Skip to content

Commit 0b4d8cc

Browse files
committed
Revisions based on review feedback
1 parent b5f03f8 commit 0b4d8cc

File tree

1 file changed

+22
-16
lines changed

1 file changed

+22
-16
lines changed

support/windows-server/windows-security/event-id-5719-when-netlogon-service-restarts.md

Lines changed: 22 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Event ID 5719 occurs when the NetLogon service restarts
3-
description: Helps you diagnose Event ID 5719 (NetLogon) that's logged when the NetLogon service restarts on Windows Server 2025.
2+
title: Event ID 5719 (STATUS_INTERNAL_ERROR) occurs when the NetLogon service restarts
3+
description: Helps you diagnose Event ID 5719 (error code: 0xC00000E5 (STATUS_INTERNAL_ERROR)) that's logged when the NetLogon service restarts on Windows Server 2025.
44
ms.date: 11/05/2025
55
manager: dcscontentpm
66
audience: itpro
@@ -12,35 +12,41 @@ ms.custom:
1212
appliesto:
1313
- <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Supported versions of Windows Server</a>
1414
---
15-
# Event ID 5719 occurs when the NetLogon service restarts
15+
# Event ID 5719 (STATUS_INTERNAL_ERROR) occurs when the NetLogon service restarts
1616

17-
This article helps you diagnose and understand Event ID 5719 (NetLogon). Windows logs this event when the NetLogon service restarts on Windows Server systems. The event typically appears when Windows Server 2025-based member servers interact with domain controllers that run earlier Windows Server versions.
17+
This article helps you diagnose and understand the NetLogon service Event ID 5719, when the event includes the `0xC00000E5 (STATUS_INTERNAL_ERROR)` error code. Windows logs this event when the NetLogon service restarts on Windows Server systems. The event typically appears when Windows Server 2025-based member servers interact with domain controllers (DCs) that run earlier Windows Server versions.
1818

1919
## Symptoms
2020

21-
Each time the NetLogon service restarts on a Windows Server 2025 system, Windows logs Event ID 5719 in the System event log. The event text resembles the following excerpt:
21+
Each time the NetLogon service restarts on a Windows Server 2025 system, Windows logs Event ID 5719 (STATUS_INTERNAL_ERROR) in the System event log. The event text resembles the following excerpt:
2222

23-
> This computer was not able to set up a secure session with a domain controller in domain [domain name] due to the following: An internal error occurred.
23+
> This computer was not able to set up a secure session with a DC in domain [domain name] due to the following: An internal error occurred.
2424
25-
The event text might include the `0xC00000E5 (STATUS_INTERNAL_ERROR)` code.
25+
The event text includes the `0xC00000E5 (STATUS_INTERNAL_ERROR)` code.
2626

27-
The event doesn't persist. Windows establishes the secure channel to the domain controller. Then, normal domain operations resume.
27+
The event doesn't persist. Windows establishes the secure channel to the DC. Then, normal domain operations resume.
2828

29-
The event occurs even though you didn't make any recent configuration, update, or software changes.
29+
The event occurs even though you didn't make any recent configuration, update, or software changes. Typically, you only see this behavior in particular environments:
30+
31+
| Member server | Authenticating DC | Event and code |
32+
| - | - | - |
33+
| Windows Server 2025 | Windows Server 2025 | No Event ID 5719 |
34+
| Windows Server 2025 | Windows Server 2022 | Event ID 5719, `0xC00000E5 (STATUS_INTERNAL_ERROR)` |
35+
| Windows Server 2025 | Windows Server 2019 | Event ID 5719, `0xC00000E5 (STATUS_INTERNAL_ERROR)` |
3036

3137
## Cause
3238

33-
When the NetLogon service restarts in mixed Windows Server environments (Windows Server 2025 member servers and Windows Server 2022 or Windows Server 2019 domain controllers), Windows generates Event ID 5719. As long as the secure channel is established, this event is expected and harmless.
39+
When the NetLogon service restarts in mixed Windows Server environments (Windows Server 2025 member servers and Windows Server 2022 or Windows Server 2019 DCs), Windows generates Event ID 5719 (STATUS_INTERNAL_ERROR). As long as the secure channel is established, this event is expected and harmless.
3440

