|
| 1 | +--- |
| 2 | +title: Delta AD Group Discovery skips the membership discovery for a group scope in child OU of other group scope |
| 3 | +description: Troubleshoot an issue when AD Delta Discovery fails to detect group membership change. |
| 4 | +ms.date: 01/06/2026 |
| 5 | +ms.reviewer: kaushika, jarrettr, brianhun, payur |
| 6 | +ms.custom: sap:Boundary Groups, Discovery and Collections\Active Directory Discovery (all types) |
| 7 | +--- |
| 8 | +# Delta AD Group Discovery skips detecting the membership change for a group scope in child OU of other group in discovery scopes |
| 9 | + |
| 10 | +This article describes how to identify and resolve an issue in which Active Directory Group Discovery fails to detect group membership changes. |
| 11 | + |
| 12 | +_Applies to:_ Configuration Manager (current branch) |
| 13 | + |
| 14 | +## Symptoms |
| 15 | + |
| 16 | +You set up an Active Directory Group Discovery to target specific AD Groups as discovery scopes as per [Configure Active Directory Group Discovery](https://learn.microsoft.com/en-us/intune/configmgr/core/servers/deploy/configure/configure-discovery-methods#bkmk_config-adgd). |
| 17 | + |
| 18 | +You notice that AD Group Delta Discovery fails to catch the changes in certain group membership. At the same time, forcing a Full Discovery cycle resolves the issue. |
| 19 | + |
| 20 | +In particular, this happens when the following conditions are met: |
| 21 | + |
| 22 | +- Scope A: Group A located in organizational unit OU-A |
| 23 | +- Scope B: Group B located in organizational unit OU-B |
| 24 | +- OU-B is located under OU-A (being, then, a child OU) |
| 25 | + |
| 26 | +If all above conditions are met, changes in Group B's membership are not detected by AD Group Delta Discovery. |
| 27 | + |
| 28 | +## Cause |
| 29 | + |
| 30 | +During AD Group Delta Discovery, Configuration Manager detects the organizational units (OUs) of the target groups in discovery scopes and builds a tree structure of OUs. It ignores the child OUs of the target groups' OUs. |
| 31 | + |
| 32 | +## Resolution |
| 33 | + |
| 34 | +This issue is fixed in [Configuration Manager current branch, version 2203](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2203). |
| 35 | + |
| 36 | +If the issue still occurs after upgrading to version 2203 and later versions, make sure that you meet the requirements for establishing the Kerberos connection from the site server to the domain controllers of the target domain. For example: |
| 37 | + |
| 38 | +- TCP traffic on port 88 (Kerberos) is allowed. |
| 39 | +- TCP and UDP traffic on port 389 (LDAP and CLDAP) is allowed. |
| 40 | +- The site server can resolve service location (SRV) records for Kerberos services. For example: |
| 41 | + |
| 42 | + ```output |
| 43 | + _kerberos._tcp.contoso.com |
| 44 | + _kerberos._udp.contoso.com |
| 45 | + _kerberos._tcp.dc._msdcs.contoso.com |
| 46 | + ``` |
| 47 | +
|
| 48 | +## Workaround |
| 49 | +
|
| 50 | +To work around this issue, change collection rules to include both the NetBIOS domain name and the DNS domain name. For example: |
| 51 | +
|
| 52 | +`select * from SMS_R_System where SMS_R_System.SystemGroupName in ("AAA\\Group1","BBB\\Group1")` |
| 53 | +
|
| 54 | +## Identify the issue |
| 55 | +
|
| 56 | +Here are the steps to check logs and identify the issue: |
| 57 | +
|
| 58 | +1. Increase the size of the _ADSgDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory group discovery. Under the following registry key, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`). |
| 59 | +
|
| 60 | + `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_SECURITY_GROUP_DISCOVERY_AGENT` |
| 61 | +
|
| 62 | +1. Enable verbose logging for the _ADSgDis.log_ file. Under the following registry key, change the `Verbose Logs` registry value to `1` (the default value is `0`). |
| 63 | +
|
| 64 | + `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_SECURITY_GROUP_DISCOVERY_AGENT` |
| 65 | +
|
| 66 | +1. Run a full Active Directory group discovery and make sure the following message is logged in the _ADSgDis.log_ file upon completion. |
| 67 | +
|
| 68 | + `INFO: Succeeded running full sync stored procedure` |
| 69 | +
|
| 70 | +1. Filter by the thread ID that logged the above message and find the following message in the filtered logs. |
| 71 | +
|
