal DNS server should configure forwarding to the ISP's DNS
servers to resolve external names.
Feedback
Was this page helpful? Yes No
This article provides a workaround for an issue where you receive an error message
when you try to delete a record from a DNS zone.
Symptoms
As member of the DnsAdmins security group, you may not be able to delete zone
information on a DNS server. If you try to delete a record, you may receive the following
error message:
Cause
This issue may occur if security permissions for the DnsAdmins security group aren't
automatically added on the newly created Active Directory Integrated zones.
Workaround
To work around this issue, manually add the DnsAdmins security group to the zone
access control list (ACL) and grant Full Control.
To do so, use one of the following methods to assign Full Control to DnsAdmins security
group.
2. Click Start, click Run, type cmd, and then click OK.
3. Type the following command, and then press ENTER:
Console
2. Click Start, click Run, type adsiedit.msc, and then click OK.
This node contains a folder that begins with DC= and reflects the correct domain
name, such as DC=exampledomain DC=net.
5. In the right pane, right-click the folder where you want to change the permissions,
and then click Properties.
7. In the DnsAdmins Permissions list, click to select the Full Control check box for the
Allow column, and then click OK two times.
Feedback
Was this page helpful? Yes No
This article provides a workaround for a problem in which you can't modify the Hosts
file or the Lmhosts file.
Applies to: Windows, all versions, and Windows Server, all versions
Original KB number: 923947
Symptoms
When you try to change the Hosts file or the Lmhosts file, Windows might deny you
access to the file and then generate an error message that resembles either of the
following messages.
Error message 1
Error message 2
This problem occurs even though you sign in by using an account that has
administrative credentials.
Workaround
1. Select Start > All Programs > Accessories, right-click Notepad, and then select
Run as administrator.
2. Open the Hosts file or the Lmhosts file, make the necessary changes, and then
select Save on the File menu.
Feedback
Was this page helpful? Yes No
This article describes the compatibility of Microsoft Exchange with Single Label Domains,
Disjoint Namespaces, and Discontiguous Namespaces.
Disjoint Namespaces
For a description of Disjoint Namespaces, see the Disjoint Namespaces topic in the
Microsoft DNS Namespace Planning Solution Center.
Discontiguous Namespaces
For a description of Discontiguous Namespaces, also known as a non-contiguous
namespaces, see the Discontiguous Namespaces topic in the Microsoft DNS Namespace
Planning Solution Center.
Exchange Server
In response to customer feedback, the Exchange team has updated its testing matrix
and has determined that Exchange Server 2010 will be supported on SLDs, Disjoint
Namespaces, and Discontiguous Namespaces. This page contains a brief description of
each of these scenarios and special considerations.
7 Note
For information about disjoint namespace scenarios in Microsoft Exchange Server
2013, visit the following TechNet website:
In adding support for these types of topologies, there's an underlying requirement for
DNS to be correctly installed and configured. Before users continue with any
deployment that is defined here, clients and servers must be able to reliably resolve DNS
queries for a given resource in the appropriate namespace.
Disjoint Namespaces
In Microsoft Exchange 2010, there are three supported scenarios for deploying
Exchange in a domain that has a disjoint namespace. The supported scenarios are as
follows:
Scenario 1: The primary DNS suffix of the domain controller isn't the same as the
DNS domain name. Computers that are members of the domain can be either
disjoint or not disjoint.
Scenario 2: A member computer in an Active Directory domain is disjoint even
though the domain controller isn't disjoint.
Scenario 3: The NetBIOS domain name of the domain controller isn't the same as
the subdomain of the DNS domain name of that domain controller.
For more information about Exchange 2010 and disjoint namespaces, see
Understanding Disjoint Namespace Scenarios.
Special considerations
In Exchange 2010, you may have to configure the DNS suffix search list to include
multiple DNS suffixes if you have a disjoint namespace. For more information, see
Configure the DNS Suffix Search List for a Disjoint Namespace.
Msds-allowedDNSSuffixes must be configured within the Active Directory
environment for all namespaces that are used within the forest. For information
about how to configure this, see The computer's primary DNS suffix does not
match the FQDN of the domain where it resides.
For information about how to configure this, see Understanding DNS Client Settings.
For more information about Exchange 2013 system requirements, see Exchange
2013 System Requirements.
For more information about Exchange 2010 system requirements, see the
Exchange 2010 System Requirements article.
Microsoft has changed the Setup prerequisite rule for SLDs from an Error to a
Warning. This change lets the Service Pack 1 installation continue in SLD
environments.
References
Product Compatibility page on the DNS Namespace Planning Solution Center
Feedback
Was this page helpful? Yes No
2. In the console tree, expand Host name (where Host name is the host name of the
DNS server).
4. Right-click the zone that you want (for example, example.com ), and then click
Properties.
6. In the Server fully qualified domain name (FQDN) box, type the host name of the
server that you want to add.
7. In the IP address box, type the IP address of the name server that you want to add
(for example, 192.168.0.22), and then click Add.
9. In the console tree, click Reverse Lookup Zones, right-click the zone that you want,
and then click Properties.
10. Click the Name Servers tab, and then click Add.
11. In the Server name box, type the host name of the server that you want to add.
For example, namesvr2.example.com .
12. In the IP address box, type the IP address of the name server that you want to add
(for example, 192.168.0.22), and then click Add.
2. Click Start, point to Control Panel, and then click Add or Remove Programs.
4. In the Components list, click Networking Services (do not click to select or click to
clear the check box), and then click Details.
5. Click to select the Domain Name System (DNS) check box, and then click OK.
7. Insert the Windows 2003 Server CD when you are prompted, and then click OK.
9. Click Close.
DNS is now installed. To start the DNS snap-in, click Start, point to Administrative
Tools, and then click DNS.
2. In the console tree, click Host name (where Host name is the host name of the
DNS server).
7. In the Network ID box, type the network ID (for example, type 192.168.0), and then
click Next.
7 Note
The network ID is that portion of the TCP/IP address that pertains to the
network.
For more information about TCP/IP networks, see Understand TCP/IP Addressing
and Subnetting Basics.
8. On the Zone File page, click Next, and then click Finish.
This issue may occur if zone transfers are disabled. To resolve this issue, follow these
steps:
3. In the console tree, click Host name (where Host name is the host name of the
DNS server).
5. Under Forward Lookup Zones, right-click the zone that you want (for example,
example.com), and then click Properties.
7. Click to select the Allow zone transfers check box, and then click one of the
following options:
To any server
Only to servers listed on the Name Servers tab
Only to the following servers.
7 Note
If you click Only to the following servers, type the IP address of the
secondary name server in the IP address box, and then click Add.
Troubleshoot DNS
To troubleshoot and obtain information about the DNS configuration, use the Nslookup
utility.
For more information about how to install and configure DNS, see How To Install and
Configure DNS Server in Windows Server 2003 .
Feedback
Was this page helpful? Yes No
This document describes the fallback and timeout behavior that exist when one or more
Domain Name System (DNS) Servers IPs are configured on a Windows DNS client.
Summary
For more information, see NET: DNS: Forwarders and Conditional Forwarders resolution
timeouts .
Configuring DNS clients with more than one DNS Server IP adds additional fault
tolerance to your DNS infrastructure. Adding multiple DNS Servers IPs allows DNS
names to continue to be resolved if failures of the only configured DNS Server, of the
underlying network link, or the supporting network infrastructure that connects a given
client to a DNS Server. Such name failures may cause application or component hangs,
resource outages waiting for dependent timeout expirations that directly or indirectly
cause operational failures.
For these reasons, it's recommended to configure any Windows client with more than
one DNS server, but it's important to be aware of the Windows client resolution process,
as it's different based on how many DNS servers we've configured.
ノ Expand table
Time (seconds since Action
start)
Any Name Error response by the DNS server will cause the process to stop - client
doesn't retry if the response was negative.
In this scenario, the client is then trying to query the same DNS server five times before
timing out.
