Skip to content

Commit 1baf83b

Browse files
committed
update according to TR.
1 parent f2176d5 commit 1baf83b

2 files changed

Lines changed: 14 additions & 14 deletions

File tree

support/windows-server/active-directory/domain-join-error-0x6d9-there-are-no-more-endpoints-available-from-the-endpoint-mapper.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ NetpDoDomainJoin: status: 0x6d9
5353

5454
## Cause
5555

56-
Error 0x6D9 is logged when network connectivity is blocked between the joining client and the Domain Controller (DC). The network connectivity services the domain join operation over port 135 or a port in the ephemeral range between 1025 to 5000 or 49152 to 65535. For more information, see [Service overview and network port requirements for Windows](../networking/service-overview-and-network-port-requirements.md).
56+
Error 0x6D9 is logged when network connectivity is blocked between the joining client and the Domain Controller (DC). The network connectivity services the domain join operation initially over Transmission Control Protocol (TCP) port 135, and then an ephemeral port between 49152 to 65535. For more information, see [Service overview and network port requirements for Windows](../networking/service-overview-and-network-port-requirements.md).
5757

5858
The network connectivity issue can be caused by several factors, including advanced security solutions with host firewalls installed on the DC, port exhaustion, and other potential issues.
5959

@@ -68,7 +68,7 @@ The network connectivity issue can be caused by several factors, including advan
6868
NetpGetComputerObjectDn: Unable to bind to DS on '\\DC1.CONTOSO.COM': 0x6d9
6969
```
7070

71-
2. Verify that the joining client has network connectivity to the DC over the required ports and protocols used by the applicable operating system (OS) versions. Domain join clients connect a DC over Transmission Control Protocol (TCP) port 135 by the dynamically assigned port in the range between 49152 and 65535.
71+
2. Verify that the joining client has network connectivity to the DC over the required ports and protocols used by the applicable operating system (OS) versions. Domain join clients initially connect to a DC over TCP port 135, and then a dynamically assigned port in the range between 49152 and 65535.
7272
3. Ensure that the OS, software and hardware routers, firewalls, and switches allow connectivity over the required ports and protocols.
7373
4. Ensure that there are enough available ports for the operation. You can use tools like netstat to check for port availability and usage.
7474
5. If advanced security solutions with host firewalls is installed on the DC, review its settings to ensure it isn't blocking the required ports.

support/windows-server/active-directory/failure-when-you-use-an-existing-computer-account-to-join-a-domain.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,15 @@ Review the following example of the Netsetup.log on a fully updated system.
3333

3434
```output
3535
NetpProvisionComputerAccount:
36-
lpDomain: contoso.com
37-
lpHostName: host1
38-
lpMachineAccountOU: (NULL)
39-
lpDcName: ContosoDC1.contoso.com
40-
lpMachinePassword: (null)
41-
lpAccount: contoso\nonadminuser2
42-
lpPassword: (non-null)
43-
dwJoinOptions: 0x403
44-
dwOptions: 0x40000003
36+
lpDomain: contoso.com
37+
lpHostName: host1
38+
lpMachineAccountOU: (NULL)
39+
lpDcName: ContosoDC1.contoso.com
40+
lpMachinePassword: (null)
41+
lpAccount: contoso\nonadminuser2
42+
lpPassword: (non-null)
43+
dwJoinOptions: 0x403
44+
dwOptions: 0x40000003
4545
NetpLdapBind: Verified minimum encryption strength on ContosoDC1.contoso.com: 0x0
4646
NetpLdapGetLsaPrimaryDomain: reading domain data
4747
NetpGetNCData: Reading NC data
@@ -50,9 +50,9 @@ NetpGetDomainData: Lookup crossref data for: CN=Partitions,CN=Configuration,DC=c
5050
NetpLdapGetLsaPrimaryDomain: result of retrieving domain data: 0x0
5151
NetpCheckForDomainSIDCollision: returning 0x0(0).
5252
NetpGetComputerObjectDn: Cracking DNS domain name contoso.com/ into Netbios on \\ContosoDC1.contoso.com
53-
NetpGetComputerObjectDn: Crack results: name = CONTOSO\
53+
NetpGetComputerObjectDn: Crack results: name = CONTOSO\
5454
NetpGetComputerObjectDn: Cracking account name CONTOSO\HOST1$ on \\ContosoDC1.contoso.com
55-
NetpGetComputerObjectDn: Crack results: (Account already exists) DN = CN=HOST1,CN=Computers,DC=contoso,DC=com
55+
NetpGetComputerObjectDn: Crack results: (Account already exists) DN = CN=HOST1,CN=Computers,DC=contoso,DC=com
5656
NetpGetADObjectOwnerAttributes: Looking up attributes for machine account: CN=HOST1,CN=Computers,DC=contoso,DC=com
5757
NetpGetNCData: Reading NC data
5858
NetpReadAccountReuseModeFromAD: Searching '<WKGUID=AB1D30F3768811D1ADED00C04FD8D5CD,DC=contoso,DC=com>' for '(&(ObjectClass=ServiceConnectionPoint)(KeyWords=NetJoin*))'.
@@ -91,7 +91,7 @@ NetpDoDomainJoin: status: 0xaac
9191

9292
## Cause
9393

94-
Windows introduced extra protections with updates released on and after October 11, 2022. These protections intentionally prevent domain join operations from reusing an existing computer account in the target domain unless the following specific conditions are met:
94+
Windows introduced extra protections with updates released on and after October 11, 2022. These protections intentionally prevent domain join operations from reusing an existing computer account in the target domain unless any of the following conditions is met:
9595

9696
- The user attempting the operation is the creator of the existing account.
9797
- The computer was created by a member of domain administrators, enterprise administrators, or built-in administrators groups.

0 commit comments

Comments
 (0)