You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/windows-security/confidential-attributes-unexpected-behavior-using-windows-server-2025-dc.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Operations on Confidential Attributes Produce Unexpected Results when Using Windows Server 2025 DCs
2
+
title: Operations on Confidential Attributes Produce Unexpected Results When Using Windows Server 2025 DCs
3
3
description: Discusses new requirements for using LDAP clients to access confidential attributes while connected to Windows Server 2025-based domain controllers (DCs).
4
4
ms.date: 12/05/2025
5
5
manager: dcscontentpm
@@ -13,19 +13,19 @@ appliesto:
13
13
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Supported versions of Windows Server</a>
14
14
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Supported versions of Windows Client</a>
15
15
---
16
-
# Operations on confidential attributes produce unexpected results when using Windows Server 2025 DCs
16
+
# Unexpected results for operations on confidential attributes on Windows Server 2025 DCs
17
17
18
-
This article discusses new requirements for using LDAP clients to access confidential attributes while connected to Windows Server 2025-based domain controllers (DCs).
18
+
This article discusses new requirements for using LDAP clients to access confidential attributes while they're connected to Windows Server 2025-based domain controllers (DCs).
19
19
20
20
## Symptoms
21
21
22
-
When you search for or edit Active Directory Domain Services (AD DS) objects, you notice the following behaviors:
22
+
When you search for or edit Active Directory Domain Services (AD DS) objects, you notice the following behavior:
23
23
24
24
- When you run a Lightweight Directory Access Protocol (LDAP) search request against a Windows Server 2025-based DC, the resulting attribute list doesn't include confidential attributes. However, if you run the same LDAP query against a DC that runs on Windows Server 2022 or earlier, you obtain a full attribute list in the response.
25
25
26
-
- When you run an LDAP update request that adds or modifies confidential attribute values against a Windows Server 2025-based DC, the update request fails and returns an `INSUFF_ACCESS_RIGHTS` error. If you run the same LDAP update request against a DC that runs on Windows Server 2022 or earlier, the update request succeeds.
26
+
- When you run an LDAP update request that adds or modifies confidential attribute values against a Windows Server 2025-based DC, the update request fails and returns an `INSUFF_ACCESS_RIGHTS` error message. If you run the same LDAP update request against a DC that runs on Windows Server 2022 or earlier, the update request succeeds.
27
27
28
-
### Example - Search results omit confidential attributes
28
+
### Example 1: Search results omit confidential attributes
29
29
30
30
In this example, you run an [Ldifde](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731033(v=ws.11)) query try to read the legacy Local Administrator Password Solution (LAPS) password attribute. The query resembles the following example:
31
31
@@ -45,7 +45,7 @@ Writing out entries.
45
45
```
46
46
47
47
> [!NOTE]
48
-
> This example text results from using an LDAP client on Windows 11, 23H2, or an earlier version of Windows.
48
+
> This example text is created by using an LDAP client on Windows 11, 23H2, or an earlier version of Windows.
49
49
50
50
However, when you review the exported list, you find the "cn" attribute but not the "ms-Mcs-AdmPwd" attribute.
51
51
@@ -57,14 +57,14 @@ The following table summarizes the behavior across different client and server v
57
57
| --- | --- | --- |
58
58
| Windows 11, version 24H2 | Windows Server 2025 | "cn"<br />"ms-Mcs-AdmPwd" |
59
59
| Windows Server 2025 (member server) | Windows Server 2025 | "cn"<br />"ms-Mcs-AdmPwd" |
60
-
| Windows version earlier than Windows 11, version 24H2 | Windows Server 2025 | "cn" |
60
+
| Windows versions earlier than Windows 11, version 24H2 | Windows Server 2025 | "cn" |
61
61
| Non-Windows operating system (for example, a UNIX-based client) | Windows Server 2025 | "cn" |
62
-
| Windows version earlier than Windows 11, version 24H2 | Windows Server 2022 or an earlier version | "cn"<br />"ms-Mcs-AdmPwd" |
62
+
| Windows versions earlier than Windows 11, version 24H2 | Windows Server 2022 or an earlier version | "cn"<br />"ms-Mcs-AdmPwd" |
63
63
| Non-Windows operating system (for example, a UNIX-based client) | Windows Server 2022 or an earlier version | "cn"<br />"ms-Mcs-AdmPwd" |
64
64
65
-
### Example - Operations on confidential attributes fail
65
+
### Example 2: Operations on confidential attributes fail
66
66
67
-
In this example, you create an LDIFDE file (named update.txt) that modifies the value of a confidential attribute. For convenience, this example refers to the same legacy LAPS password as the previous example (we don't recommend this type of change in practice). The file text resembles the following example:
67
+
In this example, you create an LDIFDE file (named Update.txt) that modifies the value of a confidential attribute. For convenience, this example refers to the same legacy LAPS password as the previous example. (Note: We don't recommend this type of change in practice). The file text resembles the following example:
00002098: SecErr: DSID-03153BAC, problem 4003 (INSUFF_ACCESS_RIGHTS), data 0
103
103
```
104
104
105
-
Similarly to the query in the previous example, the operations succeed or fail depending on the client and server versions. The following table summarizes these interactions.
105
+
Similarly to the previous query example, the operations succeed or fail depending on the client and server versions. The following table summarizes these interactions.
