After promoting new domain controller. cannot no longer log into it, unless in directory recovery mode.

Anonymous
2024-03-15T20:38:09+00:00

Have replicated this issue on multiple new server using both Windows server 2019 and 2022. Before promotion no issue logging in on domain, but after promotion it fails and no useful errors are logged.

After recent Windows updates, we seem to be having issues with our Windows Server 2016 domain controllers. After recent updates were installed, on server restarts we are unable to log into domain controllers normally (nothing happens when hitting enter after typing credentials, no error) We are able to start the server with the network card disabled and then log in (sometimes). Once logged in we are able to re-enable the network card and resume normal function.

To address this issue we were just going to build new domain controllers to replace the existing ones. However when promoting the new server to domain controllers we run into the authentication issue again. The promotion process appears to complete with error. We can see the new domain controllers in active directory and no errors are given during the promotion process.

Server can be joined to the domain without any problem. This issue seems to only affect domain controllers specifically. Once promoted to domain controller we cannot authenticate on the server anymore and need to use directory recovery mode to log in and demote the server.

Please help!

Windows for business | Windows Server | Directory services | Active Directory

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question. To protect privacy, user profiles for migrated questions are anonymized.

0 comments No comments
{count} votes

7 answers

Sort by: Most helpful
  1. Anonymous
    2024-03-18T06:52:27+00:00

    Hi Avi Markowitz,

    Thank you for posting in the Microsoft Community Forum.

    It sounds like you're encountering persistent authentication issues after promoting new servers to domain controllers, specifically on Windows Server 2019 and 2022, and experiencing difficulties even after joining the domain without any problem. Here are some steps you can take to troubleshoot and potentially resolve this issue:

    1. **Review Windows Updates**: Since the issue seems to have started after recent Windows updates, review the updates that were installed on both the domain controllers and the newly promoted servers. Look for any updates that might be related to authentication, networking, or domain services. Consider rolling back these updates to see if it resolves the issue.
    2. **Check Group Policy Settings**: Ensure that there are no conflicting or misconfigured Group Policy settings that could be affecting authentication on the domain controllers. Pay special attention to policies related to security settings, network settings, and domain controller configuration.
    3. **Verify DNS Configuration**: Double-check the DNS settings on both the domain controllers and the newly promoted servers. Ensure that they are pointing to the correct DNS servers and that DNS resolution is working properly. Check for any DNS issues that might be preventing proper domain controller authentication.
    4. **Examine Active Directory Replication**: Verify that Active Directory replication is functioning correctly between all domain controllers in your environment. Use tools like Repadmin or Active Directory Sites and Services to check for any replication errors or issues.
    5. **Review Event Logs**: Look for any relevant error or warning messages in the event logs on both the domain controllers and the newly promoted servers. Pay attention to events related to authentication, domain services, and networking.
    6. **Check System Time Synchronization**: Ensure that the system time is synchronized across all domain controllers and member servers. Time discrepancies can cause authentication issues in Active Directory environments.
    7. **Test Authentication with Different Accounts**: Try logging in to the affected servers using different domain accounts, including administrative accounts and regular user accounts, to see if the issue is account-specific or affecting all authentication attempts.
    8. **Consider Firewall and Antivirus Settings**: Review the firewall and antivirus settings on both the domain controllers and the newly promoted servers. Ensure that there are no rules or policies blocking necessary network traffic or interfering with domain authentication processes.

    By carefully reviewing these areas and performing targeted troubleshooting steps, you should be able to identify and resolve the authentication issues you're experiencing with your domain controllers and newly promoted servers.

    Best regards

    Neuvi Jiang

    0 comments No comments
  2. Anonymous
    2024-04-02T16:12:34+00:00

    Hi Avi,

    We've had this exact same issue, and it took me quite a while before I figured out what was happening.

    I found out that if you promote a Windows Server 2022 system without the 'Azure Arc Setup' feature installed, everything completes without issues, but after the mandatory reboot we were unable to log in on the newly created DC in any way (not via RDP or on the console).

    Installing the Azure Arc Setup feature after having promoted the system doesn't seem to solve the issue.

    I demoted the system using server manager from another DC, installed this feature, promoted it back to DC, and everything was fine after that.

    I haven't checked with Server 2019 but I wouldn't be surprised if it's the same issue.

    I'm starting to get more and more annoyed with Microsoft wanting all systems to be Internet connected, while there are very good reasons not to want that....

    I hope this information solves your issue.

    Regards,

    Dennis

    0 comments No comments
  3. Anonymous
    2024-05-07T01:44:27+00:00

    Hi,

    Any idea how to recover from this issue when all the DCs have this issue that same time and we can't get remote/console and PowerShell access to servers?

    we have 2 DC on win 2022 and both face this problem (first this happen on secondary server) and today it happens on main DC.

    Regards

    Salehi

    0 comments No comments
  4. Anonymous
    2024-05-20T08:29:39+00:00

    on an azure-vm domain controller: add Azure Virtual Machine Extension 'InstallOpenSSH'

    ssh to server with admin creds, switch to 'powershell' and run this command (#uninstalling-azure-arc-setup)

    • Disable-WindowsOptionalFeature -Online -FeatureName AzureArcSetup

    after restart, rdp works as expected :-)

    0 comments No comments
  5. Anonymous
    2024-05-24T01:23:52+00:00

    I had a similar issue in azure. Removing the Azure AD based Windows Login extension that was there prior allowed me to log in with the domain\administrator account.

    0 comments No comments