You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/windows-security/event-id-5719-when-netlogon-service-restarts.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Event ID 5719 occurs when the NetLogon service restarts
3
-
description: Helps you diagnose Event ID 5719 (NetLogon) that's logged when you restart the NetLogon service on Windows Server systems.
4
-
ms.date: 11/04/2025
3
+
description: Helps you diagnose Event ID 5719 (NetLogon) that's logged when the NetLogon service restarts on Windows Server 2025.
4
+
ms.date: 11/05/2025
5
5
manager: dcscontentpm
6
6
audience: itpro
7
7
ms.topic: troubleshooting
@@ -14,7 +14,7 @@ appliesto:
14
14
---
15
15
# Event ID 5719 occurs when the NetLogon service restarts
16
16
17
-
This article helps you diagnose and understand Event ID 5719 (NetLogon). Windows logs this event when you restart the NetLogon service on Windows Server systems. The event most commonly appears when Windows Server 2025-based member servers interact with domain controllers (DCs) that run earlier Windows Server versions.
17
+
This article helps you diagnose and understand Event ID 5719 (NetLogon). Windows logs this event when the NetLogon service restarts on Windows Server systems. The event typically appears when Windows Server 2025-based member servers interact with domain controllers that run earlier Windows Server versions.
18
18
19
19
## Symptoms
20
20
@@ -24,17 +24,17 @@ Each time the NetLogon service restarts on a Windows Server 2025 system, Windows
24
24
25
25
The event text might include the `0xC00000E5 (STATUS_INTERNAL_ERROR)` code.
26
26
27
-
The event doesn't persist. Windows establishes the secure channel to the DC. Then, normal domain operations resume.
27
+
The event doesn't persist. Windows establishes the secure channel to the domain controller. Then, normal domain operations resume.
28
28
29
29
The event occurs even though you didn't make any recent configuration, update, or software changes.
30
30
31
31
## Cause
32
32
33
-
When the NetLogon service restarts in mixed Windows Server environments (Windows Server 2025 and Windows Server 2022 or Windows Server 2019 DCs), Windows generates Event ID 5719. As long as the secure channel is established, this event is expected and harmless.
33
+
When the NetLogon service restarts in mixed Windows Server environments (Windows Server 2025 member servers and Windows Server 2022 or Windows Server 2019 domain controllers), Windows generates Event ID 5719. As long as the secure channel is established, this event is expected and harmless.
34
34
35
35
The error occurs because of protocol differences in Kerberos authentication support. The error doesn't indicate a functional problem unless it keeps occurring in circumstances other than the circumstances that this article discusses.
36
36
37
-
When a Windows Server 2025 member server tries to establish a secure channel to a DC that runs Windows Server 2022 or an earlier version, it starts the connection by using the new Kerberos authentication method. Older DCs don't support this new authentication Remote Procedure Call (RPC) call. Because of this lack of support, authentication fails and Windows logs Event ID 5719. In this situation, the system automatically falls back to the legacy NetLogon method to successfully establish the secure channel.
37
+
When a Windows Server 2025 member server tries to establish a secure channel to a domain controller that runs Windows Server 2022 or an earlier version, it starts the connection by using the new Kerberos authentication method. Older domain controllers don't support this new authentication Remote Procedure Call (RPC) call. Because of this lack of support, authentication fails and Windows logs Event ID 5719. In this situation, the system automatically falls back to the legacy NetLogon method to successfully establish the secure channel.
38
38
39
39
This sequence causes a single, harmless error event. You can safely ignore this event unless you also see ongoing authentication or connectivity problems.
40
40
@@ -49,9 +49,11 @@ Microsoft recognizes this event as expected in mixed-version environments. Micro
49
49
50
50
### Workaround (optional)
51
51
52
+
[!INCLUDE [Registry important alert](../../../includes/registry-important-alert.md)]
53
+
52
54
As part of the transition to Windows Server 2025 or newer DCs that support Kerberos for secure channel setup, temporarily configure the following registry setting. Configure this setting on Kerberos-capable member computers that also run NetLogon.
53
55
54
-
This change suppresses the logging of NetLogon Event ID 5719. Remove the registry setting after you deploy enough Windows Server 2025 or newer Kerberos-capable DCs in the domain to ensure reliable Kerberos-based secure channel establishment.
56
+
This change suppresses the logging of NetLogon Event ID 5719. After you deploy enough Windows Server 2025 or newer Kerberos-capable domain controllers in the domain to ensure reliable Kerberos-based secure channel establishment, remove the registry setting.
Apply this configuration only temporarily. Monitor it for removal after the domain environment is adequately updated.
78
+
Apply this configuration only temporarily. After the domain environment is adequately updated, remove the registry change.
77
79
78
80
## Collecting log data
79
81
@@ -101,19 +103,19 @@ To turn off logging, run the `nltest /dbflag:0x0` command.
101
103
102
104
## More information
103
105
104
-
The event is specific to Windows Server 2025 member servers that authenticate by using DCs that run earlier versions of Windows. In the same scenario, Windows Server 2019 and Windows Server 2022 don't log Event ID 5719.
106
+
The event is specific to Windows Server 2025 member servers that authenticate by using domain controllers that run earlier versions of Windows. In the same scenario, Windows Server 2019 and Windows Server 2022 don't log Event ID 5719.
105
107
106
-
Windows Server 2025 systems that authenticate by using Windows Server 2025 DCs don't log Event ID 5719.
108
+
Windows Server 2025 systems that authenticate by using Windows Server 2025 domain controllers don't log Event ID 5719.
107
109
108
110
### Log entries in NetLogon.log that trace the secure channel process
109
111
110
-
When Windows in initially tries to establish the secure channel, it uses Kerberos:
112
+
When Windows initially tries to establish the secure channel, it uses Kerberos. Windows logs an entry that resembles the following excerpt:
0 commit comments