You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/domain-join-log-analysis.md
+20-22Lines changed: 20 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Domain join log analysis
2
+
title: Domain Join Log Analysis
3
3
description: Provides a detailed guide on what occurs on a client computer during a domain join operation.
4
4
ms.date: 06/04/2025
5
5
manager: dcscontentpm
@@ -12,15 +12,15 @@ ms.custom:
12
12
---
13
13
# Domain join log analysis
14
14
15
-
This article provides a detailed guide on what occurs on a client computer when joining an Active Directory (AD) domain. The article includes a sample of successful Netsetup.log, a breakdown of the network traffic during the AD domain join operation, and explanations of the various types of traffic involved.
15
+
This article provides a detailed guide on what occurs on a client computer when joining an Active Directory (AD) domain. The article includes a successful `Netsetup.log` sample, a breakdown of the network traffic during the AD domain join operation, and explanations of the various types of traffic involved.
16
16
17
-
To troubleshoot domain join failures, we can compare the logs of the failure scenario and successful scenario to identify the cause. Logs needed for troubleshooting include `Netsetup.log`, which is located at `%windir%\debug` folder and enabled by default, and network trace collected from the client computer.
17
+
To troubleshoot domain join failures, you can compare the logs of the failed and successful scenarios to identify the cause. Logs needed for troubleshooting include `Netsetup.log`, which is located in the `%windir%\debug` folder and enabled by default, and network traces collected from the client computer.
18
18
19
-
## Sample of a successful Netsetup.log
19
+
## Sample of a successful Netsetup.log file
20
20
21
-
The following sample is the typical `Netsetup.log` covering a successful AD domain join to the domain named *contoso.local*, collected from a Windows 10 24H2 virtual machine (VM) named *PC8*.
21
+
The following sample is a typical `Netsetup.log`file covering a successful AD domain join to a domain named *contoso.local*, collected from a Windows 10 24H2 virtual machine (VM) named *PC8*.
22
22
23
-
See lines starting with **//** for explanations.
23
+
See the lines starting with **//** for explanations.
@@ -268,7 +268,7 @@ mm/dd/yyyy HH:MM:SS:DDD NetpChangeMachineName: SetComputerNameEx() returned 0x1
268
268
269
269
## Network traces
270
270
271
-
Network traces are helpful in pinpointing AD domain join issues. During an AD domain join operation, multiple types of traffic occur between the client and some Domain Name System (DNS) server, and then between the client and some DCs. The following sections discuss each type of traffic.
271
+
Network traces are helpful in pinpointing AD domain join issues. During an AD domain join operation, multiple types of traffic occur between the client and some Domain Name System (DNS) servers, and then between the client and some domain controllers (DCs). The following sections discuss each type of traffic.
272
272
273
273
> [!NOTE]
274
274
>
@@ -282,7 +282,7 @@ In these network traces, the IP addresses represent the following roles:
282
282
283
283
### DNS
284
284
285
-
The client queries the DNS SRV record to locate the DCs of the domainto join. In the following example, the client manages to locate two DCs.
285
+
The client queries the DNS SRV record to locate the domain's DCs to join. In the following example, the client successfully locates two DCs.
286
286
287
287
```output
288
288
Source Destination Protocol Info
@@ -314,15 +314,15 @@ Domain Name System (response)
314
314
315
315
### LDAP ping
316
316
317
-
Then the client picks up one of the DCs and uses Lightweight Directory Access Protocol (LDAP) ping over UDP port 389 to detect the functionalities of that DC.
317
+
Then, the client picks up one of the DCs and uses Lightweight Directory Access Protocol (LDAP) ping over UDP port 389 to detect the functionalities of that DC.
During AD domain join, Server Message Block (SMB) traffic is employed for Microsoft Remote Procedure Call (MSRPC)based communication.
376
+
During AD domain join, Server Message Block (SMB) traffic is employed for Microsoft Remote Procedure Call (MSRPC)-based communication.
377
377
378
378
```output
379
379
Source Destination Protocol Info
@@ -411,10 +411,10 @@ Source Destination Protocol Info
411
411
412
412
### LDAP
413
413
414
-
LDAP traffic is used during domain join activity as well. Except for the leading LDAP search, which is for RootDSE and then the binding (authentication), the remaining LDAP traffic is encrypted. Therefore, you can't read the content in network trace.
