Microsoft-Windows-Security-Netlogon

31 events across 2 channels

Event IDTitleChannel
4004Domain Controller Blocked: NTLM authentication to this domain controller is …Operational
4005Domain Controller Blocked: NTLM authentication to this domain controller is …Operational
4006Domain Controller Blocked: NTLM authentication to this domain controller is …Operational
4030The DC DCName processed a network NTLM authentication involving an account from …Operational
4030Operational
4031The DC DCName processed a network NTLM authentication involving an account from …Operational
4031Operational
4032The DC DCName processed a forwarded NTLM authentication request originating from …Operational
4032Operational
4033The DC DCName processed a forwarded NTLM authentication request originating from …Operational
4033Operational
8004Domain Controller Blocked Audit: Audit NTLM authentication to this domain …Operational
8005Domain Controller Blocked Audit: Audit NTLM authentication to this domain …Operational
8006Domain Controller Blocked Audit: Audit NTLM authentication to this domain …Operational
9000Netlogon failed to retrieve the password for account AccountName in domain …Operational
9001The account Account cannot be used as managed service account on the local …Operational
9002Netlogon failed to add Account as a managed service account to this local …Operational
9003Netlogon failed to remove the managed service account Account from this local …Operational
9004A total of RequestsRejected DC locator queries were rejected since the last …Operational
9005Secure channel setup has failed with Kerberos: Status.Operational
9006Secure channel setup has failed : Status.Operational
9007Netlogon is currently configured to allow mailslot messages to be used when …Operational
9008Netlogon is currently configured to listen for mailslot messages sent by clients …Operational
9009Netlogon was unable to find the domain name 'DomainName' using any of the known …Operational
9010Netlogon discovered a DC using the Netbios protocol.Operational
9011Netlogon successfully downloaded the latest administrator-configured domain name …Operational
9012Netlogon failed to download the latest administrator-configured domain name …Operational
9013Netlogon successfully downloaded the latest trusted-domain-based domain name …Operational
9014Netlogon failed to download the latest trusted-domain-based domain name …Operational
9015Netlogon denied an RPC call.Operational
9016Netlogon allowed an RPC call that normally would have been denied.Operational

Event ID 4004 — Domain Controller Blocked: NTLM authentication to this domain controller is blocked.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
BlockingNTLM

Description

Domain Controller Blocked: NTLM authentication to this domain controller is blocked.

Message #

Domain Controller Blocked: NTLM authentication to this domain controller is blocked.
Secure Channel name: %1
User name: %2
Domain name: %3
Workstation name: %4
Secure Channel type: %5

NTLM authentication within the domain %3 is blocked.

If you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.

If you want to allow NTLM authentication requests only to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain as an exception to use NTLM authentication.

Fields #

NameDescription
Secure_Channel_name UnicodeString
User_name UnicodeString
Domain_name UnicodeString
Workstation_name UnicodeString
Secure_Channel_type UInt32
SChannelName UnicodeString
UserName UnicodeString
DomainName UnicodeString
WorkstationName UnicodeString
SChannelType UInt32

Event ID 4005 — Domain Controller Blocked: NTLM authentication to this domain controller is blocked.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
BlockingNTLM

Description

Domain Controller Blocked: NTLM authentication to this domain controller is blocked.

Message #

Domain Controller Blocked: NTLM authentication to this domain controller is blocked.
Secure Channel name: %1
User name: %2
Domain name: %3
Workstation name: %4
Secure Channel type: %5

NTLM authentication within the domain %3 is blocked.

If you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.

If you want to allow NTLM authentication requests only to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain as an exception to use NTLM authentication.

Fields #

NameDescription
Secure_Channel_name UnicodeString
User_name UnicodeString
Domain_name UnicodeString
Workstation_name UnicodeString
Secure_Channel_type UInt32
SChannelName UnicodeString
UserName UnicodeString
DomainName UnicodeString
WorkstationName UnicodeString
SChannelType UInt32

Event ID 4006 — Domain Controller Blocked: NTLM authentication to this domain controller is blocked.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
BlockingNTLM

Description

Domain Controller Blocked: NTLM authentication to this domain controller is blocked.

