Something here could help.
also check the required ports are flowing between networks.
--please don't forget to upvote
and Accept as answer
if the reply is helpful--
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Would appreciate any assistance on this as it's extremely frustrating.
Thanks in advance.
Problem:
Approximately 25 workstations are losing the ability to authenticate against their local domain controller. Here is the cycle: Reboot client>>Log into Domain>>time goes by (4-12 hours)>>client loses the ability to 1) access network shares, 2) login a user (receives the domain not available message)>>Reboot client>> repeat cycle.
Background:
Approximately 30 workstations (HP desktops with Windows 10) at 3 sites connected with Meraki VPNs. 3 physical servers 1 per site Server 2019. 3 Domain controllers 1 per site (VMs on Hyper V) Server 2019, 2 File Servers VMs on Hyper V(Server 2019), 1 Application Server VM Server 2012R2. DHCP and DNS are provided by the local DC. No other DNS servers are handed to the clients.
This is happening at all 3 sites, but most testing has been at site 2.
Troubleshooting and known work arounds:
(0x80090311)".
Something here could help.
also check the required ports are flowing between networks.
--please don't forget to upvote
and Accept as answer
if the reply is helpful--
Please run;
Dcdiag /v /c /d /e /s:%computername% >C:\dcdiag.log
(run on PDC emulator)
repadmin /showrepl >C:\repl.txt
(run on any domain controller)
ipconfig /all > C:\%computername%.txt
(run on EVERY domain controller)
ipconfig /all > C:\problemworkstation.txt
(run on problem pc)
Also check the domain controller System and Replication (DFS or FRS) event logs for errors since last boot. Post the Event Source and Event IDs of any found. (no evtx files)
then put unzipped
text files up on OneDrive and share a link.
I found the culprit. It was BitDefender Network Protection Module. It apparently blocked all the DCs. I'll include the specific triggers so it hopefully will help someone else in the future. Detection Name Exploit.PentestingTool.HTTP.3 Attack Technique lateralMovement
Thank you all very much for your help!