Skip to content

Commit 6a5464f

Browse files
committed
Acrolinx fixes
1 parent ea234b5 commit 6a5464f

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

support/windows-server/windows-security/event-id-5719-when-netlogon-service-restarts.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The event text might include the `0xC00000E5 (STATUS_INTERNAL_ERROR)` code.
2626

2727
The event doesn't persist. Windows establishes the secure channel with the domain controller. Normal domain operations then resume.
2828

29-
The event occurs even though you haven't made any recent configuration, update, or software changes.
29+
The event occurs even though you didn't make any recent configuration, update, or software changes.
3030

3131
## Cause
3232

@@ -36,18 +36,18 @@ The error happens because of protocol differences in Kerberos authentication sup
3636

3737
When a Windows Server 2025 member server tries to establish a secure channel with a domain controller that runs Windows Server 2022 or an earlier version, it starts the connection by using the new Kerberos authentication method. Older domain controllers don't support this new authentication Remote Procedure Call (RPC) call. Because of this lack of support, authentication fails and Windows logs Event ID 5719. The system automatically falls back to the legacy NetLogon method. This method succeeds in establishing the secure channel.
3838

39-
This sequence results in a single, harmless error event. You can ignore this event unless it's accompanied by ongoing authentication or connectivity problems.
39+
This sequence results in a single, harmless error event. You can ignore this event unless you also see ongoing authentication or connectivity problems.
4040

4141
## Resolution
4242

4343
If Event ID 5719 occurs only once when NetLogon restarts and the secure channel is established (domain operations proceed without issue), this event is harmless. You can safely ignore it.
4444

45-
Don't try remediation unless you see additional, persistent authentication or secure channel issues.
45+
Don't try remediation unless you see other persistent authentication or secure channel issues.
4646

4747
Microsoft recognizes this event as expected in mixed-version environments. Microsoft might suppress or clarify this event in future updates or documentation.
4848

4949
> [!IMPORTANT]
50-
> If the error recurs outside of NetLogon restarts or is accompanied by domain trust or authentication failures, investigate further. Collect the log data as described in [Collecting log data](#collecting-log-data), and then contact Microsoft Support.
50+
> If the error recurs outside of NetLogon restarts or coincides with domain trust or authentication failures, investigate further. Collect the log data as described in [Collecting log data](#collecting-log-data), and then contact Microsoft Support.
5151
5252
### Workaround (optional)
5353

@@ -83,7 +83,7 @@ Collect the following logs:
8383

8484
- **System event logs**. Focus on entries for Event ID 5719 (Source: NetLogon).
8585

86-
- **NetLogon service logs**. If you need deeper analysis, turn NetLogon debugging on.
86+
- **NetLogon service logs**. If you need deeper analysis, turn on NetLogon debugging.
8787

8888
### Collecting system event logs
8989

0 commit comments

Comments
 (0)