Message #

Domain Controller Blocked: NTLM authentication to this domain controller is blocked.
Secure Channel name: %1
User name: %2
Domain name: %3
Workstation name: %4
Secure Channel type: %5

NTLM authentication within the domain %3 is blocked.

If you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.

If you want to allow NTLM authentication requests only to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain as an exception to use NTLM authentication.

Fields #

NameDescription
Secure_Channel_name UnicodeString
User_name UnicodeString
Domain_name UnicodeString
Workstation_name UnicodeString
Secure_Channel_type UInt32
SChannelName UnicodeString
UserName UnicodeString
DomainName UnicodeString
WorkstationName UnicodeString
SChannelType UInt32

Event ID 4030 — The DC DCName processed a network NTLM authentication involving an account from this domain.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC DCName processed a network NTLM authentication involving an account from this domain.

Message #

The DC %1 processed a network NTLM authentication involving an account from this domain.

Client Information:
	Client Name: %2
	Client Domain: %3
	Client Machine: %4

Server Information:
	Server Name: %5
	Server Domain: %6

Forwarded From:
	Secure Channel Type: %7
	Farside Name: %8
	Farside Domain: %9
	Farside IP: %10

NTLM Security:
	NTLM Version: %11
	Service Binding: %12
	Target Machine: %13
	Target Domain: %14
	Mic Status: %15
	Flags values: %16
	Flags: %17

Status: %18

For more information, see aka.ms/ntlmlogandblock

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ForwarderType UnicodeString
ForwarderName UnicodeString
ForwarderDomain UnicodeString
ForwarderIP UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 4030 —

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC processed a network NTLM authentication involving an account from this domain.

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ForwarderType UnicodeString
ForwarderName UnicodeString
ForwarderDomain UnicodeString
ForwarderIP UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 4031 — The DC DCName processed a network NTLM authentication involving an account from this domain.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC DCName processed a network NTLM authentication involving an account from this domain.

Message #

The DC %1 processed a network NTLM authentication involving an account from this domain.

Client Information:
	Client Name: %2
	Client Domain: %3
	Client Machine: %4

Server Information:
	Server Name: %5
	Server Domain: %6

Forwarded From:
	Secure Channel Type: %7
	Farside Name: %8
	Farside Domain: %9
	Farside IP: %10

NTLM Security:
	NTLM Version: %11
	Service Binding: %12
	Target Machine: %13
	Target Domain: %14
	Mic Status: %15
	Flags values: %16
	Flags: %17

Status: %18

For more information, see aka.ms/ntlmlogandblock

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ForwarderType UnicodeString
ForwarderName UnicodeString
ForwarderDomain UnicodeString
ForwarderIP UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 4031 —

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC processed a network NTLM authentication involving an account from this domain.

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ForwarderType UnicodeString
ForwarderName UnicodeString
ForwarderDomain UnicodeString
ForwarderIP UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 4032 — The DC DCName processed a forwarded NTLM authentication request originating from this domain.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC DCName processed a forwarded NTLM authentication request originating from this domain.

Message #

The DC %1 processed a forwarded NTLM authentication request originating from this domain.

Client Information:
	Client Name: %2
	Client Domain: %3
	Client Machine: %4

Server Information:
	Server Name: %5
	Server Domain: %6
	Server IP: %7
	Server OS: %8

NTLM Security:
	NTLM Version: %9
	Service Binding: %10
	Target Machine: %11
	Target Domain: %12
	Mic Status: %13
	Flags values: %14
	Flags: %15

Status: %16
Status Message: %17

For more information, see aka.ms/ntlmlogandblock

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ServerIP UnicodeString
ServerOS UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 4032 —

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC processed a forwarded NTLM authentication request originating from this domain.