414
+
LDAP traffic is also used during the domain join activity. Except for the leading LDAP searchfor RootDSE and then the binding (authentication), the remaining LDAP traffic is encrypted. Therefore, you can't read the content in the network trace.
415
415
416
416
> [!NOTE]
417
-
> By default, NTLM payload is encrypted since Windows Server 2003. For Kerberos authenticated sessions, the caller can decide whether to request encryption or not. Other factors such as OS version and security policy configuration on both sides also matter.
417
+
> Since Windows Server 2003, NTLM payloads have been encrypted by default. For Kerberos authenticated sessions, the caller can decide whether to request encryption. Other factors, such as the OS version and security policy configuration on both sides, also matter.
418
418
419
419
```output
420
420
Source Destination Protocol Info
@@ -451,10 +451,10 @@ Source Destination Protocol Info
451
451
452
452
### RPC
453
453
454
-
Remote Procedure Call (RPC) traffic starts from TCP 135 port. The client binds to the RPC Endpoint Mapper (EPMAP) service at TCP 135 port, queries the actual port of Directory Replication Service Remote (DRSR) and the NetLogon services, and then connects those two services.
454
+
Remote Procedure Call (RPC) traffic starts from TCP port 135. The client binds to the RPC Endpoint Mapper (EPMAP) service on TCP port 135, queries the actual ports of the Directory Replication Service Remote (DRSR) and NetLogon services, and then connects those two services.
455
455
456
456
> [!NOTE]
457
-
> By default, EPMAP traffic doesn't requires authentication. Therefore, we don't recommend enabling EPMAP traffic. Traffic of the DRSR and NETLOGON services requires authentication.
457
+
> By default, EPMAP traffic doesn't require authentication. Therefore, we don't recommend enabling EPMAP traffic. However, traffic of the DRSR and NETLOGON services requires authentication.
458
458
459
459
#### EPMAP traffic
460
460
@@ -555,9 +555,9 @@ Source Destination Protocol Info
555
555
556
556
### Kerberos
557
557
558
-
Kerberos traffic is also used during domain join operation, because all the types of network traffic mentioned in the previous sections, including SMB, LDAP, and RPC, require authentication.
558
+
Kerberos traffic is also used during domain join operation because all the types of network traffic mentioned in the previous sections, including SMB, LDAP, and RPC, require authentication.
559
559
560
-
For example, in the following network trace, the client gets a Kerberos TGT for the user account **CONTOSO\puser2** and the service ticket for the target SPN **cifs/DC2.contoso.local**. Then, the client sets up the SMB session to the DC **DC2.contoso.local** with that service ticket.
560
+
For example, in the following network trace, the client gets a Kerberos TGT for the user account `CONTOSO\puser2` and a service ticket for the target SPN `cifs/DC2.contoso.local`. Then, the client sets up an SMB session to the DC `DC2.contoso.local` with that service ticket.
> Depending on the format of the user credential provided for the domain join operation (For example, [email protected] or contoso\puser2 or contoso.local\puser2), you might see different Kerberos traffic.
631
+
> Depending on the format of the user credentials provided for the domain join operation (for example, [email protected], contoso\puser2, or contoso.local\puser2), you might see different Kerberos traffic.
632
632
633
633
#### About NTLM
634
634
635
-
Even if you don't see any Kerberos traffic, it doesn't necessarily mean the domain join operation must fail. This is because when Kerberos can't work under some scenarios, NT LAN Manager (NTLM) is used as the fallback. As long as nothing is preventing NTLM from working properly such as incompatible LMCompatibilityLevel or blocked NTLM authentication in Group Policy, domain join still completes successfully with NTLM.
635
+
Even if you don't see any Kerberos traffic, it doesn't necessarily mean the domain join operation must fail. This is because when Kerberos doesn't work under some scenarios, NT LAN Manager (NTLM) is used as a fallback. If nothing prevents NTLM from working properly, such as incompatible LMCompatibilityLevel or blocked NTLM authentication in Group Policy, the domain join still completes successfully with NTLM.
636
636
637
-
See the following example of successful SMB session setup using NTLM authentication.
637
+
See the following example of a successful SMB session setup using NTLM authentication.
0 commit comments