Example
Windows 8 Client with a single DNS server configured, querying for Microsoft.com
ノ Expand table
3 If no response is received after 2 more seconds, client queries again the first
DNS server
7 If no response is received after 4 more seconds, client queries again the first
DNS server
Any Name Error response by any of the DNS servers will cause the process to stop -
client doesn't retry with the next server if the response was negative. Client tries new
servers only if the previous are unreachable.
In this scenario, the client is then trying to query mostly the first DNS server, and the
secondary once.
Example
Windows XP Client with two DNS servers configured querying for Microsoft.com
Console
ノ Expand table
Time (seconds since Action
start)
Any Name Error response by any of the DNS servers will cause the process to stop -
client doesn't retry with the next server if the response was negative. Client tries new
servers only if the previous are unreachable.
Example
Windows 8 Client with two DNS servers configured querying for Microsoft.com
Console
The behavior is the following (tested on Windows XP, Windows 7, and Windows 8 clients
with a single NIC):
ノ Expand table
8 If no response is received after 4 more seconds, client queries again all the
servers in the list at the same time
Any Name Error response by any of the DNS servers will cause the process to stop -
client doesn't retry with the next server if the response was negative. Client tries new
servers only if the previous are unreachable.
Example
Console
Feedback
Was this page helpful? Yes No
This article describes the design of the DNS namespace in an Active Directory
environment.
Summary
The resolution of names through the use of Domain Name System (DNS) is central to
Windows operation. Without proper name resolution, users can't locate resources on
the network. It's critical that the design of the DNS namespace is created with Active
Directory in mind and that the namespace that exists on the Internet not conflict with an
organization's internal namespace.
More information
The recommended approach to DNS design in an Active Directory environment is to
design the Active Directory environment first and then support that design with the DNS
structure. However, in some cases, the DNS namespace may already be in place. In such
a configuration, the Active Directory environment should be designed independently
and then implemented either as a separate namespace or as a subdomain of the
existing namespace. If the namespace you choose already exists on the Internet, it may
cause name resolution problems for internal clients.
Identify the DNS namespace that you'll be using for your domain. Identify the
name that your organization has registered for use on the Internet (for example,
company.com). If your company doesn't have a registered name, but you'll be
connected to the Internet, you may want to register a name on the Internet. Make
sure if you choose not to register a name that you choose a name that is unique.
You can review existing names at network solutions .
Use different internal and external namespaces. Internally, you could use
comp.com or a subdomain of the external name such as corp. company.com. The
subdomain structure could be useful if you already have an existing DNS
namespace. Different locations or organizations can be named with different
subdomains such as nameone. corp. company.com or nametwo. corp.
company.com to ease administration.
Make Active Directory child domains immediately subordinate to their parent
domains in the DNS namespace. You can choose to create subdomains for
organizations within your company or locations. For example, leveltwo. levelone.
corp. company.com
Separate internal and external names on separate servers. External servers should
include only those names that you want to be visible to the Internet. Internal
servers should contain names that are for internal use. You can set your internal
DNS servers to forward requests that they can't resolve to external servers for
resolution. Different types of clients require different kinds of name resolution.
Web proxy clients, for example, don't require external name resolution because the
proxy server does this on their behalf. Overlapping internal and external
namespaces aren't recommended. In most cases, the end result of this
configuration is that computers will be unable to locate needed resources because
of receiving incorrect IP addresses from DNS. This is particularly a concern when
Network Address Translation (NAT) is involved and the external IP address is in an
unreachable range for internal clients.
Make sure that root servers aren't created unintentionally. Root servers may be
created by the Dcpromo Wizard, resulting in internal clients being able to reach
external clients or to reach parent domains. If the "." zone exists, a root server has
been created. It may be necessary to remove this for proper name resolution to
work.
Feedback
Was this page helpful? Yes No
This article describes an issue where DNS queries to some domains may not be resolved
successfully after you deploy a Windows-based DNS server.
Symptoms
After you deploy a Windows-based DNS server, DNS queries to some domains may not
be resolved successfully.
Cause
This issue occurs because of the Extension Mechanisms for DNS (EDNS0) functionality
that is supported in Windows Server DNS.
EDNS0 allows larger User Datagram Protocol (UDP) packet sizes. However, some firewall
programs may not allow UDP packets that are larger than 512 bytes. Therefore, these
DNS packets may be blocked by the firewall.
Resolution
To resolve this issue, update the firewall program to recognize and allow UDP packets
that are larger than 512 bytes. For more information about how to do this, contact the
manufacturer of your firewall program.
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft does not guarantee the
accuracy of this third-party contact information.
Workaround
To work around this issue, turn off the EDNS0 feature on Windows-based DNS servers.
To do this, take the following action:
At a command prompt, type the following command, and then press Enter:
Console
7 Note
Type a 0 (zero) and not the letter "O" after "enableednsprobes" in this command.
7 Note
Dnscmd.exe is installed on all Windows-based DNS servers except servers that are
running Windows Server 2003 or Windows Server 2003 R2. You can install
Dnscmd.exe from the Windows Server 2003 Support Tools. To download the
Windows Server 2003 Support Tools, click the following Microsoft Download Center
link: Setspn
More information
Some firewalls contain features to check certain parameters of the DNS packet. These
firewall features may make sure that the DNS response is smaller than 512 bytes. If you
capture the network traffic for an unsuccessful DNS lookup, you may notice that DNS
requests EDNS0. Frames that resemble the following don't receive a reply:
Additional records
<Root>: type OPT, class unknown
Name: <Root>
Type: EDNS0 option
UDP payload size: 1280
In this scenario, the firewall may drop all EDNS0-extended UDP frames.
Feedback
Was this page helpful? Yes No
Symptoms
You have an infrastructure that uses Windows Dynamic Host Configuration Protocol
(DHCP) clients and Microsoft DHCP servers to assign and manage IP addresses. On the
DHCP server, you select Enable DNS dynamic updates according to the settings below
and Always dynamically update DNS records. In this configuration, you expect the
DHCP server to manage dynamic DNS updates for A records and PTR records. However,
you observe that both the client and the server create DNS records. Depending on your
configuration, this behavior has the following effects:
If you configure the DNS zones for Nonsecure and secure dynamic updates, you
see that the DHCP server creates records, and then the DHCP client deletes and re-
creates the same records.
If you configure the DNS zones for Secure only dynamic updates, DNS records
might become inconsistent. Both the DHCP server and the DHCP client create
records. However, the DHCP server can't update records that the DHCP client
creates, and the DHCP client can't update records that the DHCP server creates.
Cause
To obtain an IP address, the DHCP client sends a DHCP Request message to the DHCP
server. Typically, this message includes the client's fully qualified domain name (FQDN)
and flags that govern dynamic DNS update behavior. This information is collectively
named Option 81 (also known as the Client FQDN option).
7 Note
Some older DHCP clients do not use Option 81. To provide dynamic updates for
these clients, configure the DHCP server to enable the Dynamically update DNS
records for DHCP clients that do not request updates (for example, clients
running Windows NT 4.0) option.
The DHCP server also stores a set of Option 81 flags that govern dynamic DNS update
behavior. Part of the DHCP DORA (Discover/Offer/Request/Acknowledge) process
involves a comparison between the client and the server of their values of the Option 81
flags to determine who is responsible for DNS updates. The flags that are involved in the
behavior that's described in the Symptoms section are named the O (override) and S
(server) bits. The flags function as follows:
As described in the RFC, the DHCP server's reply to the request message should include
its flag values. If O is set to 1 in the server's message, the client should understand that
the server is overriding the client's S value.
In Windows 8.1, a deliberate design change was introduced to the DHCP client's
dynamic DNS update behavior. This change supports continued development and
enhancements of the TCP/IP (Transmission Control Protocol/Internet Protocol) stack in
later versions of Microsoft operating systems. In Windows 8.1 and later versions, the
DHCP client doesn't honor the DHCP server's Option 81 O and S values. If the client is
configured to update A records, it continues to do this even if the server is also
configured to update A records. That's the case when you select Always dynamically
update DNS records in the DHCP management console.