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ServerIP UnicodeString
ServerOS UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 4033 — The DC DCName processed a forwarded NTLM authentication request originating from this domain.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC DCName processed a forwarded NTLM authentication request originating from this domain.

Message #

The DC %1 processed a forwarded NTLM authentication request originating from this domain.

Client Information:
	Client Name: %2
	Client Domain: %3
	Client Machine: %4

Server Information:
	Server Name: %5
	Server Domain: %6
	Server IP: %7
	Server OS: %8

NTLM Security:
	NTLM Version: %9
	Service Binding: %10
	Target Machine: %11
	Target Domain: %12
	Mic Status: %13
	Flags values: %14
	Flags: %15

Status: %16
Status Message: %17

For more information, see aka.ms/ntlmlogandblock

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ServerIP UnicodeString
ServerOS UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 4033 —

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

The DC processed a forwarded NTLM authentication request originating from this domain.

Fields #

NameDescription
DCName UnicodeString
AccountName UnicodeString
AccountDomain UnicodeString
AccountMachine UnicodeString
ServerName UnicodeString
ServerDomain UnicodeString
ServerIP UnicodeString
ServerOS UnicodeString
NtlmVersion UnicodeString
ServiceBinding UnicodeString
TargetMachine UnicodeString
TargetDomain UnicodeString
MicStatus UnicodeString
AvFlags HexInt32
AvFlagsStr UnicodeString
Status HexInt32NTSTATUS reference
StatusMsg UInt32

Event ID 8004 — Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.

Message #

Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.
Secure Channel name: %1
User name: %2
Domain name: %3
Workstation name: %4
Secure Channel type: %5

Audit NTLM authentication requests within the domain %3 that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to any of the Deny options.

If you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.

If you want to allow NTLM authentication requests to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in the domain %3 to which clients are allowed to use NTLM authentication.

Fields #

NameDescription
Secure_Channel_name UnicodeString
User_name UnicodeString
Domain_name UnicodeString
Workstation_name UnicodeString
Secure_Channel_type UInt32
SChannelName UnicodeString
UserName UnicodeString
DomainName UnicodeString
WorkstationName UnicodeString
SChannelType UInt32

Event ID 8005 — Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.

Message #

Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.
Secure Channel name: %1
User name: %2
Domain name: %3
Workstation name: %4
Secure Channel type: %5

Audit NTLM authentication requests within the domain %3 that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to any of the Deny options.

If you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.

If you want to allow NTLM authentication requests to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in the domain %3 to which clients are allowed to use NTLM authentication.

Fields #

NameDescription
Secure_Channel_name UnicodeString
User_name UnicodeString
Domain_name UnicodeString
Workstation_name UnicodeString
Secure_Channel_type UInt32
SChannelName UnicodeString
UserName UnicodeString
DomainName UnicodeString
WorkstationName UnicodeString
SChannelType UInt32

Event ID 8006 — Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
AuditingNTLM

Description

Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.

Message #

Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.
Secure Channel name: %1
User name: %2
Domain name: %3
Workstation name: %4
Secure Channel type: %5

Audit NTLM authentication requests within the domain %3 that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to any of the Deny options.

If you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.

If you want to allow NTLM authentication requests to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in the domain %3 to which clients are allowed to use NTLM authentication.

Fields #

NameDescription
Secure_Channel_name UnicodeString
User_name UnicodeString
Domain_name UnicodeString
Workstation_name UnicodeString
Secure_Channel_type UInt32
SChannelName UnicodeString
UserName UnicodeString
DomainName UnicodeString
WorkstationName UnicodeString
SChannelType UInt32

Event ID 9000 — Netlogon failed to retrieve the password for account AccountName in domain AccountDomain.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Level
Error
Task
MSA

Description

Netlogon failed to retrieve the password for account AccountName in domain AccountDomain. Status.

