Skip to content

Commit 75e8094

Browse files
Merge pull request #10150 from MicrosoftDocs/main
Auto Publish – main to live - 2025-11-08 02:00 UTC
2 parents e66fb25 + 99507b7 commit 75e8094

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

support/windows-server/active-directory/restrict-ad-rpc-traffic-to-specific-port.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ Restart the computer for the new setting to become effective.
6262
Restart the Netlogon service for the new setting to become effective.
6363

6464
> [!NOTE]
65-
> When you use the `DCTcpipPort` registry entry, and you set it to the same port as the `TCP/IP Port` registry entry, you receive Netlogon error event 5809 under `NTDS\Parameters`. This indicates that the port configured is in use, and you should choose a different port.
65+
> When you use the `DCTcpipPort` registry entry, and you set it to the same port as the `TCP/IP Port` registry entry, Netlogon error event 5809 is logged in the system log. This error indicates that the configured port is in use, and you should choose a different port.
6666
67-
You'll receive the same event when you have a unique port, and you restart the Netlogon service on the domain controller. This behavior is by design. It occurs because of the way the RPC runtime manages its server ports. The port will be used after the restart, and the event can be ignored.
67+
You'll receive the same event when you have a unique port, and you restart the Netlogon service on the domain controller. This behavior is by design. It occurs because of the way the RPC runtime manages its server ports. The port will be used after the restart, and the event can be safely ignored.
6868

6969
Administrators should confirm that the communication over the specified port is enabled if any intermediate network devices or software is used to filter packets between the domain controllers.
7070

0 commit comments

Comments
 (0)