Skip to content

Commit 5fec5fc

Browse files
author
Pavel Yurenev
committed
Identify the issue section
1 parent 3bee8ba commit 5fec5fc

1 file changed

Lines changed: 36 additions & 92 deletions

File tree

Lines changed: 36 additions & 92 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Delta AD Group Discovery skips the membership discovery for a group scope in child OU of other group scope
33
description: Troubleshoot an issue when AD Delta Discovery fails to detect group membership change.
4-
ms.date: 01/06/2026
4+
ms.date: 01/12/2026
55
ms.reviewer: kaushika, jarrettr, brianhun, payur
66
ms.custom: sap:Boundary Groups, Discovery and Collections\Active Directory Discovery (all types)
77
---
@@ -17,120 +17,64 @@ You set up an Active Directory Group Discovery to target specific AD Groups as d
1717

1818
You notice that AD Group Delta Discovery fails to catch the changes in certain group membership. At the same time, forcing a Full Discovery cycle resolves the issue.
1919

20-
In particular, this happens when the following conditions are met:
20+
In particular, the issue happens when the following conditions are met:
2121

2222
- Scope A: Group A located in organizational unit OU-A
2323
- Scope B: Group B located in organizational unit OU-B
24-
- OU-B is located under OU-A (being, then, a child OU)
24+
- OU-B is located under OU-A (being, hence, a child OU)
2525

26-
If all above conditions are met, changes in Group B's membership are not detected by AD Group Delta Discovery.
26+
If all above conditions are met, changes in Group B's membership aren't detected by AD Group Delta Discovery.
2727

2828
## Cause
2929

3030
During AD Group Delta Discovery, Configuration Manager detects the organizational units (OUs) of the target groups in discovery scopes and builds a tree structure of OUs. It ignores the child OUs of the target groups' OUs.
3131

32-
## Resolution
33-
34-
This issue is fixed in [Configuration Manager current branch, version 2203](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2203).
35-
36-
If the issue still occurs after upgrading to version 2203 and later versions, make sure that you meet the requirements for establishing the Kerberos connection from the site server to the domain controllers of the target domain. For example:
32+
AD Group Full Discovery follows different algorithm that doesn't ignore child OUs, so it works as expected.
3733

38-
- TCP traffic on port 88 (Kerberos) is allowed.
39-
- TCP and UDP traffic on port 389 (LDAP and CLDAP) is allowed.
40-
- The site server can resolve service location (SRV) records for Kerberos services. For example:
41-
42-
```output
43-
_kerberos._tcp.contoso.com
44-
_kerberos._udp.contoso.com
45-
_kerberos._tcp.dc._msdcs.contoso.com
46-
```
47-
48-
## Workaround
34+
## Resolution
4935

50-
To work around this issue, change collection rules to include both the NetBIOS domain name and the DNS domain name. For example:
36+
Microsoft is aware of this issue, however as per January 2026 there's no ETA or even commitment to fix it. To work around this issue, you can either:
5137

52-
`select * from SMS_R_System where SMS_R_System.SystemGroupName in ("AAA\\Group1","BBB\\Group1")`
38+
- Move the Group B to another OU that isn't a child of OU-A (or any other OU in the discovery scopes).
39+
- Include OU-B in the discovery scopes as Organizational Unit.
40+
- Fall back to Full AD Group Discovery.
5341

5442
## Identify the issue
5543

5644
Here are the steps to check logs and identify the issue:
5745

58-
1. Increase the size of the _ADSgDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory group discovery. Under the following registry key, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`).
59-
60-
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_SECURITY_GROUP_DISCOVERY_AGENT`
61-
62-
1. Enable verbose logging for the _ADSgDis.log_ file. Under the following registry key, change the `Verbose Logs` registry value to `1` (the default value is `0`).
63-
64-
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_SECURITY_GROUP_DISCOVERY_AGENT`
65-
66-
1. Run a full Active Directory group discovery and make sure the following message is logged in the _ADSgDis.log_ file upon completion.
67-
68-
`INFO: Succeeded running full sync stored procedure`
69-
70-
1. Filter by the thread ID that logged the above message and find the following message in the filtered logs.
71-
72-
`VERBOSE : Could not get Domain Name using DSCrackNames, will parse ADs Path to get it`
73-
74-
1. Check the following lines around. You'll find a group and its member are from different domains.
75-
76-
```output
77-
INFO: DDR was written for group 'contoso\ParentGroup' - C:\ConfigMgr\inboxes\auth\ddm.box\userddrsonly\asg1607o.DDR at <Date Time>.~
78-
VERBOSE: group has 1 members~
79-
...
80-
VERBOSE: Domain controller name for the SID is: \\DC.fourthcoffee.local
81-
VERBOSE: full ADs path of member: LDAP://DC.fourthcoffee.local/CN=ChildGroup,CN=Users,DC=fourthcoffee,DC=local~
82-
...
83-
VERBOSE: Could not get Domain Name using DSCrackNames, will parse ADs Path to get it
84-
VERBOSE: ParentGroup: "contoso\ParentGroup" ChildGroup: "fourthcoffee\ChildGroup"
85-
```
86-
87-
1. Check the Windows system event logs of the time-correlated event ID 40970 as follows. You'll find the domain controller of the Service Principal Name (SPN) and the realm are from different domains. This event may not occur if the Kerberos authentication attempt is cached.
88-
89-
```output
90-
The Security System has detected a downgrade attempt when contacting the 3-part SPN LDAP/DC.contoso.local/fourthcoffee.LOCAL
91-
with error code "The SAM database on the Windows Server does not have a computer account for this workstation trust relationship. (0xc000018b)".
92-
Authentication was denied.
93-
```
94-
95-
1. If so, you've identified the issue successfully.
96-
97-
## Additional information
98-
99-
This issue can also occur if the **Discover objects within Active Directory groups** option is enabled in System or User Discovery scope settings. In this case, here are the steps to check logs and identify the issue. You can also temporarily disable the option for the discovery scopes in which you have groups with members from other domains.
100-
101-
1. Increase the size of the _ADSysDis.log_ or _ADUsrDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory system or user discovery. Under one of the following registry keys, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`).
102-
103-
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_SYSTEM_DISCOVERY_AGENT`
104-
105-
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\SMS_AD_USER_DISCOVERY_AGENT`
106-
107-
1. Enable verbose logging for the _ADSysDis.log_ or _ADUsrDis.log_ file. Under one of the following registry keys, change the `Verbose Logs` registry value to `1` (the default value is `0`).
46+
1. Create the list of scopes by checking the beginning of any discovery cycle in ADSGDis.log. Verify the LDAP Paths: in particular, validate that the affected group is in child OU of another one in the list.
10847