If you configure your DNS zones for Secure only dynamic updates, then only the entity
(the DHCP client, DHCP server, or an account that the DHCP services are configured to
use) that created a DNS record can update or delete that record. If the DHCP client and
not the DHCP server creates a DNS record, the DHCP server can't modify that record
later.
7 Note
Microsoft's DHCP client doesn't provide a method to directly set the client's O and
S values in the user interface. By default, both values are 0. You can view the values
by recording a netsh trace of a DHCP client request, and by using a tool such as
Netmon to view the results.
You can use the Windows PowerShell cmdlet, Get-DhcpServerv4OptionValue, to
view the DHCP server's Option 81 value. However, the cmdlet reports this value as a
single integer that combines several different settings as bit values. For example, if
you select Always dynamically update DNS records on the DNS tab of a DHCP
scope properties window, this sets the S value to 1. But the cmdlet reports one of
eight possible values for Option 81. All of these use S=1. The specific value depends
on the combination of settings that are made on the DNS tab.
For more information about how dynamic updates work between the DHCP client, the
DHCP server, and the DNS server, see DNS Processes and Interactions
Resolution
If your architecture requires that you use Always dynamically update DNS records, you
can create a registry key on the client computer to force the DHCP client to honor the
DHCP server override.
) Important
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For protection, back up
the registry before you modify it so that you can restore it if a problem occurs. For
more information about how to back up and restore the registry, see How to back
up and restore the registry in Windows .
Name: RegistrationOverwrite
Type: REG_DWORD
Value: 2
7 Note
0 - No overwrite.
1 - Records that the DNS client creates overwrite records that the DHCP
server creates. This is the default value.
2 - Records that the DHCP server creates overwrite records that the DNS
client creates).
4. In the DNS server management console, check the forward and reverse lookup
zones. Depending on your specific environment, you might have to manually
delete A and PTR records that the DHCP server doesn't have permission to delete
or change.
Feedback
Was this page helpful? Yes No
This article lists the causes of the issue where DNS records don't show in a DNS zone.
Symptoms
Successfully registered DNS records are no longer present in a DNS zone.
Cause
Multiple root causes exist, and they're listed in the following table:
ノ Expand table
1 DNS Scavenging is The Scavenging feature on one or more DNS Servers was
misconfigured. configured to have overly aggressive settings and is
prematurely deleting DNS records for AD-integrated DNS
zones.
2 DNS zones are CNF or The container representing the DNS zone in Active
conflict mangled in Active Directory has become CNF or conflict mangled. It was
Directory. replaced by a different container that may first be empty or
contain a subset of the records contained in the previous
instance of the zone.
4 Windows Server 2008 The bug causes records to be deleted from secondary
zone transfer deletion zones on Windows Server 2008 DNS Servers following zone
Cause Issue Synopsis
bug. transfer.
5 Host "A" record is deleted A timing bug causes the premature deletion of host "A"
when the IP address is records when the DNS Server IP is changed.
changed. It occurs in
Windows Vista, Windows
Server 2008, Windows 7,
or Windows Server 2008
R2.
6 DHCP clients configured Windows 7 and Windows Server 2008 R2-based computers
with Option 81 deregister which receive DHCP-assigned addresses have Option 81
host "A" records during defined on the DHCP server. They deregister host "A"
host "AAAA" registration. records during "AAAA" record registration.
7 Timing issue caused when A DNS client's DNS Host record is deleted after you change
you change DNS server IP the DNS server IP address on the same client.
unless KB2520155 is
installed.
8 Record registration DNS dynamic update protocol updates for existing records
failures make records fail. So the records timestamp doesn't update. It makes the
vulnerable to the record vulnerable to deletion by a correctly configured DNS
scavenging process. Scavenging process.
9 DNS records are deleted DNS records that are currently registered by a DHCP-
when a given Windows enabled Windows client are deleted by the DHCP server.
client dynamic lease is The deletion occurs when the client's dynamic lease is
changed to a reservation. transitioned to a reservation, and the following settings are
enabled:
"Always dynamically update DNS A and PTR records"
"Discard A and PTR records when lease is deleted"
"Dynamically update DNS A and PTR records for
DHCP clients that don't request update"
Resolution
When the replication of objects causes a name conflict (two objects have the same
name within the same container, or have the same container name), the directory
automatically renames one of the objects to have a unique name. Specifically, a "*CNF:
<GUID>" string is appended to the DN path of the created object. And the instance
created by the last writer domain controller remains.
If the container representing a DNS zone (or subordinate container) becomes conflict
mangled, the container representing a more complete copy of a DNS zone can be
replaced by container with the same name that's (at first) less complete or even empty.
Determine which copy of the zone should remain. Delete the bad copy of the zone,
which may be the one with the non-CNF-mangled DN path. Rename the CNF-mangled
copy of the zone as required. Then restart the DNS Server service or reload zones.
SRV record loss associated with a mass restart has the same issue with last-writer wins
behavior on the non-linked multivalued attributes. But version churn caused by the GPO
isn't going to the source of the registrations. The mass restarts of lots of domain
controllers is the cause of the concurrent registrations. Some administrators have
worked around this behavior by lowering the SRV registration window.
A good solution to this problem is to configure the DNS client on domain controllers
point off-box DNS Servers addresses as primary for name resolution. Designate local
hub DNS servers per region and have all the DNS servers in that region point that one
DNS server. The hublet DNS servers all point to a single DNS server in a tiered hub-and-
spoke model. All DNS servers can point themselves as secondary's but not primaries.
Because restarts triggered by Windows Update usually occur at 03:00, as long as there's
only one hublet DNS server per time zone, you'll never meet this issue.
Check the Active Directory object version on the dnsNode object that contains the
missing record. If it's a large number, it might be your issue. A possibility is to move the
exclusion of the SRV records to local policy to stop the constant deregistrations.
However, there's an issue with the new behavior. In the new behavior, the SRV records
are removed only once, specifically the first time that the policy is applied. Because the
records are non-linked multi-valued attribute, the following condition can occur:
Multiple domain controllers remove SRV records on different DNS servers before
Active Directory coverage of the zone.
When the underlying attribute is fully converged, the last DNS server to receive a
deletion is the only version that's kept. Only the records that were removed on that DNS
server are removed from the SRV record. The SRV records removed on other DNS
servers seem to come back. Manual cleanup may be required after all domain
controllers have applied the GPO and the affected SRV records are fully converged.
When the DNS server IP is changed on the client, the client sends an SOA update to
delete its "A" Record from the old DNS server. And it sends another update to register
its "A" Record to the new DNS Server.
This DCR is designed to reduce the number stale host "A" records. Problem occurs in
Active Directory-integrated zones.
This issue arises when the DNS Server IP is changed on the client. When it changes,
client sends the register request to new server and delete request to old server. As both
the servers are already synced up, register won't occur. But deletion happens in the old
server, and then it's deleted in both servers because of Active Directory.
Install KB2520155 on Windows Vista, Windows 7, Windows Server 2008, and Windows
Server 2008 R2 computers.
NETLOGON event 577X events are logged for record registration failures of SRV records
by the NETLOGON service.
Other events are logged for registration failures of host A and PTR records. Check
System logs for these failures. Such events may be logged by the clients that register
these records. Or they may be logged by the DHCP servers that register the records on
the clients' behalf.
More information
KB306602 How to optimize the location of a domain controller or global catalog that
resides outside of a client's site
KB953317 A primary DNS zone file may not transfer to the secondary DNS servers in
Windows Server 2008
Feedback
Was this page helpful? Yes No
This article helps fix an issue where Windows DNS registers duplicate server location
(SRV) records for a domain controller if its computer name has uppercase letters.
Symptoms
You have one or more Windows Server 2019-based or Windows Server 2016-based
domain controllers (DCs) in a deployment that uses AD DS-integrated DNS zones. At
least one of the DCs has a computer name that includes uppercase characters.
In this situation, you notice that the DNS records for the domain include duplicate server
location (SRV) records for the DCs that have uppercase characters in their computer
names. One record includes the computer name in the RDATA in all lowercase
characters, and one record includes the computer name in the RDATA in the same
character case as the computer name.
