Hello,
Thank you so much for posting here.
Deploy the August 11th updates to all applicable domain controllers (DCs) in the forest, including read-only domain controllers (RODCs). After deploying this update patched DCs will:
Begin enforcing secure RPC usage for all Windows-based device accounts, trust accounts and all DCs.
Log event IDs 5827 and 5828 in the System event log, if connections are denied.
Log event IDs 5830 and 5831 in the System event log, if connections are allowed by "Domain controller: Allow vulnerable Netlogon secure channel connections" group policy.
Event ID 5827 will be logged when a vulnerable Netlogon secure channel connection from a machine account is denied.
Addressing event IDs 5827 and 5828
By default, supported versions of Windows that have been fully updated should not be using vulnerable Netlogon secure channel connections. If one of these events is logged in the system event log for a Windows device:
1.Confirm that the device is running a supported versions of Windows.
2.Ensure the device is fully updated.
3.Check to ensure that Domain member: Digitally encrypt or sign secure channel data (always) is set to Enabled.
For more information, we could refer to:
https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc
For any question, please feel free to contact us.
Best regards,
Hannah Xiong
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.