| 72 | + `VERBOSE : Could not get Domain Name using DSCrackNames, will parse ADs Path to get it` |
| 73 | +
|
| 74 | +1. Check the following lines around. You'll find a group and its member are from different domains. |
| 75 | +
|
| 76 | + ```output |
| 77 | + INFO: DDR was written for group 'contoso\ParentGroup' - C:\ConfigMgr\inboxes\auth\ddm.box\userddrsonly\asg1607o.DDR at <Date Time>.~ |
| 78 | + VERBOSE: group has 1 members~ |
| 79 | + ... |
| 80 | + VERBOSE: Domain controller name for the SID is: \\DC.fourthcoffee.local |
| 81 | + VERBOSE: full ADs path of member: LDAP://DC.fourthcoffee.local/CN=ChildGroup,CN=Users,DC=fourthcoffee,DC=local~ |
| 82 | + ... |
| 83 | + VERBOSE: Could not get Domain Name using DSCrackNames, will parse ADs Path to get it |
| 84 | + VERBOSE: ParentGroup: "contoso\ParentGroup" ChildGroup: "fourthcoffee\ChildGroup" |
| 85 | + ``` |
| 86 | + |
| 87 | +1. Check the Windows system event logs of the time-correlated event ID 40970 as follows. You'll find the domain controller of the Service Principal Name (SPN) and the realm are from different domains. This event may not occur if the Kerberos authentication attempt is cached. |
| 88 | + |
| 89 | + ```output |
| 90 | + The Security System has detected a downgrade attempt when contacting the 3-part SPN LDAP/DC.contoso.local/fourthcoffee.LOCAL |
| 91 | + with error code "The SAM database on the Windows Server does not have a computer account for this workstation trust relationship. (0xc000018b)". |
| 92 | + Authentication was denied. |
| 93 | + ``` |
| 94 | + |
| 95 | +1. If so, you've identified the issue successfully. |
| 96 | + |
| 97 | +## Additional information |
| 98 | + |
| 99 | +This issue can also occur if the **Discover objects within Active Directory groups** option is enabled in System or User Discovery scope settings. In this case, here are the steps to check logs and identify the issue. You can also temporarily disable the option for the discovery scopes in which you have groups with members from other domains. |
| 100 | + |
| 101 | +1. Increase the size of the _ADSysDis.log_ or _ADUsrDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory system or user discovery. Under one of the following registry keys, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`). |
| 102 | + |
| 103 | + - `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_SYSTEM_DISCOVERY_AGENT` |
| 104 | + |
| 105 | + - `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_USER_DISCOVERY_AGENT` |
| 106 | + |
| 107 | +1. Enable verbose logging for the _ADSysDis.log_ or _ADUsrDis.log_ file. Under one of the following registry keys, change the `Verbose Logs` registry value to `1` (the default value is `0`). |
| 108 | + |
| 109 | + - `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_SYSTEM_DISCOVERY_AGENT` |
| 110 | + |
| 111 | + - `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_USER_DISCOVERY_AGENT` |
| 112 | + |
| 113 | +1. Run a full Active Directory system or user discovery and make sure the following message is logged in the _ADSysDis.log_ or _ADUsrDis.log_ file upon completion. |
| 114 | + |
| 115 | + `INFO: CADSource::fullSync returning 0x00000000~` |
| 116 | + |
| 117 | +1. Filter by the thread ID that logged the above message and find the following message in the filtered logs. |
| 118 | + |
| 119 | + `VERBOSE : Could not get Domain Name using DSCrackNames, will parse ADs Path to get it` |
| 120 | + |
| 121 | +1. Check the following lines around. You'll find a group and its member are from different domains. |
| 122 | + |
| 123 | + ```output |
| 124 | + INFO: Processing discovered group object with ADsPath = 'LDAP://DC1.CONTOSO.COM/CN=GROUP1,OU=OU,DC=CONTOSO,DC=COM'~ |
| 125 | + VERBOSE: group not found in discovered group list~ |
| 126 | + VERBOSE: Bound to group.~ |
| 127 | + VERBOSE: group has 3 members~ |
| 128 | + ... |
| 129 | + VERBOSE: full ADs path of member: LDAP://DC2.fourthcoffee.com/CN=Machine1,OU=US,DC=fourthcoffee,DC=com~ |
| 130 | + ... |
| 131 | + VERBOSE: Could not get Domain Name using DsCrackNames, will parse ADs Path to get it |
| 132 | + VERBOSE: domain = 'FourthCoffee' full domain name = 'fourthcoffee.com' |
| 133 | + INFO: DDR was written for system 'Machine1' - C:\ConfigMgr\inboxes\auth\ddm.box\adsqznjr.DDR at <Date Time>.~ |
| 134 | + ``` |
| 135 | + |
| 136 | +1. If so, you've identified the issue successfully. |
0 commit comments