Cause
This behavior occurs because of a change in how the Windows Server DNS functionality
manages the RDATA segment of an SRV record. In Windows Server 2012 R2 and earlier
versions, the RDATA segment contains only lowercase letters. If a computer name
contains uppercase letters, the DNS functionality converts them to lowercase. However,
the Windows Server 2016 (or later version) DNS functionality accepts uppercase and
lowercase letters.
When the DNS server checks to see whether a computer name already has an
associated SRV record, it does not account for changes in case. Therefore, it considers
winserv16.contoso.com and WinServ16.contoso.com to be different addresses.
For this reason, you may see unexpected effects if you use the following configurations:
All the DNS servers and DCs in the domain have been upgraded from Windows
Server 2012 R2 (or an earlier version) to Windows Server 2016 (or a later version).
The DNS database may generate extra SRV records for any DC that has uppercase
characters in its computer name.
All the DNS servers and DCs in the domain run Windows Server 2012 or earlier.
You install the DNS server role on a Windows Server 2016 member server, and then
you promote that member server to a DC in the same domain. If the Windows
Server 2016 DC has uppercase characters in its computer name, it will have extra
SRV records in DNS.
You have a domain that contains DCs and DNS servers that run various versions of
Windows Server. The primary DNS server is a DC that runs Windows Server 2012 or
earlier, and the secondary DNS server is a Windows Server 2016 DC. The primary
DNS server becomes unavailable, and you change the Windows Server 2016 DC to
be the new primary DNS server. After this change, the DNS database may generate
extra SRV records for any DC that has uppercase characters in its computer name.
Resolution
Microsoft has released an update that mitigates this issue. The following table lists the
relevant versions of the update for affected versions of Windows.
ノ Expand table
Version Release
Windows Server 2019, version March 24, 2020-KB4541335 (OS Builds 18362.752 and
1903 18363.752)
Windows Server 2019, version March 17, 2020-KB4541331 (OS Build 17763.1131)
1809
The update introduces a new Group Policy policy setting in the NETLOGON.ADMX file,
as described in the following table.
ノ Expand table
Policy Use lowercase DNS host names when registering domain controller SRV records
name
Policy 1 (default). The policy is enabled. The policy purges duplicate DNS SRV records.
values When you install the update on a DC, this becomes part of that DC's default local
configuration.
0. The policy is disabled. Under this setting, the problematic behavior continues,
and DCs that have computer names that include uppercase characters continue to
register SRV records that include those uppercase characters. The value of 0 is
supported for only emergency or testing use. It should not be used under typical
conditions.
If the policy is not configured or the value is missing, the DC falls back to the new
default local configuration and treats the policy as enabled.
The update adds the following registry entry that is associated with this policy. (This
information is provided for reference only.)
Registry subkey:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Netlogon\Parameters
7 Note
You do not have to restart or disable the Netlogon service when you install the
update, manually clean up records, or disable the policy. You do not have to restart
the computer after you install the update.
When you install the update (or enable the policy in an environment in which it has
been disabled), the Netlogon service makes a best-effort attempt to remove existing
DNS records that have uppercase characters.
We recommend that you install this fix (or enable the policy), and then wait a day or two
to allow time for Netlogon to acquire and apply the new setting. Then, wait long
enough for the changes to replicate throughout the environment. After that time,
examine the DNS records for any remaining duplicates. It is likely that the policy will
miss some duplicate records. In that case, you would have to manually remove those
records.
You can use the following Windows PowerShell command to review records:
PowerShell
7 Note
To remove the remaining duplicate records, run the following PowerShell command:
PowerShell
) Important
Microsoft has released an update to resolve this problem and prevent it from
recurring. We recommend that you install the update instead of working around
the problem.
Make sure that all internal build processes, tools, and scripts that create, modify, or
use computer names also use lowercase characters.
If you cannot rename your DCs (or if it will take a long time to do so), configure
your DNS topology so that DCs that run Windows Server 2016 or later use DNS
servers that run Windows Server 2016 or later. Similarly, configure DCs that run
Windows Server 2012 R2 or earlier to use DNS servers that run Windows Server
2012 R2 or earlier.
) Important
Before using any of these methods, review the following articles. These articles
provide detailed steps to follow to rename a DC. They also provide information
about additional cleanup tasks that you may have to perform after you demote or
rename a DC.
7 Note
If you encounter any issues after you rename a DC, revert the DC name to its
original content.
) Important
We strongly recommend that any domain contain at least two DCs. If you have only
one DC, any time that DC experiences an issue, your domain may become
unavailable.
1. Demote the DC, and clean up the related metadata. For more information, see
Demoting Domain Controllers and Domains and AD Forest Recovery - Cleaning
metadata of removed writable domain controllers.
2. Rename the computer, giving it a name that contains only lowercase characters.
By the time all the DCs are back online, the duplicate (mixed-case) SRV records should
be gone.
1. Demote the DC, and clean up the related metadata. For more information, see
Demoting Domain Controllers and Domains and AD Forest Recovery - Cleaning
metadata of removed writable domain controllers.
netlogon.dnb
netlogon.dns
3. On one of the other DCs, open Server Manager, select Tools, and then select DNS.
4. In DNS Manager, inspect the containers under Forward Lookup Zones and then
delete the SRV records for the DC that you demoted.
5. On the renamed computer, start the netlogon service. To do this, open an elevated
Command Prompt window, and then run net start netlogon .
Feedback
Was this page helpful? Yes No
This article discusses how to set up Domain Name System (DNS) scavenging and gives
an example of setting scavenging up on a pre-existing zone.
Scavenging cleans up (deletes) stale records in DNS. As deletion is involved, many safety
valves are built into scavenging, which takes a long time to enable scavenging.
7 Note
This article focuses on the most common Windows DNS scenario: Windows Server
DNS servers hosting Active Directory (AD)-integrated zones.
In Windows Server, scavenging should be set in all the following three places:
The first is checking the Delete this record when it becomes stale checkbox and
selecting Apply. When you select Apply, the current time is rounded down to the
nearest hour and applied as the timestamp on the record. The timestamp of static
records is 0, indicating they aren't scavenged.
The second way is when a record is created by a client machine registering using
dynamic DNS (DDNS). Windows clients dynamically update DNS every 24 hours. All
DDNS records are set to scavenge. When a record is first created by a client that
has no existing record, it's considered an "Update," and a timestamp is set. If the
client has an existing host record and changes the IP of the host record, this is also
considered an "Update," and a timestamp is set. If the client has an existing host
record with the same IP address, this is considered a "Refresh," and whether the
timestamp changes depends on zone settings.
The third way to set scavenging on records is using the dnscmd /ageallrecords
command. If you run this command against a zone, it will set scavenging and a
timestamp for all records in the zone, including static records that you don't want
to be scavenged.
Once a timestamp is set on a record, it will be replicated to all servers that host the
zone.
7 Note
If the zone that hosts the record doesn't enable scavenging, it won't scavenge, so
the timestamp is irrelevant. The timestamp may be updated on the server where
the client dynamically registers, but it won't be replicated to other servers in the
zone.
7 Note
The screenshot is the same on any DNS server where this zone is replicated.
When you first set scavenging on a zone, the timestamp (seen at the bottom) is set to
the current time of day (rounded down to the nearest hour) plus the Refresh interval.
This setting is also reset whenever the zone is loaded or dynamic updates are enabled
on the zone.
7 Note
If you don't see The zone can be scavenged after timestamp, reload the zone.
The zone can be scavenged after timestamp is the first safety valve. It gives clients time
to update their record timestamps. Since new record timestamps aren't replicated when
zone scavenging is disabled, this also gives replication time to keep things in order.
The No-refresh interval is a period of time during which a resource record can't be
refreshed. A "Refresh" is a dynamic update where you don't change the host resource
record; just touch the timestamp. If a client changes the IP of a host record, this is
considered an "Update" and is exempt from the No-refresh interval. The purpose of a
No-refresh interval is to reduce replication traffic. A change to a record means the
change should be replicated.
