Skip to content

Commit 093151c

Browse files
authored
Merge pull request #8500 from v-lianna/CI_4466
AB#4466 error-0x569-not-granted-logon-type
2 parents 0fc044a + 592f952 commit 093151c

3 files changed

Lines changed: 51 additions & 17 deletions

File tree

support/windows-server/active-directory/active-directory-domain-join-troubleshooting-guidance.md

Lines changed: 1 addition & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -53,23 +53,7 @@ The following table lists the ports required to be open between the client compu
5353

5454
### Error code 0x569
5555

56-
> The user has not been granted the requested logon type at this computer.
57-
58-
Here's an example from the *netsetup.log* file:
59-
60-
```output
61-
mm/dd/yyyy hh:mm:ss:ms NetpDsGetDcName: failed to find a DC having account <computer name>$': 0x525
62-
mm/dd/yyyy hh:mm:ss:ms NetpDsGetDcName: found DC '\\<DC name>.<domain>.<tld>' in the specified domain
63-
mm/dd/yyyy hh:mm:ss:ms NetUseAdd to \\<DC name>.<domain>.<tld>\IPC$ returned 1385
64-
mm/dd/yyyy hh:mm:ss:ms NetpJoinDomain: status of connecting to dc '\\<DC Name>.<Domain>.<tld>': 0x569
65-
mm/dd/yyyy hh:mm:ss:ms NetpDoDomainJoin: status: 0x569
66-
```
67-
68-
Error 0x569 is logged when the domain join user lacks the **Access this computer from the network** user right. Make sure of the following items:
69-
70-
- Verify that the user account performing the domain join operation (or the security group that owns the member of the domain join user) has been granted the **Access this computer from the network** right in the default domain controllers policy.
71-
- The default domain controllers policy is linked to the OU that hosts the DC computer account that's servicing the domain join operation.
72-
- The DC servicing the domain join operation applies the policy successfully, specifically the user rights settings defined in the default domain controllers policy.
56+
For more information, see [Error code 0x569: The user has not been granted the requested logon type at this computer](error-0x569-not-granted-logon-type.md).
7357

7458
### Error code 0x534
7559

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: User Has Not Been Granted the Requested Logon Type at This Computer
3+
description: Helps resolve the error code 0x569 that occurs during a domain join operation.
4+
ms.date: 03/26/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.reviewer: kaushika, raviks, herbertm, dennhu, eriw, v-lianna
9+
ms.custom:
10+
- sap:active directory\on-premises active directory domain join
11+
- pcy:WinComm Directory Services
12+
---
13+
# Error code 0x569: The user has not been granted the requested logon type at this computer
14+
15+
This article helps resolve the error code 0x569 that occurs during a domain join operation. It provides a detailed analysis of the **NetSetup.log** and a step-by-step resolution to ensure the user account has the necessary rights.
16+
17+
You receive the following error message during a domain join operation:
18+
19+
> Logon failure: the user has not been granted the requested logon type at this computer.
20+
21+
When you check the **NetSetup.log** file, you see the following entries:
22+
23+
```output
24+
NetpDsGetDcName: failed to find a DC having account '<computer name>$': 0x525
25+
NetpDsGetDcName: found DC '\\<dc name>' in the specified domain
26+
NetUseAdd to \\<dc name>\IPC$ returned 1385
27+
NetpJoinDomain: status of connecting to dc '\\<dc name>': 0x569
28+
NetpDoDomainJoin: status: 0x569
29+
```
30+
31+
Here's more information about the error code:
32+
33+
|Hexadecimal error |Decimal error |Symbolic error string |
34+
|---------|---------|---------|
35+
|0x569 |1385 |ERROR_LOGON_TYPE_NOT_GRANTED |
36+
37+
This error occurs because the domain join user account lacks the **Access this computer from the network** user right at the domain controller (DC) servicing the domain join operation.
38+
39+
To resolve this error, follow these steps:
40+
41+
1. There's no need to restrict **Everyone** from accessing DCs over the network. You can add a group named "domain joiners" to the policy.
42+
> [!NOTE]
43+
> Don't add the user directly.
44+
2. Verify that **Everyone** or the "domain joiners" group has been granted the **Access this computer from the network** right in the group policy applying to all DCs. By default, this policy is the **Default Domain Controllers Policy**.
45+
3. Ensure that the relevant policy is linked to the organizational unit (OU) that hosts the DCs.
46+
> [!NOTE]
47+
> Place all DC computer accounts in the **Domain Controllers** OU.
48+
4. Confirm that the DCs servicing the domain join operation have applied the relevant policy successfully.

support/windows-server/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -353,6 +353,8 @@ items:
353353
href: ./active-directory/cannot-connect-internet-domain.md
354354
- name: Default limit to workstation numbers
355355
href: ./active-directory/default-workstation-numbers-join-domain.md
356+
- name: Error code 0x569
357+
href: ./active-directory/error-0x569-not-granted-logon-type.md
356358
- name: Netlogon service doesn't keep settings after in-place upgrade
357359
href: ./active-directory/netlogon-service-not-start-automatically.md
358360
- name: Support boundaries for Active Directory over NAT

0 commit comments

Comments
 (0)