You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/domain-join-log-analysis.md
+11-17Lines changed: 11 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -272,7 +272,7 @@ Network traces are helpful in pinpointing AD domain join issues. During an AD do
272
272
273
273
### DNS
274
274
275
-
The client queries the DNS SRV record to locate the DCs of the domain to join. In the following example, the client manages to locate 2 DCs.
275
+
The client queries the DNS SRV record to locate the DCs of the domain to join. In the following example, the client manages to locate two DCs.
276
276
277
277
```output
278
278
Source Destination Protocol Name Description
@@ -303,7 +303,7 @@ dc1.contoso.local HOST88.contoso.local DNS DNS:QueryId = 0x623B, QUERY (Stand
303
303
304
304
### LDAP ping
305
305
306
-
Then the client picks up one DC and uses Lightweight Directory Access Protocol (LDAP) ping over UDP port 389 to detect the functionalities of that DC.
306
+
Then the client picks up one of the DCs and uses Lightweight Directory Access Protocol (LDAP) ping over UDP port 389 to detect the functionalities of that DC.
LDAP traffic is used during domain join activity as well. Note that except for the leading LDAP search, which is for RootDSE and then the binding (authentication), the remaining LDAP traffic is encrypted. You cannot read the content in Network Monitor or Wireshark.
406
+
LDAP traffic is used during domain join activity as well.
407
+
408
+
> [!NOTE]
409
+
> Except for the leading LDAP search, which is for RootDSE and then the binding (authentication), the remaining LDAP traffic is encrypted. You cannot read the content in Network Monitor or Wireshark.
Remote Procedure Call (RPC) traffic starts from TCP 135 port. The client binds to the RPC Endpoint Mapper (EPMP in netmon trace) service at TCP 135 port, queries the actual port of DRSR and NetLogon services, and then connects those 2 services.
449
+
Remote Procedure Call (RPC) traffic starts from TCP 135 port. The client binds to the RPC Endpoint Mapper (EPMP) service at TCP 135 port, queries the actual port of Directory Replication Service Remote (DRSR) and the NetLogon services, and then connects those 2 services.
447
450
448
451
> [!NOTE]
449
452
> By default, the traffic of EPMAP doesn't requires authentication, but others traffics do.
Kerberos traffic also appears during domain join operation. The miscellaneous types of network traffic mentioned above, including SMB, LDAP and RPC, all require authentication. Typically, Kerberos is used.
545
+
Kerberos traffic is also used during domain join operation, because all the types of network traffic mentioned in the previous sections, including SMB, LDAP and RPC, require authentication.
543
546
544
-
For example, in the following network trace, the client gets a Kerberos TGT for the user account **CONTOSO\puser2** and the service ticket for the target SPN **cifs/DC2.contoso.local**. Then the client sets up the SMB session to the DC DC2.contoso.local with that service ticket.
547
+
For example, in the following network trace, the client gets a Kerberos TGT for the user account **CONTOSO\puser2** and the service ticket for the target SPN **cifs/DC2.contoso.local**. Then, the client sets up the SMB session to the DC DC2.contoso.local with that service ticket.
Depending on the format of the user credential provided for the domain join operation (e.g., [email protected] or contoso\puser2 or contoso.local\puser2), you may see different Kerberos traffic.
621
+
> [!NOTE]
622
+
> Depending on the format of the user credential provided for the domain join operation (for example, [email protected] or contoso\puser2 or contoso.local\puser2), you may see different Kerberos traffic.
620
623
621
624
#### About NTLM
622
625
@@ -671,12 +674,3 @@ System dc2.contoso.local HOST88.contoso.local SMB2 SMB2:R TREE CONNECT (0x
671
674
+ MechListMic: Version: 1
672
675
673
676
```
674
-
675
-
# Conclusion
676
-
677
-
Understanding the various logs and network traffic types involved in an AD domain join can significantly aid in troubleshooting and resolving AD domain join failures. By comparing logs from successful and unsuccessful attempts and analyzing the traffic patterns, you can pinpoint where issues arise and address them effectively.
678
-
679
-
680
-
:date: Page updated by dennhu to substitute the sample `netsetup.log` from a Win11 24H2 machine. Also update the RPC and Kerberos sections. 04/04/2025.
681
-
682
-
:date: Page updated by dennhu to substitute texts for all screenshots. 05/20/2025.
0 commit comments