Skip to content

Commit 8044637

Browse files
authored
Updates from editor
1 parent 6043242 commit 8044637

1 file changed

Lines changed: 9 additions & 9 deletions

File tree

support/windows-server/active-directory/error-0x5-access-denied-rename-computer.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Error 0x5 Access Denied When You Rename a Computer That Is Member of a Domain
3-
description: Helps resolve error 0x5 Access Denied when you rename a computer that is member of a domain.
4-
ms.date: 03/21/2025
2+
title: Error 0x5 Access Denied When You Rename a Computer That Is a Member of a Domain
3+
description: Helps resolve error 0x5 Access Denied when you rename a computer that is a member of a domain.
4+
ms.date: 03/25/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
@@ -12,7 +12,7 @@ ms.custom:
1212
---
1313
# Error 0x5 Access Denied when you rename a computer that is member of a domain
1414

15-
This article helps resolve error 0x5 **Access Denied** when you rename a computer that is member of a domain.
15+
This article helps resolve error 0x5 **Access Denied** when you rename a computer that is a member of a domain.
1616

1717
When you check the **NetSetup.log** file, you see the following entries:
1818

@@ -25,7 +25,7 @@ NetpGetLsaPrimaryDomain: status: 0x0
2525
NetpManageMachineAccountWithSid: status of NetUserSetInfo on '\\ADATUMDC01' for 'TESTNAME97$': 0x5 Access Denied
2626
```
2727

28-
`NetUserSetInfo` targets the domain controller (DC) Security Accounts Manager Server (SAM) server component, which uses the SAM Remote Procedure Call (RPC) function on Server Message Block (SMB) Named Pipes. Here is the complete TCP connection network traffic during the NetSetup failure event, which indicates the failure at a SAM connection:
28+
`NetUserSetInfo` targets the domain controller (DC) Security Accounts Manager Server (SAM) server component, which uses the SAM Remote Procedure Call (RPC) function on Server Message Block (SMB) Named Pipes. Here's the complete TCP connection network traffic during the NetSetup failure event, which indicates the failure at a SAM connection:
2929

3030
```output
3131
ADATUMDC01 10.101.56.150 TCP TCP: [Bad CheckSum]Flags=...A..S., SrcPort=Microsoft-DS(445), DstPort=59729, PayloadLen=0, Seq=347025249, Ack=2963325843, Win=8192 (Negotiated scale factor 0x8) = 8192
@@ -50,9 +50,9 @@ Remote SAM access control was introduced in Windows Server 2016 and Windows 10,
5050
|**Policy** |**Network access: Restrict clients allowed to make remote calls to SAM** |
5151
|**Registry value** |`HKLM\SYSTEM\CurrentControlSet\Control\Lsa\RestrictRemoteSam` |
5252

53-
Only security groups allowed to read for the Remote SAM Remote Procedure Call (RPC) access defined in the policy setting, can set up a SAM connection with the target machine.
53+
Only security groups allowed to read the Remote SAM Remote Procedure Call (RPC) access defined in the policy setting can set up a SAM connection with the target machine.
5454

55-
This policy setting isn't useful on DCs, because Active Directory objects have their own access control settings, which isn't available for domain members or stand-alone machines with the SAM database.
55+
This policy setting isn't useful on DCs because Active Directory objects have their own access control settings, which aren't available for domain members or stand-alone machines with the SAM database.
5656

5757
DCs might have the setting as it stays configured when you promote a member server with this setting to be a DC.
5858

@@ -62,7 +62,7 @@ To resolve this issue, you can use one of the following methods:
6262

6363
Set the **Network access: Restrict clients allowed to make remote calls to SAM** policy to allow **Everyone** or **Authenticated Users** and apply it to all DCs.
6464

65-
This will resolve the problem for all DCs, and ensure they all use the same setting.
65+
This resolves the problem for all DCs, and ensures they all use the same setting.
6666

6767
## Method 2: Delete the registry value RestrictRemoteSam
6868

@@ -75,7 +75,7 @@ reg delete "HKLM\system\currentControlSet\control\lsa" /v restrictRemoteSam /f
7575
> [!NOTE]
7676
> This change doesn't require a restart.
7777
78-
A customized SDDL for the policy might result in unexpected failures. Here are some scenarios to be aware of:
78+
A customized SDDL for the policy might result in unexpected failures. Here're some scenarios to be aware of:
7979

8080
- Admin tools, scripts, and software that previously enumerated users, groups, and group memberships might fail.
8181
- Remote Desktop Protocol (RDP) connections to Remote Desktop Services (RDS) Servers fail when the RDS tries to retrieve user details using remote SAM RPC calls.

0 commit comments

Comments
 (0)