109-
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_SYSTEM_DISCOVERY_AGENT`
48+
```output
49+
!!!!Valid Search Scope Name: Unaffected Group Search Path: LDAP://CN=GROUP-A,OU=OU-A,DC=FOURTHCOFFEE,DC=COM IsValidPath: TRUE
50+
!!!!Valid Search Scope Name: Affected Group Search Path: LDAP://CN=GROUP-B,OU=OU-B,OU=OU-A,DC=FOURTHCOFFEE,DC=COM IsValidPath: TRUE
51+
```
11052

111-
- `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\COMPONENTS\SMS_AD_USER_DISCOVERY_AGENT`
53+
1. Find any Delta Discovery cycle in the log. Look for the following line and filter by the thread writing it.
11254

113-
1. Run a full Active Directory system or user discovery and make sure the following message is logged in the _ADSysDis.log_ or _ADUsrDis.log_ file upon completion.
55+
```output
56+
INFO: CADSource::incrementalSync returning 0x00000000~
57+
```
11458

115-
`INFO: CADSource::fullSync returning 0x00000000~`
59+
1. First, Delta Discovery goes through the list of scopes:
11660

117-
1. Filter by the thread ID that logged the above message and find the following message in the filtered logs.
61+
```output
62+
INFO: -------- Starting to process search scope (Unaffected Group) --------
63+
INFO: -------- Finished to process search scope (Unaffected Group) --------
64+
INFO: -------- Starting to process search scope (Affected Group) --------
65+
INFO: -------- Finished to process search scope (Affected Group) --------
66+
```
11867

119-
`VERBOSE : Could not get Domain Name using DSCrackNames, will parse ADs Path to get it`
68+
1. The Delta Discovery proceeds to "immediate search base" then:
12069

121-
1. Check the following lines around. You'll find a group and its member are from different domains.
70+
```output
71+
INFO: -------- Starting to process search scope (Immediate search base) --------
72+
INFO: Processing search path: 'LDAP://OU=OU-A,DC=FOURTHCOFFEE,DC=COM'.~
73+
```
12274

123-
```output
124-
INFO: Processing discovered group object with ADsPath = 'LDAP://DC1.CONTOSO.COM/CN=GROUP1,OU=OU,DC=CONTOSO,DC=COM'~
125-
VERBOSE: group not found in discovered group list~
126-
VERBOSE: Bound to group.~
127-
VERBOSE: group has 3 members~
128-
...
129-
VERBOSE: full ADs path of member: LDAP://DC2.fourthcoffee.com/CN=Machine1,OU=US,DC=fourthcoffee,DC=com~
130-
...
131-
VERBOSE: Could not get Domain Name using DsCrackNames, will parse ADs Path to get it
132-
VERBOSE: domain = 'FourthCoffee' full domain name = 'fourthcoffee.com'
133-
INFO: DDR was written for system 'Machine1' - C:\ConfigMgr\inboxes\auth\ddm.box\adsqznjr.DDR at <Date Time>.~
134-
```
75+
1. If you see this error message for the OU-B, you successfully identified the issue:
13576

136-
1. If so, you've identified the issue successfully.
77+
```output
78+
INFO: Found invalid Search Path: LDAP://OU=OU-B,OU=OU-A,DC=FOURTHCOFFEE,DC=COM. Probably it's sub search path of other search path and will be covered by them.
79+
INFO: -------- Finished to process search scope (Immediate search base) --------
80+
```

0 commit comments

Comments
 (0)