After the record timestamp plus No-refresh interval has elapsed, you can enter a Refresh
interval. The Refresh interval is the time when refreshes to the timestamp are allowed.
The client is allowed to come in and update its timestamp. This timestamp will be
replicated, and the No-refresh interval will start again. If the client fails to update its
record during the refresh interval, it becomes eligible to be scavenged.
7 Note
When you set the Refresh and No-refresh intervals, allow enough time for clients to
make several registration attempts during the Refresh interval. If you don't do this,
a record may become eligible for scavenging due to a failed refresh attempt.
If you right-click your server and select Set Aging/Scavenging for All Zones…, you'll see
a screenshot similar to the one above. This option sets the default settings that will be
used when this server creates a new zone. Unless you select the Apply these settings to
the existing Active Directory-integrated zones checkbox, the setting doesn't affect
existing zones.
The Scavenging period value is how often this server scavenges. When a server
scavenges, it logs a DNS Event ID 2501 to indicate how many records are scavenged. If
no records are scavenged, Event ID 2502 is logged. Only one server is required to
scavenge since the zone data is replicated to all servers hosting the zone.
Tip
By getting the timestamp on the most recent Event ID 2501 or 2502 and adding the
scavenging period to it, you can tell exactly when a server will attempt to scavenge.
Although you can set every server hosting the zone to scavenge, we recommend just
having one set. If the server fails to scavenge, it won't have a serious impact. You'll have
one place to look for the suspicion and one set of logs to check. If you have many
servers set to scavenge, you have many logs to check if the scavenging fails.
To control which server is scavenging for a zone, you can use the dnscmd command to
specify exactly which servers may scavenge. For example, the dnscmd
/zoneresetscavengeservers contoso.com 192.168.1.1 192.168.1.2 command allows only
If all the above checks are passed, the zone is ready for scavenging. At this point, the
scavenging server checks the timestamp on each resource record. If the current date
and time is greater than the timestamp plus No-refresh and Refresh intervals, the record
is deleted.
Setup phase
1. Turn off scavenging on all servers. You can use the dnscmd
/zoneresetscavengeservers command to limit scavenging to a single server, and
then ensure this server has scavenging disabled.
2. Turn on scavenging on the zones you want to scavenge. Set the Refresh and No-
refresh intervals as desired. To scavenge more effectively, we recommend lowering
the No-refresh interval and leaving the Refresh interval at the default.
3. Add today's date plus the Refresh and No-Refresh intervals. Come back in a few
weeks when this time has elapsed.
Don't proceed unless you can explain any outdated records. In the next phase, they'll be
deleted.
Enable phase
You can use the dnscmd /zoneresetscavengeservers command to enable scavenging on
a single server.
Once scavenging is enabled, create a new test record and enable it for scavenging.
Then, map out the point in time when this record disappears. Here are the steps:
For example:
Given these assumptions, you can predict that the record will be deleted at
approximately 6 am on 1/10/2008. Here's a diagram of the example.
Once scavenging is enabled, you can check periodically to look for the Event ID 2501
and 2502 events to see how things are going. You can also come back at the predicted
date and time and see if your test record has disappeared.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where DNS Server becomes an island when a
domain controller points to itself for the _msdcs.ForestDnsName domain. For more
information, see the Microsoft Support Lifecycle Policy.
Symptoms
You're using a Microsoft Windows 2000-based domain controller that is running the
Domain Name System (DNS) Server service. The domain controller is authoritative for
the _msdcs.ForestDnsName domain. This domain is the forest root. In this scenario, your
domain controller may not replicate to Active Directory. When you open the Active
Directory Users and Computers snap-in, you notice that the focus of your domain
controller is set to a different domain controller. If you run Netdiag.exe, you receive the
following error message:
Error 9003 RCODE_NAME_ERROR means that the host name a.b.c.d. doesn't exist in
the DNS servers that are listed in the error message.
The behavior that is mentioned in the Symptoms section can occur under the following
circumstances:
In the forest root, there are several domain controllers that are running the DNS
Server service.
The domain controller that is running the DNS Server service is a primary DNS
Server for the _msdcs.ForestDnsName domain.
The domain controller that is running the DNS Server service points to itself as the
preferred or alternative DNS server.
Cause
This behavior may occur because a DNS server for one domain controller may not have
the required domain controller locator CNAME record for
DsaGuid._msdcs.ForestDnsName in its zone for another domain controller.
Resolution
To resolve this behavior, read the following scenario. Then, use either of the following
two methods, depending on your server load and network considerations.
In this scenario, two domain controllers that are in the forest root, DC1.example.com
and DC2.example.com, aren't replicating. Both of the domain controllers are running the
DNS Server service. Both of the domain controllers are authoritative for the
example.com domain.
Both of the domain controllers' NetLogon services try to register their DNS records, and
find that their preferred DNS servers, which are themselves, are authoritative for the
example.com zone. Both of the DNS servers register the DNS records with their local
DNS Server service. One of these DNS records is a domain controller locator CNAME
record for DsaGuid._msdcs.ForestDnsName. When DC1.example.com tries replication
with DC2.example.com, DC1.example.com queries its local DNS server for the CNAME
record for DC2 example.com, but doesn't find it. So the replication process is
unsuccessful.
7 Note
This method may not be appropriate if the primary DNS server is subject to heavy
loads, or if the other domain controllers that are in the forest root are
geographically dispersed.
Example
Domain = example.com (first domain in the forest).
Three domain controllers with the DNS Server service = DC1, DC2, DC3.example.com is
an Active Directory integrated zone.
DC1 is designated as the primary location for this configuration.
DC1 is configured to point to itself for DNS server settings in TCP/IP properties.
DC2 points to DC1 as the primary location and DC3 as an alternative.
DC3 points to DC1 as the primary location and DC2 as an alternative.
Method 2
When you install Active Directory on the member server that is in the forest root, you
must configure its primary DNS server as a domain controller, or as a DNS server that
has the following domain controller locator CNAME record for all the other domain
controllers in the root:
DsaGuid._msdcs.ForestName.
Install the DNS Server service and enable the integrated Active Directory DNS zone to
replicate to the new domain controller. Then the new domain controller may be
changed to point to itself as the primary or alternative DNS server.
If there are any IP address changes for the domain controllers that are in the forest root,
you may have to follow the steps in Method 1 until no longer required to do so. When
you've verified that the IP address changes have replicated to the DNS zone of the new
domain controller that is in the forest root, the domain controllers may be configured to
point to themselves as the primary or alternative DNS server again.
More information
You can configure a domain controller to point to itself as a preferred or alternative DNS
server. The only reason that the domain controller may not replicate to Active Directory
is if that domain controller is also the primary DNS server for the
_msdcs.ForestDnsName domain.
Feedback
Was this page helpful? Yes No
Applies to: Windows Server 2019, all editions Windows Server 2019 Datacenter: Azure
Edition - Preview
Symptoms
Consider an organization that uses an AD-integrated zone (default zone scope) that's
named contoso.com for their internal workstations and servers. The organization wants
to implement a geo-location DNS structure for their branches so that the clients in a
specific site can access intranet services from their local subnets.
ノ Expand table
The organization uses the following Windows PowerShell cmdlets to register host
address (A) records:
PowerShell
The organization uses the following PowerShell cmdlets to define the policies:
PowerShell
Add-DnsServerQueryResolutionPolicy -Name "NorthAmericaPolicy" -Action ALLOW
-ClientSubnet "eq,NorthAmericaSubnet" -ZoneScope "NorthAmericaZoneScope,1" -
ZoneName "contoso.com"
Add-DnsServerQueryResolutionPolicy -Name "CentralAmericaPolicy" -Action
ALLOW -ClientSubnet "eq,CentralAmericaSubnet" -ZoneScope
"CentralAmericaZoneScope,1" -ZoneName "contoso.com"
Add-DnsServerQueryResolutionPolicy -Name "SouthAmericaPolicy" -Action ALLOW
-ClientSubnet "eq,SouthAmericaSubnet" -ZoneScope "SouthAmericaZoneScope,1" -
ZoneName "contoso.com"
The desired outcome is that a client tries to locate a requested resource first in the local
zone scope and then in the default zone scope. However, after the organization
configures these policies, clients from the defined subnets can't successfully resolve
records that are hosted in the default zone scope (contoso.com). For example, clients
can't resolve hostA.contoso.com. When it receives such requests, the DNS server
returns a "Server Failure" message.
