You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/domain-join-error-0x6d9-there-are-no-more-endpoints-available-from-the-endpoint-mapper.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ NetpDoDomainJoin: status: 0x6d9
53
53
54
54
## Cause
55
55
56
-
Error 0x6D9 is logged when network connectivity is blocked between the joining client and the Domain Controller (DC). The network connectivity services the domain join operation over port 135 or a port in the ephemeral range between 1025 to 5000 or 49152 to 65535. For more information, see [Service overview and network port requirements for Windows](../networking/service-overview-and-network-port-requirements.md).
56
+
Error 0x6D9 is logged when network connectivity is blocked between the joining client and the Domain Controller (DC). The network connectivity services the domain join operation initially over Transmission Control Protocol (TCP) port 135, and then an ephemeral port between 49152 to 65535. For more information, see [Service overview and network port requirements for Windows](../networking/service-overview-and-network-port-requirements.md).
57
57
58
58
The network connectivity issue can be caused by several factors, including advanced security solutions with host firewalls installed on the DC, port exhaustion, and other potential issues.
59
59
@@ -68,7 +68,7 @@ The network connectivity issue can be caused by several factors, including advan
68
68
NetpGetComputerObjectDn: Unable to bind to DS on '\\DC1.CONTOSO.COM': 0x6d9
69
69
```
70
70
71
-
2. Verify that the joining client has network connectivity to the DC over the required ports and protocols used by the applicable operating system (OS) versions. Domain join clients connect a DC over Transmission Control Protocol (TCP) port 135 by the dynamically assigned port in the range between 49152 and 65535.
71
+
2. Verify that the joining client has network connectivity to the DC over the required ports and protocols used by the applicable operating system (OS) versions. Domain join clients initially connect to a DC over TCP port 135, and then a dynamically assigned port in the range between 49152 and 65535.
72
72
3. Ensure that the OS, software and hardware routers, firewalls, and switches allow connectivity over the required ports and protocols.
73
73
4. Ensure that there are enough available ports for the operation. You can use tools like netstat to check for port availability and usage.
74
74
5. If advanced security solutions with host firewalls is installed on the DC, review its settings to ensure it isn't blocking the required ports.
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/failure-when-you-use-an-existing-computer-account-to-join-a-domain.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,15 +33,15 @@ Review the following example of the Netsetup.log on a fully updated system.
33
33
34
34
```output
35
35
NetpProvisionComputerAccount:
36
-
lpDomain: contoso.com
37
-
lpHostName: host1
38
-
lpMachineAccountOU: (NULL)
39
-
lpDcName: ContosoDC1.contoso.com
40
-
lpMachinePassword: (null)
41
-
lpAccount: contoso\nonadminuser2
42
-
lpPassword: (non-null)
43
-
dwJoinOptions: 0x403
44
-
dwOptions: 0x40000003
36
+
lpDomain: contoso.com
37
+
lpHostName: host1
38
+
lpMachineAccountOU: (NULL)
39
+
lpDcName: ContosoDC1.contoso.com
40
+
lpMachinePassword: (null)
41
+
lpAccount: contoso\nonadminuser2
42
+
lpPassword: (non-null)
43
+
dwJoinOptions: 0x403
44
+
dwOptions: 0x40000003
45
45
NetpLdapBind: Verified minimum encryption strength on ContosoDC1.contoso.com: 0x0
46
46
NetpLdapGetLsaPrimaryDomain: reading domain data
47
47
NetpGetNCData: Reading NC data
@@ -50,9 +50,9 @@ NetpGetDomainData: Lookup crossref data for: CN=Partitions,CN=Configuration,DC=c
50
50
NetpLdapGetLsaPrimaryDomain: result of retrieving domain data: 0x0
51
51
NetpCheckForDomainSIDCollision: returning 0x0(0).
52
52
NetpGetComputerObjectDn: Cracking DNS domain name contoso.com/ into Netbios on \\ContosoDC1.contoso.com
53
-
NetpGetComputerObjectDn: Crack results: name = CONTOSO\
53
+
NetpGetComputerObjectDn: Crack results: name = CONTOSO\
54
54
NetpGetComputerObjectDn: Cracking account name CONTOSO\HOST1$ on \\ContosoDC1.contoso.com
NetpGetADObjectOwnerAttributes: Looking up attributes for machine account: CN=HOST1,CN=Computers,DC=contoso,DC=com
57
57
NetpGetNCData: Reading NC data
58
58
NetpReadAccountReuseModeFromAD: Searching '<WKGUID=AB1D30F3768811D1ADED00C04FD8D5CD,DC=contoso,DC=com>' for '(&(ObjectClass=ServiceConnectionPoint)(KeyWords=NetJoin*))'.
@@ -91,7 +91,7 @@ NetpDoDomainJoin: status: 0xaac
91
91
92
92
## Cause
93
93
94
-
Windows introduced extra protections with updates released on and after October 11, 2022. These protections intentionally prevent domain join operations from reusing an existing computer account in the target domain unless the following specific conditions are met:
94
+
Windows introduced extra protections with updates released on and after October 11, 2022. These protections intentionally prevent domain join operations from reusing an existing computer account in the target domain unless any of the following conditions is met:
95
95
96
96
- The user attempting the operation is the creator of the existing account.
97
97
- The computer was created by a member of domain administrators, enterprise administrators, or built-in administrators groups.
0 commit comments