You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Delta AD Group Discovery skips the membership discovery for a group scope in child OU of other group scope
3
3
description: Troubleshoot an issue when AD Delta Discovery fails to detect group membership change.
4
-
ms.date: 01/06/2026
4
+
ms.date: 01/12/2026
5
5
ms.reviewer: kaushika, jarrettr, brianhun, payur
6
6
ms.custom: sap:Boundary Groups, Discovery and Collections\Active Directory Discovery (all types)
7
7
---
@@ -17,120 +17,64 @@ You set up an Active Directory Group Discovery to target specific AD Groups as d
17
17
18
18
You notice that AD Group Delta Discovery fails to catch the changes in certain group membership. At the same time, forcing a Full Discovery cycle resolves the issue.
19
19
20
-
In particular, this happens when the following conditions are met:
20
+
In particular, the issue happens when the following conditions are met:
21
21
22
22
- Scope A: Group A located in organizational unit OU-A
23
23
- Scope B: Group B located in organizational unit OU-B
24
-
- OU-B is located under OU-A (being, then, a child OU)
24
+
- OU-B is located under OU-A (being, hence, a child OU)
25
25
26
-
If all above conditions are met, changes in Group B's membership are not detected by AD Group Delta Discovery.
26
+
If all above conditions are met, changes in Group B's membership aren't detected by AD Group Delta Discovery.
27
27
28
28
## Cause
29
29
30
30
During AD Group Delta Discovery, Configuration Manager detects the organizational units (OUs) of the target groups in discovery scopes and builds a tree structure of OUs. It ignores the child OUs of the target groups' OUs.
31
31
32
-
## Resolution
33
-
34
-
This issue is fixed in [Configuration Manager current branch, version 2203](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2203).
35
-
36
-
If the issue still occurs after upgrading to version 2203 and later versions, make sure that you meet the requirements for establishing the Kerberos connection from the site server to the domain controllers of the target domain. For example:
32
+
AD Group Full Discovery follows different algorithm that doesn't ignore child OUs, so it works as expected.
37
33
38
-
- TCP traffic on port 88 (Kerberos) is allowed.
39
-
- TCP and UDP traffic on port 389 (LDAP and CLDAP) is allowed.
40
-
- The site server can resolve service location (SRV) records for Kerberos services. For example:
41
-
42
-
```output
43
-
_kerberos._tcp.contoso.com
44
-
_kerberos._udp.contoso.com
45
-
_kerberos._tcp.dc._msdcs.contoso.com
46
-
```
47
-
48
-
## Workaround
34
+
## Resolution
49
35
50
-
To work around this issue, change collection rules to include both the NetBIOS domain name and the DNS domain name. For example:
36
+
Microsoft is aware of this issue, however as per January 2026 there's no ETA or even commitment to fix it. To work around this issue, you can either:
51
37
52
-
`select * from SMS_R_System where SMS_R_System.SystemGroupName in ("AAA\\Group1","BBB\\Group1")`
38
+
- Move the Group B to another OU that isn't a child of OU-A (or any other OU in the discovery scopes).
39
+
- Include OU-B in the discovery scopes as Organizational Unit.
40
+
- Fall back to Full AD Group Discovery.
53
41
54
42
## Identify the issue
55
43
56
44
Here are the steps to check logs and identify the issue:
57
45
58
-
1. Increase the size of the _ADSgDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory group discovery. Under the following registry key, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`).
1. Enable verbose logging for the _ADSgDis.log_ file. Under the following registry key, change the `Verbose Logs` registry value to `1` (the default value is `0`).
1. Check the Windows system event logs of the time-correlated event ID 40970 as follows. You'll find the domain controller of the Service Principal Name (SPN) and the realm are from different domains. This event may not occur if the Kerberos authentication attempt is cached.
88
-
89
-
```output
90
-
The Security System has detected a downgrade attempt when contacting the 3-part SPN LDAP/DC.contoso.local/fourthcoffee.LOCAL
91
-
with error code "The SAM database on the Windows Server does not have a computer account for this workstation trust relationship. (0xc000018b)".
92
-
Authentication was denied.
93
-
```
94
-
95
-
1. If so, you've identified the issue successfully.
96
-
97
-
## Additional information
98
-
99
-
This issue can also occur if the **Discover objects within Active Directory groups** option is enabled in System or User Discovery scope settings. In this case, here are the steps to check logs and identify the issue. You can also temporarily disable the option for the discovery scopes in which you have groups with members from other domains.
100
-
101
-
1. Increase the size of the _ADSysDis.log_ or _ADUsrDis.log_ file to 100 megabytes (MB) or more to accommodate a full Active Directory system or user discovery. Under one of the following registry keys, change the `MaxFileSize` registry value to `104857600` (the default value is `2621440`).
1. Enable verbose logging for the _ADSysDis.log_ or _ADUsrDis.log_ file. Under one of the following registry keys, change the `Verbose Logs` registry value to `1` (the default value is `0`).
46
+
1. Create the list of scopes by checking the beginning of any discovery cycle in ADSGDis.log. Verify the LDAP Paths: in particular, validate that the affected group is in child OU of another one in the list.
1. Find any Delta Discovery cycle in the log. Look for the following line and filter by the thread writing it.
112
54
113
-
1. Run a full Active Directory system or user discovery and make sure the following message is logged in the _ADSysDis.log_ or _ADUsrDis.log_ file upon completion.
INFO: Processing discovered group object with ADsPath = 'LDAP://DC1.CONTOSO.COM/CN=GROUP1,OU=OU,DC=CONTOSO,DC=COM'~
125
-
VERBOSE: group not found in discovered group list~
126
-
VERBOSE: Bound to group.~
127
-
VERBOSE: group has 3 members~
128
-
...
129
-
VERBOSE: full ADs path of member: LDAP://DC2.fourthcoffee.com/CN=Machine1,OU=US,DC=fourthcoffee,DC=com~
130
-
...
131
-
VERBOSE: Could not get Domain Name using DsCrackNames, will parse ADs Path to get it
132
-
VERBOSE: domain = 'FourthCoffee' full domain name = 'fourthcoffee.com'
133
-
INFO: DDR was written for system 'Machine1' - C:\ConfigMgr\inboxes\auth\ddm.box\adsqznjr.DDR at <Date Time>.~
134
-
```
75
+
1. If you see this error message for the OU-B, you successfully identified the issue:
135
76
136
-
1. If so, you've identified the issue successfully.
77
+
```output
78
+
INFO: Found invalid Search Path: LDAP://OU=OU-B,OU=OU-A,DC=FOURTHCOFFEE,DC=COM. Probably it's sub search path of other search path and will be covered by them.
79
+
INFO: -------- Finished to process search scope (Immediate search base) --------
0 commit comments