Skip to content

Commit 497c076

Browse files
committed
Tech review revisions
1 parent 203bc5f commit 497c076

File tree

1 file changed

+32
-16
lines changed

1 file changed

+32
-16
lines changed

support/windows-server/windows-security/confidential-attributes-unexpected-behavior-using-windows-server-2025-dc.md

Lines changed: 32 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ When you search for or edit Active Directory Domain Services (AD DS) objects, yo
2222

2323
- When you run a Lightweight Directory Access Protocol (LDAP) search request against a Windows Server 2025-based DC, the resulting attribute list doesn't include confidential attributes. However, if you run the same LDAP query against a Windows Server 2022-based DC (or a DC that runs an older version of Windows Server), you obtain a full attribute list in the response.
2424

25-
- When you run an LDAP request that adds or modifies confidential attribute values against a Windows Server 2025-based DC, the request fails and returns an `INSUFF_ACCESS_RIGHTS` error. If you run the same LDAP request against a Windows Server 2022-based DC (or a DC that runs an older version of Windows Server), the request succeeds.
25+
- When you run an LDAP update request that adds or modifies confidential attribute values against a Windows Server 2025-based DC, the update request fails and returns an `INSUFF_ACCESS_RIGHTS` error. If you run the same LDAP update request against a Windows Server 2022-based DC (or a DC that runs an older version of Windows Server), the update request succeeds.
2626

2727
### Example - Search results omit confidential attributes
2828

@@ -37,11 +37,15 @@ The client connects and exports a list of the object's attributes, and generates
3737
```output
3838
Connecting to "dc25"
3939
Logging in as current user using SSPI
40-
Exporting directory to file con
40+
Exporting directory to file test-comp01.txt
4141
Searching for entries...
4242
Writing out entries.
43+
1 entries exported
4344
```
4445

46+
> [!NOTE]
47+
> This example text results from using an LDAP client on Windows 11, 23H2, or an older version of Windows.
48+
4549
However, when you review the exported list, you find the "cn" attribute but not the "ms-Mcs-AdmPwd" attribute.
4650

4751
When you target the query to a DC that runs an older version of Windows, the resulting exported list includes both "cn" and "ms-Mcs-AdmPwd."
@@ -53,9 +57,9 @@ The following table summarizes the behavior across different client and server v
5357
| Windows 11, version 24H2 | Windows Server 2025 | "cn"<br />"ms-Mcs-AdmPwd" |
5458
| Windows Server 2025 (member server) | Windows Server 2025 | "cn"<br />"ms-Mcs-AdmPwd" |
5559
| Windows version older than Windows 11, version 24H2 | Windows Server 2025 | "cn" |
56-
| Non-Windows operating system (for example, ldifde on UNIX) | Windows Server 2025 | "cn" |
60+
| Non-Windows operating system (for example, a UNIX-based client) | Windows Server 2025 | "cn" |
5761
| Windows version older than Windows 11, version 24H2 | Windows Server 2022 or an older version | "cn"<br />"ms-Mcs-AdmPwd" |
58-
| Non-Windows operating system (for example, ldifde on UNIX) | Windows Server 2022 or an older version | "cn"<br />"ms-Mcs-AdmPwd" |
62+
| Non-Windows operating system (for example, a UNIX-based client) | Windows Server 2022 or an older version | "cn"<br />"ms-Mcs-AdmPwd" |
5963

6064
### Example - Operations on confidential attributes fail
6165

@@ -114,11 +118,13 @@ Because of new functionality in Windows Server 2025 DCs, your administrative cli
114118

115119
- **Improved security for confidential attributes**: DCs and AD LDS instances only allow LDAP to add, search, and modify operations that involve confidential attributes when the connection is encrypted.
116120

121+
This behavior doesn't affect LDAP clients that run on Windows Server 2025-based member servers or Windows 11, version 24H2-based computers. On these operating system versions, LDAP clients use encrypted sessions by default.
122+
117123
## Workaround
118124

119125
To work around this issue, use one of the following methods:
120126

121-
- Configure your LDAP client to use the [**LDAP_OPT_ENCRYPT**](/previous-versions/windows/desktop/ldap/session-options) session option (or update to a client that supports this option).
127+
- Configure your LDAP client to use the [**LDAP_OPT_ENCRYPT**](/previous-versions/windows/desktop/ldap/session-options) session option (or update to a client that supports this option). If you're using ldifde on Windows, use the `/h` switch (for example, run `ldifde /h /s dc25 -i /f .\update.txt`).
122128