3541
The error occurs because of protocol differences in Kerberos authentication support. The error doesn't indicate a functional problem unless it keeps occurring in circumstances other than the circumstances that this article discusses.
3642

37-
When a Windows Server 2025 member server tries to establish a secure channel to a domain controller that runs Windows Server 2022 or an earlier version, it starts the connection by using the new Kerberos authentication method. Older domain controllers don't support this new authentication Remote Procedure Call (RPC) call. Because of this lack of support, authentication fails and Windows logs Event ID 5719. In this situation, the system automatically falls back to the legacy NetLogon method to successfully establish the secure channel.
43+
When a Windows Server 2025 member server tries to establish a secure channel to a DC that runs Windows Server 2022 or an earlier version, it starts the connection by using the new Kerberos authentication method. Older DCs don't support this new authentication Remote Procedure Call (RPC) call. Because of this lack of support, authentication fails and Windows logs Event ID 5719 (STATUS_INTERNAL_ERROR). In this situation, the system automatically falls back to the legacy NetLogon method to successfully establish the secure channel.
3844

3945
This sequence causes a single, harmless error event. You can safely ignore this event unless you also see ongoing authentication or connectivity problems.
4046

4147
## Resolution
4248

43-
Event ID 5719 might occur only one time when NetLogon restarts and the secure channel is established (domain operations proceed without any issues). In this case, the event is harmless. Don't try remediation unless you see other persistent authentication or secure channel issues.
49+
Event ID 5719 (STATUS_INTERNAL_ERROR) might occur only one time when NetLogon restarts and the secure channel is established (domain operations proceed without any issues). In this case, the event is harmless. Don't try remediation unless you see other persistent authentication or secure channel issues.
4450

4551
Microsoft recognizes this event as expected in mixed-version environments. Microsoft might suppress or clarify this event in future updates or documentation.
4652

@@ -53,7 +59,7 @@ Microsoft recognizes this event as expected in mixed-version environments. Micro
5359

5460
As part of the transition to Windows Server 2025 or newer DCs that support Kerberos for secure channel setup, temporarily configure the following registry setting. Configure this setting on Kerberos-capable member computers that also run NetLogon.
5561

56-
This change suppresses the logging of NetLogon Event ID 5719. After you deploy enough Windows Server 2025 or newer Kerberos-capable domain controllers in the domain to ensure reliable Kerberos-based secure channel establishment, remove the registry setting.
62+
This change suppresses the logging of Event ID 5719 (STATUS_INTERNAL_ERROR). After you deploy enough Windows Server 2025 or newer Kerberos-capable DCs in the domain to ensure reliable Kerberos-based secure channel establishment, remove the registry setting.
5763

5864
- **Registry subkey**: `HKLM\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters`
5965

@@ -103,9 +109,9 @@ To turn off logging, run the `nltest /dbflag:0x0` command.
103109

104110
## More information
105111

106-
The event is specific to Windows Server 2025 member servers that authenticate by using domain controllers that run earlier versions of Windows. In the same scenario, Windows Server 2019 and Windows Server 2022 don't log Event ID 5719.
112+
The event is specific to Windows Server 2025 member servers that authenticate by using DCs that run earlier versions of Windows. In the same scenario, Windows Server 2019 and Windows Server 2022 member servers don't log Event ID 5719 (STATUS_INTERNAL_ERROR).
107113

108-
Windows Server 2025 systems that authenticate by using Windows Server 2025 domain controllers don't log Event ID 5719.
114+
Windows Server 2025 systems that authenticate by using Windows Server 2025 DCs don't log Event ID 5719 (STATUS_INTERNAL_ERROR).
109115

110116
### Log entries in NetLogon.log that trace the secure channel process
111117

@@ -115,7 +121,7 @@ When Windows initially tries to establish the secure channel, it uses Kerberos.
115121
[INIT] [10664] UseKerberosForSecureChannels = TRUE
116122
```
117123

118-
The domain controller refuses this first attempt. On the member server, Windows receives an error message that resembles the following log excerpt:
124+
The DC refuses this first attempt. On the member server, Windows receives an error message that resembles the following log excerpt:
119125

120126
```output
121127
[SESSION] [3036] CONTOSO: NlDiscoverDc: Found DC \\CONTOSODC.CONTOSO.com

0 commit comments

Comments
 (0)