Skip to content

Commit b3fa053

Browse files
authored
Updates from editor
1 parent 5268bb4 commit b3fa053

1 file changed

Lines changed: 25 additions & 27 deletions

File tree

support/windows-server/active-directory/error-code-0x54b.md

Lines changed: 25 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Domain join error code 0x54b
3-
description: Provides troubleshooting steps for resolving the error code 0x54b when you join a workgroup computer to a domain.
4-
ms.date: 04/17/2025
2+
title: Domain Join Error Code 0x54b
3+
description: Provides troubleshooting steps for resolving error code 0x54b when you join a workgroup computer to a domain.
4+
ms.date: 04/23/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
@@ -12,13 +12,13 @@ ms.custom:
1212
---
1313
# Domain join error code 0x54b
1414

15-
This article provides troubleshooting steps for resolving the error code 0x54b when you join a workgroup computer to a domain.
15+
This article provides troubleshooting steps for resolving error code 0x54b when you join a workgroup computer to a domain.
1616

17-
## Symptom
17+
## Symptoms
1818

1919
When you join a workgroup computer to a domain, you receive the following error message:
2020

21-
> **Error code 0x0000232A**
21+
> **Error code 0x54b**
2222
>
2323
> Computer Name/Domain Changes
2424
>
@@ -41,7 +41,7 @@ When you join a workgroup computer to a domain, you receive the following error
4141
>
4242
> Verify that this computer is connected to the network, that these are the correct DNS server IP addresses, and that at least one of the DNS servers is running.
4343
44-
Here's an example from the *netsetup.log* file:
44+
Here's an example from the **netsetup.log** file:
4545

4646
```output
4747
mm/dd/yyyy hh:mm:ss:ms NetpValidateName: checking to see if '<domain_name>' is valid as type 3 name
@@ -51,29 +51,27 @@ mm/dd/yyyy hh:mm:ss:ms NetpCheckDomainNameIsValid [ Exists ] for '<domain_name>'
5151

5252
## Cause
5353

54-
Error code 0x54b means "ERROR\_NO\_SUCH\_DOMAIN". This error code indicates the specified domain couldn't be contacted, pointing to issues in locating domain controllers.
54+
Error code 0x54b means "ERROR\_NO\_SUCH\_DOMAIN." This error code indicates the specified domain can't be contacted, pointing to issues locating domain controllers (DCs).
5555

56-
* Domain Name System (DNS) time-outs and resolution failures when attempting to reach domain controllers.
57-
* Network connectivity to DC is blocked on TCP port 135,389,445, or RPC dynamic ports.
56+
* Domain Name System (DNS) times out and resolution fails when attempting to reach DCs.
57+
* Network connectivity to DCs is blocked on TCP port 135, 389, 445, or RPC dynamic ports.
5858

5959
## Troubleshooting steps
6060

6161
To resolve the 0x54b error, follow these steps:
6262

63-
### Step 1
63+
### Step 1: Check the network connectivity between the client and the DC
6464

65-
Check the network connectivity between the client and the Domain controller
66-
67-
| Server Port | Service |
65+
| Server port | Service |
6866
| --------------- | ------------------- |
6967
| TCP 135 | RPC Endpoint Mapper |
7068
| TCP 49152-65535 | RPC Dynamic Ports |
7169
| TCP 445 | SMB |
7270
| UDP/TCP 389 | LDAP |
7371

74-
* Refer to the list of required ports in [How to configure a firewall for Active Directory domains and trusts](config-firewall-for-ad-domains-and-trusts.md) .
72+
* Refer to the list of required ports in [How to configure a firewall for Active Directory domains and trusts](config-firewall-for-ad-domains-and-trusts.md).
7573

76-
* Use Test-NetConnection command to test connection between DC.
74+
* Use the `Test-NetConnection` command to test the connection between DCs:
7775

7876
```powershell
7977
Test-NetConnection <IP\_address\_of\_the\_DC> -Port 389
@@ -86,9 +84,9 @@ Check the network connectivity between the client and the Domain controller
8684
TcpTestSucceeded : True
8785
```
8886

89-
It indicates that the LDAP Port TCP 389 is open between the client and the DC.
87+
It indicates that the LDAP port TCP 389 is open between the client and the DC.
9088

91-
* [PortQry Command Line Port Scanner Version 2.0](https://www.microsoft.com/download/details.aspx?id=17148) can also be used to identify if a port(TCP/UDP) is blocked on DC. Example syntax:
89+
* [PortQry Command Line Port Scanner Version 2.0](https://www.microsoft.com/download/details.aspx?id=17148) can also be used to identify if a port (TCP/UDP) is blocked on DCs. Here's an example syntax:
9290

9391
```console
9492
portqry -n <problem_server> -e 135
@@ -100,7 +98,7 @@ Check the network connectivity between the client and the Domain controller
10098

10199
Port query output examples:
102100

103-
* On connection to TCP Port 135 on DC is blocked, the following message is displayed:
101+
* When the connection to TCP port 135 on a DC is blocked, the following message is displayed:
104102

105103
```console
106104
portqry -n <dc_name> -e 135
@@ -118,7 +116,7 @@ Check the network connectivity between the client and the Domain controller
118116
TCP port 135 (epmap service):FILTERED
119117
```
120118

121-
* On successful connection to TCP port 389 on DC, the following message is displayed:
119+
* When the connection to TCP port 389 on a DC is successful, the following message is displayed:
122120

123121
```console
124122
portqry -n <dc_name> -e 389
@@ -136,13 +134,11 @@ Check the network connectivity between the client and the Domain controller
136134
TCP port 389 (ldap service): LISTENING
137135
```
138136

139-
* Collect network monitor trace when reproducing the issue to confirm if there's any network connectivity issue if necessary.
140-
141-
### Step 2
137+
* Collect network monitor traces when reproducing the issue to confirm if there's any network connectivity issue, if necessary.
142138

143-
Verify if the Preferred DNS Server is the correct DNS Server.
139+
### Step 2: Verify if the preferred DNS server is the correct DNS server
144140

145-
### Step 3
141+
### Step 3: Verify if the DC can be discovered
146142

147143
Run `nltest /dsgetdc` (DC Discovery) to verify if you can discover a DC. For example:
148144

@@ -160,6 +156,8 @@ Our Site Name: Default-First-site-Name
160156
The command completed successfully
161157
```
162158

163-
### Step 4
159+
### Step 4: Verify if SRV records are registered
160+
161+
Run `DCDiag /v` on the closest DC and verify if SRV records are registered. For example:
164162

165-
Run `DCDiag /v` on the closest domain controller and verify if SRV records are registered. For example: **\_ldap.\_tcp.dc.\_msdcs.\<domain\_name>.com.**
163+
`_ldap._tcp.dc._msdcs.<domain_name>.com.`

0 commit comments

Comments
 (0)