106
106
107
107
| Client | Target DC | Operation result |
108
108
| --- | --- | --- |
@@ -115,9 +115,9 @@ Similarly to the query in the previous example, the operations succeed or fail d
115
115
116
116
## Cause
117
117
118
-
Because of new functionality in Windows Server 2025 DCs, your administrative client must establish an encrypted connection to AD DS to search, read, add, or modify confidential object attributes. [What's new in Windows Server 2025](/windows-server/get-started/whats-new-windows-server-2025#active-directory-domain-services) describes the new functionality:
118
+
Because of new functionality in Windows Server 2025 DCs, your administrative client must establish an encrypted connection to AD DS in order to search, read, add, or modify confidential object attributes. [What's new in Windows Server 2025](/windows-server/get-started/whats-new-windows-server-2025#active-directory-domain-services) describes the new functionality:
119
119
120
-
-**Improved security for confidential attributes**: DCs and AD LDS instances only allow LDAP to add, search, and modify operations that involve confidential attributes when the connection is encrypted.
120
+
-**Improved security for confidential attributes**: DCs and AD LDS instances allow LDAP only to add, search, and modify operations that involve confidential attributes when the connection is encrypted.
121
121
122
122
This behavior doesn't affect LDAP clients that run on Windows Server 2025-based member servers or Windows 11, version 24H2-based computers. On these operating system versions, LDAP clients use encrypted sessions by default.
123
123
@@ -127,9 +127,9 @@ To work around this issue, use one of the following methods:
127
127
128
128
- Configure your LDAP client to use the [**LDAP_OPT_ENCRYPT**](/previous-versions/windows/desktop/ldap/session-options) session option (or update to a client that supports this option). If you're using ldifde on Windows, use the `/h` switch (for example, run `ldifde /h /s dc25 -i /f .\update.txt`).
129
129
130
-
- Use Windows Server 2025 or Windows 11 24H2, or a newer version, as an LDAP client. These operating systems encrypt LDAP sessions by default. For more information about this feature, see [What's new in Windows Server 2025](/windows-server/get-started/whats-new-windows-server-2025#active-directory-domain-services).
130
+
- Use Windows Server 2025 or Windows 11 24H2, or a newer version, as an LDAP client. By default, these operating systems encrypt LDAP sessions. For more information about this feature, see [What's new in Windows Server 2025](/windows-server/get-started/whats-new-windows-server-2025#active-directory-domain-services).
131
131
132
-
- If you can't use either of the previous methods, you can temporarily disable the encrypted session requirements. For more information, see [How dsHeuristics affects the encrypted session requirements and related events](#how-dsheuristics-affects-the-encrypted-session-requirements-and-related-events)later in this article.
132
+
- If you can't use either of the previous methods, you can temporarily disable the encrypted session requirements. For more information, see [How dsHeuristics affects the encrypted session requirements and related events](#how-dsheuristics-affects-the-encrypted-session-requirements-and-related-events) in this article.
133
133
134
134
> [!IMPORTANT]
135
135
> This method isn't secure. Use it only as a temporary step.
@@ -264,7 +264,7 @@ This setting is not secure and should only be used as a temporary step.
264
264
265
265
[!INCLUDE [Registry important alert](../../../includes/registry-important-alert.md)]
266
266
267
-
For queries, if you want to confirm that clients are using unencrypted sessions, you can correlate Event ID 3079 with field engineering Event ID 1644. To turn on verbose logging and maximize the event information that the queries generate, run the following commands at a Windows command prompt:
267
+
For queries, if you want to verify that clients are using unencrypted sessions, you can correlate Event ID 3079 with field engineering Event ID 1644. To turn on verbose logging and maximize the event information that the queries generate, run the following commands at a Windows command prompt:
You might also see Event ID 2041, which indicates that duplicate log entries are suppressed. The event content resembles the following example:
314
+
You might also see Event ID 2041. This event indicates that duplicate log entries are suppressed. The event content resembles the following example:
315
315
316
316
```output
317
317
Log Name: Directory Service
@@ -323,7 +323,7 @@ Computer: dc25.contoso.com
323
323
Description:
324
324
Duplicate event log entries were suppressed.
325
325
326
-
See the previous event log entry for details. An entry is considered a duplicate if the event code and all of its insertion parameters are identical. The time period for this run of duplicates is from the time of the previous event to the time of this event.
326
+
See the previous event log entry for details. An entry is considered a duplicate if the event code and all its insertion parameters are identical. The time period for this run of duplicates is from the time of the previous event to the time of this event.
327
327
328
328
Event Code:
329
329
80000c07
@@ -333,12 +333,12 @@ Number of duplicate entries:
333
333
334
334
In this context, the information in these events indicates the following behavior:
335
335
336
-
- The request attempted to inspect a confidential attribute on each of eight AD DS objects.
336
+
- The request tries to inspect a confidential attribute on each of eight AD DS objects.
337
337
- For each of the eight objects, the query results omit the confidential attribute.
338
338
339
-
To identify clients that used an unencrypted session, cross-reference the user details from Event ID 3079 to the query, client IP address, and port details from Event ID 1644.
339
+
To identify clients that used an unencrypted session, cross-reference the user details from Event ID 3079 to the query, the port details from Event ID 1644, and the client IP address.
340
340
341
-
To turn off verbose logging when you're done investigating, run the following commands:
341
+
To turn off verbose logging when you finish investigating, run the following commands:
0 commit comments