Cause
In this situation, incoming authoritative queries are evaluated against the appropriate
set of zone-level policies based on their order of precedence. It seems intuitive that any
query that doesn't match a policy would be automatically serviced from the default zone
scope. However, this isn't true. Instead, any non-matching query triggers a name
resolution failure. That is, if the DNS server receives a name resolution query for
hostA.contoso.com from a client that's specified in a client subnet policy, the DNS
server examines only the related zone scope.
Resolution
To configure the policies so that the DNS server checks the default zone scope in
addition to the local zone scope, use a more precise DnsServerQueryResolutionPolicy
statement, such as the following:
PowerShell
7 Note
You have to create a DnsServerQueryResolutionPolicy statement for each record
that the appropriate zone scope contains.
Feedback
Was this page helpful? Yes No
This article provides a solution to solve the DNS server logs event 7062.
Symptoms
After you apply Service Pack 4, the DNS server begins logging Event 7062:
DNS Server encountered a packet addresses to itself -- IP address w.x.y.z. The DNS
server should never be sending a packet to itself. This situation usually indicates a
configuration error.
Example: -> This DNS server dns1.microsoft.com is the primary for the zone
microsoft.com . -> You have delegated the zone bar.microsoft.com to
DNS ( dns1.microsoft.com ). Note, you should make this check (with nslookup of DNS
manager) both on this DNS server and on the server(s) you delegated the subzone to. It
is possible that the delegation was done correctly, but that the primary DNS for the
subzone, has any incorrect NS record pointing back at this server. If this incorrect NS
record is cached at this server, then the self-send could result. If found, the subzone
DNS server admin should remove the offending NS record.
Cause
This error is caused by a configuration error or is the result of a delegation of a domain
(or subdomain) to a server for which there is no zone file.
Resolution
To resolve this issue, check for the following conditions:
Forwarders
DNS can be configured to forward off-site queries to designated servers. Be sure that
the DNS server is not configured to forward these off-site queries to itself:
1. Select the server, click DNS, and then click Properties from the menu.
2. Click the Forwarders tab.
3. If the server's own IP address is listed, select it and click Remove.
4. After you make this change, make sure to stop and restart the DNS service.
1. Select the secondary zone, click DNS, and then click Properties from the menu.
2. Click the General tab.
3. If the server's own IP address is listed in the IP Master(s) section, select it and click
Remove.
Notify Lists
Microsoft Windows NT DNS Server allows the Administrator to specify (on the primary
DNS server) any secondary DNS servers that should be notified immediately of changes
to the Zone file. Be sure that the DNS server is not configured to notify itself:
1. Select the primary zone, click DNS, and then click Properties from the menu.
2. Click the Notify tab.
3. If the server's own IP address is listed, select it and click Remove.
Delegation issue
The delegation issue is defined as having a domain or subdomain delegated to a server
that is not authoritative for the domain (in other words, a zone file does not exist for the
domain on the server). There are two possible causes:
If another DNS server has delegated a domain (either a forward lookup or reverse
lookup domain) to a server and there is no zone file on the server for that domain,
an Event 7062 is generated. The following are examples:
Your Internet Service Provider (ISP) has assigned you the Class C network of
192.168.1.0 and has delegated the 1.168.192.in-addr.arpa domain for reverse
lookups to your DNS server. If there is no zone configured on your DNS server
for that domain, event 7062 will be generated every time a query is made for
that domain from the server. The DNS server will step through the DNS
hierarchy starting at the root servers and eventually receive a response from the
ISP's DNS server indicating that the server itself is authoritative for the domain
and attempt to query itself. To resolve this issue, either create a primary or
secondary zone for that domain, or have the ISP change the delegation.
Your ISP has delegated a domain to your caching-only DNS server. Because
there are no zone files on a caching-only server, any queries that it makes for
hosts that reside in domains for which it has been delegated authority will result
in an event 7062 error. To resolve this issue, either create a primary or secondary
zone file for that domain, or have the ISP change the delegation.
More information
Due to the informational nature of this warning, the severity type has been reduced
from a "Stop" (red) event to a "Warning" (yellow) event in Windows NT 4.0 Service Pack
5.
Feedback
Was this page helpful? Yes No
Symptoms
Consider the following scenario:
The DNS server computer has multiple network adapters that you use in a NIC
Teaming configuration.
You configure the DNS server to listen on the IP address of the teaming network
adapter.
On the Interfaces tab of the DNS server properties dialog box in DNS Manager,
you can configure the IP address that you want to use.
In this scenario, when you set this configuration, Windows stores it in a registry value
under the HKLM\SYSTEM\CurrentControlSet\Services\DNS\Parameters\ListenAddresses
subkey.
After you restart the DNS server, Windows deletes both the setting and the registry
value. The DNS server starts listening on all IP addresses again.
When this change occurs, Windows logs Event ID 410 in the DNS server event log:
The DNS server list of restricted interfaces does not contain a valid IP address for
the server computer. The DNS server will use all IP interfaces on the machine. Use
the DNS manager server properties, interfaces dialog, to verify and reset the IP
addresses the DNS server should listen on. For more information, see "To restrict a
DNS server to listen only on selected addresses" in the online Help.
Cause
As indicated by DNS Event ID 410, this behavior is expected.
When the DNS server starts, it checks the IP addresses of the available network adapters
and notes that none of the addresses match the configured NIC Teaming address.
Because of this mismatch, the DNS server determines that the configuration isn't valid.
The DNS server then deletes the configuration, and reverts to listening on all available IP
addresses.
NIC Teaming isn't available until after the physical adapters have come online. The issue
occurs because the DNS Server service starts after the physical adapters come online.
However, it doesn't wait for NIC Teaming adapter to become available.
Resolution
To resolve this issue, change the startup type of the DNS Server service to Automatic
(Delayed Start). This setting delays the startup of the service so that the NIC Teaming
adapter is available.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where Domain Name System (DNS) Servers
may fail to resolve queries for names in certain top-level domains when name resolution
is provided by root hints.
Symptom
When name resolution is provided by root hints, Windows Server 2008 DNS and
Windows Server 2008 R2 DNS Servers may fail to resolve queries for names in certain
top-level domains. When this problem happens, it will continue until the DNS Server
cache is cleared or the DNS Server service is restarted. The problem can be seen with
domains like .co.uk, .cn, .biz, and .br, but isn't limited to these domains.
When the problem is happening, a nslookup command issued for an affected name will
return the error "server failed". A network trace will show that the DNS server doesn't
send any traffic for such a request to the Internet. No events related to a problem are
reported in the DNS Event Log.
This problem doesn't happen if DNS Server is configured to use forwarders for Internet
name resolution instead of root hints.
Resolution
To resolve the issue and continue using root hints, change the MaxCacheTTL registry
value to two days or greater.
7 Note
Serious problems might occur if you modify the registry incorrectly by using
Registry Editor or another method. These problems might require you to reinstall
the operating system. Microsoft cannot guarantee that these problems can be
solved. Modify the registry at your own risk.
3. On the Edit menu, select New, select DWORD (32-bit) Value, and then add the
following value:
Value: MaxCacheTTL
Data type: DWORD
Data value: 0x2A300 (172,800 seconds in decimal, or two days)
4. Select OK.
7 Note
The .biz top level has a TTL of 6 days for its NS and A records. Thus, you may need
to set the MaxCacheTTL to 518400 for 6 days or even 604800 for 7 days.
Disclaimer
Rapid publishing articles provide information directly from within the Microsoft support
organization. The information contained herein is created in response to emerging or
unique topics, or is intended supplement other knowledge base information.
