Skip to content

Commit a1cc07d

Browse files
authored
Update event-id-5719-when-netlogon-service-restarts.md
Edit review per CI 7124
1 parent 83c8b14 commit a1cc07d

File tree

1 file changed

+18
-20
lines changed

1 file changed

+18
-20
lines changed

support/windows-server/windows-security/event-id-5719-when-netlogon-service-restarts.md

Lines changed: 18 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Event ID 5719 occurs when the NetLogon service restarts
3-
description: Helps you diagnose and understand Event ID 5719 (NetLogon). Windows logs this event when you restart the NetLogon service on Windows Server systems. The event appears especially when Windows Server 2025 member servers interact with domain controllers that run earlier Windows Server versions.
3+
description: Helps you diagnose Event ID 5719 (NetLogon) that's logged when you restart the NetLogon service on Windows Server systems.
44
ms.date: 11/04/2025
55
manager: dcscontentpm
66
audience: itpro
@@ -14,7 +14,7 @@ appliesto:
1414
---
1515
# Event ID 5719 occurs when the NetLogon service restarts
1616

17-
This article helps you diagnose and understand Event ID 5719 (NetLogon). Windows logs this event when you restart the NetLogon service on Windows Server systems. The event appears especially when Windows Server 2025 member servers interact with domain controllers that run earlier Windows Server versions.
17+
This article helps you diagnose and understand Event ID 5719 (NetLogon). Windows logs this event when you restart the NetLogon service on Windows Server systems. The event most commonly appears when Windows Server 2025-based member servers interact with domain controllers (DCs) that run earlier Windows Server versions.
1818

1919
## Symptoms
2020

@@ -24,36 +24,34 @@ Each time the NetLogon service restarts on a Windows Server 2025 system, Windows
2424
2525
The event text might include the `0xC00000E5 (STATUS_INTERNAL_ERROR)` code.
2626

27-
The event doesn't persist. Windows establishes the secure channel with the domain controller. Normal domain operations then resume.
27+
The event doesn't persist. Windows establishes the secure channel to the DC. Then, normal domain operations resume.
2828

2929
The event occurs even though you didn't make any recent configuration, update, or software changes.
3030

3131
## Cause
3232

33-
When the NetLogon service restarts in mixed Windows Server environments (Windows Server 2025 vs. Windows Server 2022 or Windows Server 2019 domain controllers), Windows generates Event ID 5719. As long as the secure channel is established, this event is expected and harmless.
33+
When the NetLogon service restarts in mixed Windows Server environments (Windows Server 2025 and Windows Server 2022 or Windows Server 2019 DCs), Windows generates Event ID 5719. As long as the secure channel is established, this event is expected and harmless.
3434

35-
The error happens because of protocol differences in Kerberos authentication support. The error doesn't indicate a functional problem unless it keeps occurring in circumstances other than those that this article describes.
35+
The error occurs because of protocol differences in Kerberos authentication support. The error doesn't indicate a functional problem unless it keeps occurring in circumstances other than those that this article discusses.
3636

37-
When a Windows Server 2025 member server tries to establish a secure channel with a domain controller that runs Windows Server 2022 or an earlier version, it starts the connection by using the new Kerberos authentication method. Older domain controllers don't support this new authentication Remote Procedure Call (RPC) call. Because of this lack of support, authentication fails and Windows logs Event ID 5719. The system automatically falls back to the legacy NetLogon method. This method succeeds in establishing the secure channel.
37+
When a Windows Server 2025 member server tries to establish a secure channel to a DC that runs Windows Server 2022 or an earlier version, it starts the connection by using the new Kerberos authentication method. Older DCs don't support this new authentication Remote Procedure Call (RPC) call. Because of this lack of support, authentication fails and Windows logs Event ID 5719. In this situation, the system automatically falls back to the legacy NetLogon method to successfully establish the secure channel.
3838

39-
This sequence results in a single, harmless error event. You can ignore this event unless you also see ongoing authentication or connectivity problems.
39+
This sequence causes a single, harmless error event. You can safely ignore this event unless you also see ongoing authentication or connectivity problems.
4040

4141
## Resolution
4242

43-
If Event ID 5719 occurs only once when NetLogon restarts and the secure channel is established (domain operations proceed without issue), this event is harmless. You can safely ignore it.
44-
45-
Don't try remediation unless you see other persistent authentication or secure channel issues.
43+
Event ID 5719 might occur only one time when NetLogon restarts and the secure channel is established (domain operations proceed without any issues). In this case, the event is harmless. Don't try remediation unless you see other persistent authentication or secure channel issues.
4644

