Skip to content

Commit 82b69f7

Browse files
committed
update
1 parent 30ac343 commit 82b69f7

1 file changed

Lines changed: 11 additions & 17 deletions

File tree

support/windows-server/active-directory/domain-join-log-analysis.md

Lines changed: 11 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ Network traces are helpful in pinpointing AD domain join issues. During an AD do
272272

273273
### DNS
274274

275-
The client queries the DNS SRV record to locate the DCs of the domain to join. In the following example, the client manages to locate 2 DCs.
275+
The client queries the DNS SRV record to locate the DCs of the domain to join. In the following example, the client manages to locate two DCs.
276276

277277
```output
278278
Source Destination Protocol Name Description
@@ -303,7 +303,7 @@ dc1.contoso.local HOST88.contoso.local DNS DNS:QueryId = 0x623B, QUERY (Stand
303303

304304
### LDAP ping
305305

306-
Then the client picks up one DC and uses Lightweight Directory Access Protocol (LDAP) ping over UDP port 389 to detect the functionalities of that DC.
306+
Then the client picks up one of the DCs and uses Lightweight Directory Access Protocol (LDAP) ping over UDP port 389 to detect the functionalities of that DC.
307307

308308
```output
309309
Source Destination Protocol Name Description
@@ -403,7 +403,10 @@ HOST88.contoso.local dc2.contoso.local TCP TCP:Flags=...A...., SrcPort=49708,
403403

404404
### LDAP
405405

406-
LDAP traffic is used during domain join activity as well. Note that except for the leading LDAP search, which is for RootDSE and then the binding (authentication), the remaining LDAP traffic is encrypted. You cannot read the content in Network Monitor or Wireshark.
406+
LDAP traffic is used during domain join activity as well.
407+
408+
> [!NOTE]
409+
> Except for the leading LDAP search, which is for RootDSE and then the binding (authentication), the remaining LDAP traffic is encrypted. You cannot read the content in Network Monitor or Wireshark.
407410
408411
```output
409412
Source Destination Protocol Name Description
@@ -443,7 +446,7 @@ HOST88.contoso.local dc2.contoso.local LDAPSASLBuffer LDAPSASLBuffer:BufferLe
443446

444447
### RPC
445448

446-
Remote Procedure Call (RPC) traffic starts from TCP 135 port. The client binds to the RPC Endpoint Mapper (EPMP in netmon trace) service at TCP 135 port, queries the actual port of DRSR and NetLogon services, and then connects those 2 services.
449+
Remote Procedure Call (RPC) traffic starts from TCP 135 port. The client binds to the RPC Endpoint Mapper (EPMP) service at TCP 135 port, queries the actual port of Directory Replication Service Remote (DRSR) and the NetLogon services, and then connects those 2 services.
447450

448451
> [!NOTE]
449452
> By default, the traffic of EPMAP doesn't requires authentication, but others traffics do.
@@ -539,9 +542,9 @@ HOST88.contoso.local dc2.contoso.local TCP TCP:Flags=...A...., SrcPort=49735,
539542

540543
### Kerberos
541544

542-
Kerberos traffic also appears during domain join operation. The miscellaneous types of network traffic mentioned above, including SMB, LDAP and RPC, all require authentication. Typically, Kerberos is used.
545+
Kerberos traffic is also used during domain join operation, because all the types of network traffic mentioned in the previous sections, including SMB, LDAP and RPC, require authentication.
543546

544-
For example, in the following network trace, the client gets a Kerberos TGT for the user account **CONTOSO\puser2** and the service ticket for the target SPN **cifs/DC2.contoso.local**. Then the client sets up the SMB session to the DC DC2.contoso.local with that service ticket.
547+
For example, in the following network trace, the client gets a Kerberos TGT for the user account **CONTOSO\puser2** and the service ticket for the target SPN **cifs/DC2.contoso.local**. Then, the client sets up the SMB session to the DC DC2.contoso.local with that service ticket.
545548

546549
```output
547550
Source Destination Protocol Name Description
@@ -615,8 +618,8 @@ dc2.contoso.local HOST88.contoso.local SMB2 SMB2:R IOCTL (0xb)
615618
+ Ticket: Realm: CONTOSO.LOCAL, Sname: cifs/DC2.contoso.local
616619
```
617620

618-
619-
Depending on the format of the user credential provided for the domain join operation (e.g., [email protected] or contoso\puser2 or contoso.local\puser2), you may see different Kerberos traffic.
621+
> [!NOTE]
622+
> Depending on the format of the user credential provided for the domain join operation (for example, [email protected] or contoso\puser2 or contoso.local\puser2), you may see different Kerberos traffic.
620623
621624
#### About NTLM
622625

@@ -671,12 +674,3 @@ System dc2.contoso.local HOST88.contoso.local SMB2 SMB2:R TREE CONNECT (0x
671674
+ MechListMic: Version: 1
672675
673676
```
674-
675-
# Conclusion
676-
677-
Understanding the various logs and network traffic types involved in an AD domain join can significantly aid in troubleshooting and resolving AD domain join failures. By comparing logs from successful and unsuccessful attempts and analyzing the traffic patterns, you can pinpoint where issues arise and address them effectively.
678-
679-
680-
:date: Page updated by dennhu to substitute the sample `netsetup.log` from a Win11 24H2 machine. Also update the RPC and Kerberos sections. 04/04/2025.
681-
682-
:date: Page updated by dennhu to substitute texts for all screenshots. 05/20/2025.

0 commit comments

Comments
 (0)