To the maximum extent permitted by applicable law, Microsoft and/or its suppliers
disclaim and exclude all representations, warranties, and conditions whether express,
implied, or statutory, including but not limited to representations, warranties, or
conditions of title, non-infringement, satisfactory condition or quality, merchantability
and fitness for a particular purpose, with respect to the materials.
Feedback
Was this page helpful? Yes No
This article provides a solution to an issue where DNS Server vulnerability to DNS Server
Cache snooping attacks.
Symptoms
What is "DNS cache snooping" and how do I prevent it? describes DNS cache
snooping as:
DNS cache snooping is when someone queries a DNS server in order to find out
(snoop) if the DNS server has a specific DNS record cached, and thereby deduce if
the DNS server's owner (or its users) have recently visited a specific site.
This may reveal information about the DNS server's owner, such as what vendor,
bank, service provider, etc. they use. Especially if this is confirmed (snooped)
multiple times over a period.
This method could even be used to gather statistical information - for example at
what time does the DNS server's owner typically access his net bank etc. The cached
DNS record's remaining TTL value can provide very accurate data for this.
DNS cache snooping is possible even if the DNS server is not configured to resolve
recursively for 3rd parties, as long as it provides records from the cache also to third
parties.
Security audits may report that various DNS Server implementations are vulnerable to
cache snooping attacks that allow a remote attacker to identify which domains and
hosts have [recently] been resolved by a given name server.
Solution:
Contact the vendor of the DNS software for a fix.
Cause
This error is typically reported on DNS Severs that do recursion.
Resolution
There's no code fix as this is a configuration choice.
1. Leave recursion enabled if the DNS Server stays on a corporate network that
cannot be reached by untrusted clients
3. Disable recursion
More information
By default, Microsoft DNS Servers are configured to allow recursion.
Name recursion can be disabled globally on a Microsoft DNS Server but can't be
disabled on a per-client or per-interface basis.
The majority of Microsoft DNS Servers are coinstalled with the Domain Controller server
role. Such servers typically host zones and resolve DNS names for devices | appliances,
member clients, member servers, and domain controllers in an Active Directory forest
but may also resolve names for larger parts of a corporate network. Since Microsoft DNS
Servers are typically deployed behind firewalls on corporate networks, they're not
accessible to untrusted clients. Administrators of servers in this setting should consider
whether disabling or limiting DNS recursion is necessary.
Disabling recursion globally isn't a configuration change that should be taken lightly as
it means that the DNS server can't resolve any DNS names on zones that aren't held
locally. This requires some careful DNS planning. For example, clients cannot typically be
pointed directly at such servers.
The decision to disable recursion (or not) must be made based on what role the DNS
server is meant to do within the deployment. If the server is meant to recurse names for
its clients, recursion cannot be disabled. If the server is meant to return data only out of
local zones and is never meant to recurse or forward for clients, then recursion may be
disabled.
Related links
Disable Recursion on the DNS Server
Disable recursion on the DNS server
How DNS query works
Recursive and Iterative Queries
Recursive Name Resolution
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which Domain Name System (DNS) zone transfer
fails when using the Only to servers listed in the Name servers tab setting.
You configure multiple IP addresses on a network adapter, and the DNS server is
configured to listen to all IP addresses. If you allow zone transfers with the Only to
server listed on the Name Servers tab option enabled under the Zone Transfers tab of
a DNS zone, incremental zone transfer (IXFR) doesn't occur. In addition, when the Notify
option is enabled, creating records on the primary server doesn't replicate to the
secondary server unless you force Authoritative Transfer (AXFR). When the DNS zone is
paused or resumed, you receive the following error message:
To any server
Only to the following servers
5. Open the zone transfer settings and check the settings. If the settings are correct,
select Cancel and close the MMC.
Feedback
Was this page helpful? Yes No
This article provides help to solve an issue where DNS zone transfer options are reset
after you change the zone replication scope.
Symptoms
Consider the following scenario:
Both domain controllers are Domain Name System (DNS) servers that host the
Contoso.com zone.
The contoso.com zone on DC1 and DC2 is configured to Allow Zone transfers to
secondary servers.
In this scenario, the zone transfer settings on DC2 are removed. The following changes
occur:
The list of servers to which zone transfer was previously allowed is removed. The
server values are also removed from the registry.
7 Note
When this issue occurs, the zone transfers settings on DC1 are not affected.
Cause
This issue occurs because the existing zone object is deleted from the partition, and a
new object is created in the corresponding partition when the replication scope is
changed. This change is replicated across all domain controllers.
When the polling thread on DC2 pulls the change from the new partition, the registry
settings for are reset. Zone transfer is disabled because the value of SecureSecondaries
is set to 3. Also, any configured servers in the zone transfer list are removed because the
SecondaryServers value is removed. From a DNS perspective, this process resembles
creating a new zone in a different partition.
Resolution
Before you change the replication scope, note the zone transfer settings. Reconfigure
the zone transfer settings after the replication scope is changed.
You can also use the following scripts to back up and restore the settings.
7 Note
These scripts are provided on an as-is basis. We recommend that you thoroughly
test these scripts before you use them in a production environment.
Backup script
Save the following code as a file that is named BackupZoneTransferSettings.ps1.
PowerShell
# Begin Script
param([string]$ZoneName = "test2.com")
#Build the vars
$TargetRoot = "HKCU:\DNSZoneConfigMigration\"
$TargetKeyPath = $TargetRoot
$SourceRoot = "HKLM:\Software\Microsoft\Windows Nt\CurrentVersion\DNS
Server\Zones\"
$SourceKeyPath = $SourceRoot + $ZoneName
#Copy the Item
#Check for the presence of the item
Get-Item HKCU:\DNSZoneConfigMigration -ErrorAction SilentlyContinue >$null
if($?)
{
"DNSZoneConfigMigration key present already!"
}
else
{
New-Item -Path HKCU:\DNSZoneConfigMigration -ErrorAction SilentlyContinue
>$null
}
if($?)
{
Copy-Item -Path $SourceKeyPath -Destination $TargetKeyPath -ErrorAction
SilentlyContinue >$null
if($?)
{
"Key backed up in registry (Current User Hive) successfully!"
}
else
{
"Key Backup Failed.Error Code is " + $Error[0].Exception.Message
}
}
else
{ "Unable to Create Backup Key.Error code is " + +
$Error[0].Exception.Message + ".Exiting"
}
# End Script
Restore script
Save the following code as a file that is named RestoreZoneTransferSettings.ps1.
PowerShell
# Begin Script
param([string]$ZoneName = "test2.com")
#Build the vars
$SourceRoot = "HKCU:\DNSZoneConfigMigration\"
$SourceKeyPath = $SourceRoot + $ZoneName
$DestinationRoot = "HKLM:\Software\Microsoft\Windows Nt\CurrentVersion\DNS
Server\Zones\"
$DestinationKeyPath = $DestinationRoot + $ZoneName
#Copy the ItemProperty Values
Copy-ItemProperty -Path $SourceKeyPath -Destination $DestinationKeyPath -
Name "SecureSecondaries" -ErrorAction SilentlyContinue >$null
if($?)
{
"SecureSecondaries Value Successfully Restored for " + $ZoneName
Copy-ItemProperty -Path $SourceKeyPath -Destination $DestinationKeyPath
-Name "SecondaryServers" -ErrorAction SilentlyContinue >$null
if($?)
{
"SecondaryServers Value Successfully Restored for " + $ZoneName
"Restore Successful! Deleting the backup" Remove-Item -Path $SourceKeyPath
if(-Not $?)
{
"Unable to Delete Backup Key. Delete Manually. Error :" +
$Error[0].Exception.Message
}
}
else
{
"Failed to restore SecondaryServers value. " +
$Error[0].Exception.Message
}
}
else
{
"Failed to restore SecureSecondaries value. " +
$Error[0].Exception.Message
}
# End Script
The backup script backs up the zone transfer settings for a particular zone. (For
convenience, the backup is stored in the registry under the HKEY_CURRENT_USER hive.)
7 Note
You can run the Set-ExecutionPolicy PowerShell cmdlet to allow unsigned scripts.
