R
R_K_D_2020
Hi Team,
We are experiencing the event id 40960 from half the Windows 10 workstations - ( These workstations are spread across different sites ) . Though the sites were having a local domain controller before , due to some issues , these local DC's were removed and now the workstation from these sites are connected to the main domain controller .
"The Security System detected an authentication error for the server cifs/dc04. The failure code from authentication protocol Kerberos was "No authority could be contacted for authentication. (0x80090311)".
The user can log on to the workstation , but unable to get the mapped drives workings , GPO not getting applied etc.
Even if we browse from these workstation, to any of the DC's "netlogon" folder , it is prompting for the user name and password.
Have tried the following and still could not get the issue resolved -
DCDIAG - no error reported from the DC's ( two DC's are at the main site) - Windows 2016 DC's & DNS
nltest - no error
dns - no error
etc
From the client - when getting the following error for nltest /dclist
nltest /dclist:MYDC.LAZ
Get list of DCs in domain 'MYDC.LAZ' from '\\LES-EXC02.MYDC.LAZ'.
Cannot DsBind to mydc.laz (\\LAZ-EXC02.MYDC.LAZ).Status = 2148074320 0x80090350 SEC_E_DOWNGRADE_DETECTED.
Removed the WS and added back to the domain
Checked the MTU Size and no fragmentation at all
Checked the Tech forum and could not find a resolution relating to the fault I am facing .
Please help since I am hit the wall
Continue reading...
We are experiencing the event id 40960 from half the Windows 10 workstations - ( These workstations are spread across different sites ) . Though the sites were having a local domain controller before , due to some issues , these local DC's were removed and now the workstation from these sites are connected to the main domain controller .
"The Security System detected an authentication error for the server cifs/dc04. The failure code from authentication protocol Kerberos was "No authority could be contacted for authentication. (0x80090311)".
The user can log on to the workstation , but unable to get the mapped drives workings , GPO not getting applied etc.
Even if we browse from these workstation, to any of the DC's "netlogon" folder , it is prompting for the user name and password.
Have tried the following and still could not get the issue resolved -
DCDIAG - no error reported from the DC's ( two DC's are at the main site) - Windows 2016 DC's & DNS
nltest - no error
dns - no error
etc
From the client - when getting the following error for nltest /dclist
nltest /dclist:MYDC.LAZ
Get list of DCs in domain 'MYDC.LAZ' from '\\LES-EXC02.MYDC.LAZ'.
Cannot DsBind to mydc.laz (\\LAZ-EXC02.MYDC.LAZ).Status = 2148074320 0x80090350 SEC_E_DOWNGRADE_DETECTED.
Removed the WS and added back to the domain
Checked the MTU Size and no fragmentation at all
Checked the Tech forum and could not find a resolution relating to the fault I am facing .
Please help since I am hit the wall
Continue reading...