Skip to content

Commit 3bee8ba

Browse files
author
Pavel Yurenev
committed
INitial commit
1 parent 18550ca commit 3bee8ba

1 file changed

Lines changed: 136 additions & 0 deletions

File tree

Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
---
2+
title: Delta AD Group Discovery skips the membership discovery for a group scope in child OU of other group scope
3+
description: Troubleshoot an issue when AD Delta Discovery fails to detect group membership change.
4+
ms.date: 01/06/2026
5+
ms.reviewer: kaushika, jarrettr, brianhun, payur
6+
ms.custom: sap:Boundary Groups, Discovery and Collections\Active Directory Discovery (all types)
7+
---
8+
# Delta AD Group Discovery skips detecting the membership change for a group scope in child OU of other group in discovery scopes
9+
10+
This article describes how to identify and resolve an issue in which Active Directory Group Discovery fails to detect group membership changes.
11+
12+
_Applies to:_   Configuration Manager (current branch)
13+
14+
## Symptoms
15+
16+
You set up an Active Directory Group Discovery to target specific AD Groups as discovery scopes as per [Configure Active Directory Group Discovery](https://learn.microsoft.com/en-us/intune/configmgr/core/servers/deploy/configure/configure-discovery-methods#bkmk_config-adgd).
17+
18+
You notice that AD Group Delta Discovery fails to catch the changes in certain group membership. At the same time, forcing a Full Discovery cycle resolves the issue.
19+
20+
In particular, this happens when the following conditions are met:
21+
22+
- Scope A: Group A located in organizational unit OU-A
23+
- Scope B: Group B located in organizational unit OU-B
24+
- OU-B is located under OU-A (being, then, a child OU)
25+
26+
If all above conditions are met, changes in Group B's membership are not detected by AD Group Delta Discovery.
27+
28+
## Cause
29+
30+
During AD Group Delta Discovery, Configuration Manager detects the organizational units (OUs) of the target groups in discovery scopes and builds a tree structure of OUs. It ignores the child OUs of the target groups' OUs.
31+
32+
## Resolution
33+
34+
This issue is fixed in [Configuration Manager current branch, version 2203](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2203).
35+
36+
If the issue still occurs after upgrading to version 2203 and later versions, make sure that you meet the requirements for establishing the Kerberos connection from the site server to the domain controllers of the target domain. For example:
37+
38+
- TCP traffic on port 88 (Kerberos) is allowed.
39+
- TCP and UDP traffic on port 389 (LDAP and CLDAP) is allowed.
40+
- The site server can resolve service location (SRV) records for Kerberos services. For example:
41+
42+
```output
43+
_kerberos._tcp.contoso.com
44+
_kerberos._udp.contoso.com
45+
_kerberos._tcp.dc._msdcs.contoso.com
46+
```
47+
48+
## Workaround
49+
50+
To work around this issue, change collection rules to include both the NetBIOS domain name and the DNS domain name. For example:
51+
52+
`select * from SMS_R_System where SMS_R_System.SystemGroupName in ("AAA\\Group1","BBB\\Group1")`
53+
54+
## Identify the issue
55+
56+
Here are the steps to check logs and identify the issue:
57+
58+
1. Increase the size of the _ADSgDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory group discovery. Under the following registry key, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`).
59+
60+
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_SECURITY_GROUP_DISCOVERY_AGENT`
61+
62+
1. Enable verbose logging for the _ADSgDis.log_ file. Under the following registry key, change the `Verbose Logs` registry value to `1` (the default value is `0`).
63+
64+
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_SECURITY_GROUP_DISCOVERY_AGENT`
65+
66+
1. Run a full Active Directory group discovery and make sure the following message is logged in the _ADSgDis.log_ file upon completion.
67+
68+
`INFO: Succeeded running full sync stored procedure`
69+
70+