The second command (highlighted) in the following screenshot takes a backup of the
zone transfer settings for the zone that is named "test3.com."
After you run the restore script, you must restart the DNS service to apply the
changes.
More information
When zone transfer is set to specific servers or IP addresses, the following values are
populated:
Settings
Registry
7 Note
The zone transfer settings are not stored in Active Directory. Therefore, the settings
don't replicate as part of Active Directory replication.
DS polling thread
The DNS service maintains a DS polling thread that periodically polls partitions and
retrieves the list of all zones. For more information, see How Often Does the DNS Server
Service Check AD for New or Modified Data?
By default, the DNS service polls Active Directory for changes every 180 seconds (3
minutes). You can control this process by using the DsPollingInterval registry key or the
dnscmd /dspollinginterval switch.
7 Note
The switch accepts values from 0 to 3,600 seconds. However, values from 1 to 29
are not allowed. The minimum acceptable value is 30 seconds.
Feedback
Was this page helpful? Yes No
This article solves an issue that event IDs 4000 and 4007 are logged when the DNS
zones aren't loaded on the DNS console.
Symptoms
One of the DNS servers in your environment starts showing an issue that the zones
aren't loaded on the DNS console. And Event IDs 4000 and 4007 are logged in the DNS
event logs:
Event ID 4000:
Output
The DNS server was unable to open Active Directory. This DNS server is
configured to obtain and use information from the directory for this zone
and is unable to load the zone without it. Check that the Active Directory
is functioning properly and reload the zone. The event data is the error
code.
Event ID 4007:
Output
The DNS server was unable to open zone \<zone> in the Active Directory from
the application directory partition \<partition name>. This DNS server is
configured to obtain and use information from the directory for this zone
and is unable to load the zone without it. Check that the Active Directory
is functioning properly and reload the zone. The event data is the error
code.
Also when you try to open the DNS console you get a pop-up giving Access Denied.
When you try to perform any operation on the AD-integrated zones using DNSCMD,
you receive the Access Denied error message.
Cause
This issue happens when that particular DC/DNS server has lost its Secure channel with
itself or PDC.
This issue can also happen in a single DC environment where that DC/DNS server holds
all the FSMO roles and is pointing to itself as Primary DNS server.
Resolution
In case you have other Domain Controller/DNS server present in the environment, then
configure the server experiencing the issue to point to other active DNS server in TCP/IP
properties.
Console
It will prompt for the password of the Domain Admin account that you used, enter
that.
If it's the only domain controller in the environment and there are no other DNS Servers
available, follow the same steps but replace the PDC.Domain.com with the server's own IP
address (since it itself is the PDC).
Feedback
Was this page helpful? Yes No
This article helps to resolve the issue in which Event ID 4015 is logged and the Domain
Name Service (DNS) server encounters a critical error.
If you're running the DNS role on a Read-Only Domain Controller (RODC) and a
writable Domain Controller (hosting DNS) isn't accessible, the following event is
logged on the RODC.
Output
The DNS server can't access the Active Directory object, and the following event is
logged frequently in the DNS server's event log.
Output
Type: Error
Source: DNS
Category: None
Event ID: 4015
Description:
The DNS server has encountered a critical error from the Active
Directory. Check that the Active Directory is functioning properly. The
extended error debug information (which may be empty) is "0000051B:
AttrErr: DSID-xxxx, #1: 0:0000051B: DSID-xxxx, problem 1005
(CONSTRAINT_ATT_TYPE), data 0, Att 20119(nTSecurityDescriptor)". The
eventdata contains the error."
ouput
The DNS server has encountered a critical error from the Active
Directory. Check that the Active Directory is functioning properly. The
extended error debug information (which may be empty) is "00002024:
SvcErr: DSID-02050BBD, problem 5008 (ADMIN_LIMIT_EXCEEDED), data
-1026". The event data contains the error.
DS_AVOID_SELF
DS_TRY_NEXTCLOSEST_SITE
DS_DIRECTORY_SERVICE_6_REQUIRED
DS_WRITEABLE_REQUIRED
Once a DC is returned from the DSGETDC call, it uses the result to search for the NS
record in DNS. If the DSGETDC call fails or it fails to find the NS record of the DC
returned from DSGETDC, Event ID 4015 will be logged.
The following command can be run from the RODC to check which DC is returned from
the DSGETDC call:
Console
For more information about the DSGETDC function, see DsGetDcNameA function.
To resolve either of the causes above, ensure that a writable DC is accessible from the
RODC, that the DNS Server Role is installed on that DC, and that the NS record is
registered in DNS for the writable DC.
1. When you see the DNS error in the DNS server event logs again after the logging
is enabled, stop the AD diagnostic field engineering logging by setting the
following registry value to 0:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\15 Field
Engineering
2. Correlate the exact time of Event ID 4015 to the Directory Service Event ID 1644,
and identify the DNS application directory partition.
3. Open the ADSI Edit (Adsiedit.msc) tool, and go to the LDAP location of the object
identified in Event ID 1644, which correlates to Event ID 4015.
4. Right-click the zone, go to Properties > Security > Advanced, and make sure the
Owner is set to SYSTEM.
Event ID 4015 is logged with an extended error
code (ADMIN_LIMIT_EXCEEDED)
This issue occurs when the DNS Server service reaches the dnsRecord multi-valued
attribute limit for the dnsNode object in Active Directory. In Active Directory integrated
DNS zones, DNS names are represented by dnsNode objects, and DNS records are
stored as values in dnsRecord attributes of dnsNode objects. DNS resource records (RRs)
of demoted domain controllers won't be deleted automatically from dnsRecord
attributes of dnsNode objects in the corresponding zone of the related Active Directory
partition. For example:
Output
DC=..TrustAnchors,CN=MicrosoftDNS,DC=ForestDnsZones,DC=xxx,DC=xxx
When additional records are added to dnsRecord attributes of dnsNode objects, the
orphaned entries of demoted domain controllers result in the ADMIN_LIMIT_EXCEEDED
error.
To check the current number of records in each partition, run the following repadmin
commands:
Console
The output displays the current number of entries in dnsRecord attributes of the
corresponding Active Directory integrated zone. For example:
Output
DN:
DC=@,DC=..TrustAnchors,CN=MicrosoftDNS,DC=ForestDnsZones,DC=contoso,DC=com
1280> dnsRecord: <48 byte blob>;
Delete orphaned entries of denoted domain controllers
To resolve this issue, remove all orphaned entries of the denoted domain controllers
from the zones. To check and selectively delete the entries, run the following Windows
PowerShell cmdlets:
PowerShell
If you need to delete multiple resource records (RRs) for a single host, run the following
cmdlets:
PowerShell
PowerShell
7 Note
The trace logging will stop automatically after Event ID 4015 is logged.
For more information, see Gather key information before contacting Microsoft support.
Feedback
Was this page helpful? Yes No
This article helps resolve an issue in which Event IDs 4016 and 4004 are logged in the
Domain Name System (DNS) when DNS updates from the Lightweight Directory Access
Protocol (LDAP) to Active Directory (AD) time out.
In AD-integrated DNS zones that are hosted on domain controllers (Windows Server
2012 R2 or later versions), DNS can't enumerate the zones or intermittently fail to create
or write records. Additionally, Event IDs 4016 and 4004 are logged in the DNS event log:
Event ID 4016
Output
Event ID 4004
Output
If Event IDs 4016 and 4004 are logged, the DNS records are updated on other domain
controllers and visible in ADSI Edit (adsiedit.msc). However, the records can't be written
and the DNS updates stop until the DNS Server service is restarted. During this period,
records can be created at the same time by using ADSI Edit on the problematic domain
controllers. These records are then replicated to all domain controllers, which means the
AD is working properly. The memory usage of the dns.exe process is low. Meanwhile, the
CPU and memory usage on domain controllers is also low, but they remain
unresponsive.
By checking the DNS audit logs, event logs and packet captures, DNS updates stop on
the server even though DNS queries are responded to quickly. In addition, error 0x55 is
logged.
7 Note
PowerShell
#NOTE