4745
Microsoft recognizes this event as expected in mixed-version environments. Microsoft might suppress or clarify this event in future updates or documentation.
4846

4947
> [!IMPORTANT]
50-
> If the error recurs outside of NetLogon restarts or coincides with domain trust or authentication failures, investigate further. Collect the log data as described in [Collecting log data](#collecting-log-data), and then contact Microsoft Support.
48+
> If the error recurs outside of NetLogon restarts, or it coincides with domain trust or authentication failures, investigate further. Collect the log data, as described in [Collecting log data](#collecting-log-data), and then contact Microsoft Support.
5149
5250
### Workaround (optional)
5351

54-
As part of the transition to Windows Server 2025 or newer domain controllers that support Kerberos for secure channel setup, temporarily configure the following registry setting. Configure this setting on Kerberos-capable member computers that also run NetLogon.
52+
As part of the transition to Windows Server 2025 or newer DCs that support Kerberos for secure channel setup, temporarily configure the following registry setting. Configure this setting on Kerberos-capable member computers that also run NetLogon.
5553

56-
This change suppresses the logging of NetLogon Event ID 5719. Once you deploy enough Windows Server 2025 or newer Kerberos-capable DCs in the domain to ensure reliable Kerberos-based secure channel establishment, remove the registry setting.
54+
This change suppresses the logging of NetLogon Event ID 5719. Remove the registry setting after you deploy enough Windows Server 2025 or newer Kerberos-capable DCs in the domain to ensure reliable Kerberos-based secure channel establishment.
5755

5856
- **Registry subkey**: `HKLM\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters`
5957

@@ -63,7 +61,7 @@ This change suppresses the logging of NetLogon Event ID 5719. Once you deploy en
6361
- Type: `REG_DWORD`
6462
- Value: `0`
6563

66-
To use a Windows Command Line prompt to apply this change, run the following command:
64+
To use a Windows command-line prompt to apply this change, run the following command:
6765

6866
```console
6967
reg add "HKLM\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters" /v UseKerberosForSecureChannels /t REG_DWORD /d 0 /f
@@ -75,7 +73,7 @@ To use a Windows PowerShell prompt to apply this fix, run the following command:
7573
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters" -Name "UseKerberosForSecureChannels" -Value 0 -Type DWord
7674
```
7775

78-
Apply this configuration only temporarily. Monitor it for removal once the domain environment is adequately updated.
76+
Apply this configuration only temporarily. Monitor it for removal after the domain environment is adequately updated.
7977

8078
## Collecting log data
8179

@@ -103,19 +101,19 @@ To turn off logging, run the `nltest /dbflag:0x0` command.
103101

104102
## More information
105103

106-
The event is specific to Windows Server 2025 member servers that authenticate by using domain controllers that run earlier versions of Windows. In the same scenario, Windows Server 2019 and Windows Server 2022 don't log Event ID 5719.
104+
The event is specific to Windows Server 2025 member servers that authenticate by using DCs that run earlier versions of Windows. In the same scenario, Windows Server 2019 and Windows Server 2022 don't log Event ID 5719.
107105

108-
Windows Server 2025 systems that authenticate by using Windows Server 2025 domain controllers don't log Event ID 5719.
106+
Windows Server 2025 systems that authenticate by using Windows Server 2025 DCs don't log Event ID 5719.
109107

110108
### Log entries in NetLogon.log that trace the secure channel process
111109

112-
When Windows first tries to establish the secure channel, it uses Kerberos:
110+
When Windows in initially tries to establish the secure channel, it uses Kerberos:
113111

114112
```output
115113
[INIT] [10664] UseKerberosForSecureChannels = TRUE
116114
```
117115

118-
When Windows tries to connect to the domain controller the first time, it receives an error message that resembles the following log excerpt:
116+
When Windows initially tries to connect to the DC, it receives an error message that resembles the following log excerpt:
119117

120118
```output
121119
[SESSION] [3036] CONTOSO: NlDiscoverDc: Found DC \\CONTOSODC.CONTOSO.com
@@ -129,7 +127,7 @@ When Windows tries to connect to the domain controller the first time, it receiv
129127
[SESSION] [3036] CONTOSO: NlSessionSetup: Session setup Failed[AC3]
130128
```
131129

132-
Windows tries to create the secure channel again. This time, it works. Windows logs entries that resemble the following excerpt:
130+
Windows tries again to create the secure channel. This time, it works. Windows logs entries that resemble the following excerpt:
133131

134132
```output
135133
[SESSION] [10664] CONTOSO: NlSessionSetup: Try Session setup

0 commit comments

Comments
 (0)