Message #

Netlogon failed to retrieve the password for account %1 in domain %2. %3

Fields #

NameDescription
AccountName UnicodeString
AccountDomain UnicodeString
Status UInt32NTSTATUS reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Netlogon",
    "guid": "E5BA83F6-07D0-46B1-8BC7-7E669A1D31DC",
    "event_source_name": "",
    "event_id": 9000,
    "version": 0,
    "level": 2,
    "task": 3,
    "opcode": 0,
    "keywords": 4611686018427387904,
    "time_created": "2026-03-13T20:17:37.552321+00:00",
    "event_record_id": 1,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 7024
    },
    "channel": "Microsoft-Windows-Security-Netlogon/Operational",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "event_data": {
    "AccountName": ".\\domainadmin",
    "AccountDomain": "NULL",
    "Status": 3221225524
  },
  "message": ""
}

Event ID 9001 — The account Account cannot be used as managed service account on the local machine because not all the supported encryption types of the account are sup...

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
MSA

Description

The account Account cannot be used as managed service account on the local machine because not all the supported encryption types of the account are supported by the local machine.

Message #

The account %1 cannot be used as managed service account on the local machine because not all the supported encryption types of the account are supported by the local machine.

Fields #

NameDescription
Account UnicodeString

Event ID 9002 — Netlogon failed to add Account as a managed service account to this local machine.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
MSA

Description

Netlogon failed to add Account as a managed service account to this local machine. Status.

Message #

Netlogon failed to add %1 as a managed service account to this local machine. %2

Fields #

NameDescription
Account UnicodeString
Status UInt32NTSTATUS reference

Event ID 9003 — Netlogon failed to remove the managed service account Account from this local machine.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
MSA

Description

Netlogon failed to remove the managed service account Account from this local machine. Status.

Message #

Netlogon failed to remove the managed service account %1 from this local machine. %2

Fields #

NameDescription
Account UnicodeString
Status UInt32NTSTATUS reference

Event ID 9004 — A total of RequestsRejected DC locator queries were rejected since the last reported event because they would have exceeded the configured maximum on concurrent ...

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

A total of RequestsRejected DC locator queries were rejected since the last reported event because they would have exceeded the configured maximum on concurrent network discovery operations.

Message #

A total of %1 DC locator queries were rejected since the last reported event because they would have exceeded the configured maximum on concurrent network discovery operations.

Fields #

NameDescription
RequestsRejected UInt32

Event ID 9005 — Secure channel setup has failed with Kerberos: Status.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
Securechannelsetup

Description

Secure channel setup has failed with Kerberos: Status. Falling back to Netlogon.

Message #

Secure channel setup has failed with Kerberos: %1. Falling back to Netlogon.

Fields #

NameDescription
Status UInt32NTSTATUS reference

Event ID 9006 — Secure channel setup has failed : Status.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
Securechannelsetup

Description

Secure channel setup has failed : Status. Protocol used: Protocol.

Message #

Secure channel setup has failed : %1. Protocol used: %2.

Fields #

NameDescription
Status UInt32NTSTATUS reference
Protocol UnicodeString
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP

Event ID 9007 — Netlogon is currently configured to allow mailslot messages to be used when locating domain controllers.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon is currently configured to allow mailslot messages to be used when locating domain controllers. This mode is unsecure and will be deprecated and removed in a future release.

Message #

Netlogon is currently configured to allow mailslot messages to be used when locating domain controllers. This mode is unsecure and will be deprecated and removed in a future release.

See https://aka.ms/dclocatornetbiosdeprecation for more information.

Event ID 9008 — Netlogon is currently configured to listen for mailslot messages sent by clients during a domain controller location operation.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Message #

Netlogon is currently configured to listen for mailslot messages sent by clients during a domain controller location operation. This mode is unsecure and will be deprecated and removed in a future release.

See https://aka.ms/dclocatornetbiosdeprecation for more information.

Event ID 9009 — Netlogon was unable to find the domain name 'DomainName' using any of the known domain name mapping sources.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon was unable to find the domain name 'DomainName' using any of the known domain name mapping sources. This may cause failures to locate domain controllers in that domain.