123129
- Use Windows Server 2025 or Windows 11 24H2, or a newer version, as an LDAP client. These operating systems encrypt LDAP sessions by default. For more information about this feature, see [What's new in Windows Server 2025](/windows-server/get-started/whats-new-windows-server-2025#active-directory-domain-services).
124130

@@ -136,7 +142,8 @@ Several new Directory Service events document this behavior. The following table
136142

137143
### Details for Event ID 3079
138144

139-
> Log Name: Directory Service
145+
```output
146+
Log Name: Directory Service
140147
Source: Microsoft-Windows-ActiveDirectory_DomainService
141148
Event ID: 3079
142149
Task Category: Security
@@ -146,10 +153,12 @@ User: contoso\admin
146153
Computer: dc25.contoso.com
147154
Description:
148155
The directory blocked access to one or more confidential attributes on one or more LDAP search requests because one or more clients were using an unencrypted LDAP connection.
156+
```
149157

150158
### Details for Event ID 3080
151159

152-
> Log Name: Directory Service
160+
```output
161+
Log Name: Directory Service
153162
Source: Microsoft-Windows-ActiveDirectory_DomainService
154163
Event ID: 3080
155164
Task Category: Security
@@ -158,10 +167,12 @@ User: contoso\admin
158167
Computer: dc25.contoso.com
159168
Description:
160169
The directory blocked one or more LDAP modify requests including changes to one or more confidential attributes because one or more clients were using an unencrypted LDAP connection.
170+
```
161171

162172
### Details for Event ID 3081
163173

164-
> Log Name: Directory Service
174+
```output
175+
Log Name: Directory Service
165176
Source: Microsoft-Windows-ActiveDirectory_DomainService
166177
Event ID: 3081
167178
Task Category: Security
@@ -170,6 +181,7 @@ User: contoso\admin
170181
Computer: dc25.contoso.com
171182
Description:
172183
The directory blocked one or more LDAP add requests including changes to one or more confidential attributes because one or more clients were using an unencrypted LDAP connection.
184+
```
173185

174186
### Deeper investigation
175187

@@ -197,16 +209,17 @@ When these settings take effect, all LDAP queries to AD DS generate instances of
197209

198210
To continue the previous example, the query for "cn" and "ms-Mcs-AdmPwd" generates Event ID 3079, followed by Event ID 1644. Event ID 1544 resembles the following example:
199211

200-
> Log Name: Directory Service
212+
```output
213+
Log Name: Directory Service
201214
Source: Microsoft-Windows-ActiveDirectory_DomainService
202215
Event ID: 1644
203216
Task Category: Field Engineering
204217
Level: Information
205218
Computer: dc25.contoso.com
206219
Description:
207220
Internal event: A client issued a search operation with the following options.
208-
>
209-
> Client:
221+
222+
Client:
210223
10.32.51.5:54994
211224
Starting node:
212225
DC=contoso,DC=com
@@ -219,24 +232,27 @@ ms-Mcs-AdmPwd,cn
219232
...
220233
User:
221234
Contoso\Admin
235+
```
222236

223237
You might also see Event ID 2041, which indicates that duplicate log entries are suppressed. The event content resembles the following example:
224238

225-
> Log Name: Directory Service
239+
```output
240+
Log Name: Directory Service
226241
Source: Microsoft-Windows-ActiveDirectory_DomainService
227242
Event ID: 2041
228243
Task Category: Internal Processing
229244
Level: Information
230245
Computer: dc25.contoso.com
231246
Description:
232247
Duplicate event log entries were suppressed.
233-
>
234-
> See the previous event log entry for details. An entry is considered a duplicate if the event code and all of its insertion parameters are identical. The time period for this run of duplicates is from the time of the previous event to the time of this event.
235-
>
236-
> Event Code:
248+
249+
See the previous event log entry for details. An entry is considered a duplicate if the event code and all of its insertion parameters are identical. The time period for this run of duplicates is from the time of the previous event to the time of this event.
250+
251+
Event Code:
237252
80000c07
238253
Number of duplicate entries:
239254
7
255+
```
240256

241257
In this context, the information in these events indicates the following behavior:
242258

0 commit comments

Comments
 (0)