1. Filter by the thread ID that logged the above message and find the following message in the filtered logs.
71+
72+
`VERBOSE : Could not get Domain Name using DSCrackNames, will parse ADs Path to get it`
73+
74+
1. Check the following lines around. You'll find a group and its member are from different domains.
75+
76+
```output
77+
INFO: DDR was written for group 'contoso\ParentGroup' - C:\ConfigMgr\inboxes\auth\ddm.box\userddrsonly\asg1607o.DDR at <Date Time>.~
78+
VERBOSE: group has 1 members~
79+
...
80+
VERBOSE: Domain controller name for the SID is: \\DC.fourthcoffee.local
81+
VERBOSE: full ADs path of member: LDAP://DC.fourthcoffee.local/CN=ChildGroup,CN=Users,DC=fourthcoffee,DC=local~
82+
...
83+
VERBOSE: Could not get Domain Name using DSCrackNames, will parse ADs Path to get it
84+
VERBOSE: ParentGroup: "contoso\ParentGroup" ChildGroup: "fourthcoffee\ChildGroup"
85+
```
86+
87+
1. Check the Windows system event logs of the time-correlated event ID 40970 as follows. You'll find the domain controller of the Service Principal Name (SPN) and the realm are from different domains. This event may not occur if the Kerberos authentication attempt is cached.
88+
89+
```output
90+
The Security System has detected a downgrade attempt when contacting the 3-part SPN LDAP/DC.contoso.local/fourthcoffee.LOCAL
91+
with error code "The SAM database on the Windows Server does not have a computer account for this workstation trust relationship. (0xc000018b)".
92+
Authentication was denied.
93+
```
94+
95+
1. If so, you've identified the issue successfully.
96+
97+
## Additional information
98+
99+
This issue can also occur if the **Discover objects within Active Directory groups** option is enabled in System or User Discovery scope settings. In this case, here are the steps to check logs and identify the issue. You can also temporarily disable the option for the discovery scopes in which you have groups with members from other domains.
100+
101+
1. Increase the size of the _ADSysDis.log_ or _ADUsrDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory system or user discovery. Under one of the following registry keys, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`).
102+
103+
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_SYSTEM_DISCOVERY_AGENT`
104+
105+
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_USER_DISCOVERY_AGENT`
106+
107+
1. Enable verbose logging for the _ADSysDis.log_ or _ADUsrDis.log_ file. Under one of the following registry keys, change the `Verbose Logs` registry value to `1` (the default value is `0`).
108+
109+
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_SYSTEM_DISCOVERY_AGENT`
110+
111+
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_USER_DISCOVERY_AGENT`
112+
113+
1. Run a full Active Directory system or user discovery and make sure the following message is logged in the _ADSysDis.log_ or _ADUsrDis.log_ file upon completion.
114+
115+
`INFO: CADSource::fullSync returning 0x00000000~`
116+
117+
1. Filter by the thread ID that logged the above message and find the following message in the filtered logs.
118+
119+
`VERBOSE : Could not get Domain Name using DSCrackNames, will parse ADs Path to get it`
120+
121+
1. Check the following lines around. You'll find a group and its member are from different domains.
122+
123+
```output
124+
INFO: Processing discovered group object with ADsPath = 'LDAP://DC1.CONTOSO.COM/CN=GROUP1,OU=OU,DC=CONTOSO,DC=COM'~
125+
VERBOSE: group not found in discovered group list~
126+
VERBOSE: Bound to group.~
127+
VERBOSE: group has 3 members~
128+
...
129+
VERBOSE: full ADs path of member: LDAP://DC2.fourthcoffee.com/CN=Machine1,OU=US,DC=fourthcoffee,DC=com~
130+
...
131+
VERBOSE: Could not get Domain Name using DsCrackNames, will parse ADs Path to get it
132+
VERBOSE: domain = 'FourthCoffee' full domain name = 'fourthcoffee.com'
133+
INFO: DDR was written for system 'Machine1' - C:\ConfigMgr\inboxes\auth\ddm.box\adsqznjr.DDR at <Date Time>.~
134+
```
135+
136+
1. If so, you've identified the issue successfully.

0 commit comments

Comments
 (0)