Message #

Netlogon was unable to find the domain name '%1' using any of the known domain name mapping sources. This may cause failures to locate domain controllers in that domain.

See https://aka.ms/dclocatornetbiosdeprecation for more information.

Fields #

NameDescription
DomainName UnicodeString

Event ID 9010 — Netlogon discovered a DC using the Netbios protocol.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon discovered a DC using the Netbios protocol. This mode is unsecure and will be deprecated and removed in a future release.

Message #

Netlogon discovered a DC using the Netbios protocol. This mode is unsecure and will be deprecated and removed in a future release.

DNS domain name:%1
Netbios domain name:%2

DC:%3


See https://aka.ms/dclocatornetbiosdeprecation for more information.

Fields #

NameDescription
DNSDomainName UnicodeString
DomainName UnicodeString
DomainController UnicodeString

Event ID 9011 — Netlogon successfully downloaded the latest administrator-configured domain name mappings.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon successfully downloaded the latest administrator-configured domain name mappings. Run 'nltest.exe /list_dclocmappings' to view the data.

Message #

Netlogon successfully downloaded the latest administrator-configured domain name mappings. Run 'nltest.exe /list_dclocmappings' to view the data.

See https://aka.ms/dclocatornetbiosdeprecation for more information.

Event ID 9012 — Netlogon failed to download the latest administrator-configured domain name mappings.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon failed to download the latest administrator-configured domain name mappings.

Message #

Netlogon failed to download the latest administrator-configured domain name mappings.

See https://aka.ms/dclocatornetbiosdeprecation for more information.

Event ID 9013 — Netlogon successfully downloaded the latest trusted-domain-based domain name mappings.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon successfully downloaded the latest trusted-domain-based domain name mappings. Run 'nltest.exe /list_dclocmappings' to view the data.

Message #

Netlogon successfully downloaded the latest trusted-domain-based domain name mappings. Run 'nltest.exe /list_dclocmappings' to view the data.

See https://aka.ms/dclocatornetbiosdeprecation for more information.

Event ID 9014 — Netlogon failed to download the latest trusted-domain-based domain name mappings.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon failed to download the latest trusted-domain-based domain name mappings.

Message #

Netlogon failed to download the latest trusted-domain-based domain name mappings.

See https://aka.ms/dclocatornetbiosdeprecation for more information.

Event ID 9015 — Netlogon denied an RPC call.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon denied an RPC call. The policy is in enforce mode.

Message #

Netlogon denied an RPC call. The policy is in enforce mode.

Client Information:
	Method name: %1
	Method opnum: %2
	Client address: %3
	Client identity: %4

For more information, see https://aka.ms/dclocatorrpcpolicy

Fields #

NameDescription
Method_name[Client Information] Method name.
Method_opnum[Client Information] Method opnum.
Client_address[Client Information] Client address.
Client_identity[Client Information] Client identity.
MethodName AnsiString
MethodOpnum UInt32
ClientAddress UnicodeString
ClientSid SID

Event ID 9016 — Netlogon allowed an RPC call that normally would have been denied.

Provider
Microsoft-Windows-Security-Netlogon
Channel
Operational
Task
LOCATOR

Description

Netlogon allowed an RPC call that normally would have been denied. The policy is in audit mode.

Message #

Netlogon allowed an RPC call that normally would have been denied. The policy is in audit mode.

Client Information:
	Method name: %1
	Method opnum: %2
	Client address: %3
	Client identity: %4

For more information, see https://aka.ms/dclocatorrpcpolicy

Fields #

NameDescription
Method_name[Client Information] Method name.
Method_opnum[Client Information] Method opnum.
Client_address[Client Information] Client address.
Client_identity[Client Information] Client identity.
MethodName AnsiString
MethodOpnum UInt32
ClientAddress UnicodeString
ClientSid SID