Windows 24H2 Netlogon Event ID 5719

1,501 views
Skip to first unread message

Anthony Meluso

unread,
Feb 7, 2025, 1:45:20 PMFeb 7
to ntsys...@googlegroups.com
Hi all,

Testing Windows 24H2 in our environment and noticed each machine is reporting this error in the event log each time the service is started. We also discovered the machine password is not changed after 30 days. Our Windows 11 23H2 machines are not experiencing this issue with machine password rotations.

This computer was not able to set up a secure session with a domain controller in domain due to the following: 
An internal error occurred. 
This may lead to authentication problems. Make sure that this computer is connected to the network. If the problem persists, please contact your domain administrator

I found other posts online about this issue.


Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Wright, John M

unread,
Feb 7, 2025, 1:57:23 PMFeb 7
to ntsys...@googlegroups.com

Just a guess but could you be using NTLMv1?  Microsoft Phases Out NTLMv1 in Windows 11 24H2 and Server 2025

 

If so, you might explore requiring at least v2.

 

--

John Wright

IT Support Specialist

1800 Old Bluegrass Avenue, Louisville, KY 40215

502.708.9953

Please submit IT requests to Hazelwoo...@bluegrass.org

24 Hour Helpline 1.800.928.8000

  

CONFIDENTIALITY NOTICE: This message contains confidential information and is intended only for the individual(s) addressed in the message. If you are not the named addressee, you should not disseminate, distribute, or copy this e-mail. If you are not the intended recipient, you are notified that disclosing, distributing, or copying this e-mail is strictly prohibited.

 

From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> On Behalf Of Anthony Meluso
Sent: Friday, February 7, 2025 1:45 PM
To: ntsys...@googlegroups.com
Subject: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This is the first time you received an email from this sender (ame...@whrhs.org). Exercise caution when clicking links, opening attachments or taking further action, before validating its authenticity.

Secured by Check Point

--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CAPEMYtHwth8JekxG8CMHJnG37gq1aoTZTxp9S04xgnsAFd68ug%40mail.gmail.com.

Anthony Meluso

unread,
Feb 7, 2025, 2:00:11 PMFeb 7
to ntsys...@googlegroups.com
Hi John,

Do you mean this policy? I have enabled for years.

image.png

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Wright, John M

unread,
Feb 7, 2025, 2:10:44 PMFeb 7
to ntsys...@googlegroups.com

Yes, that’s it.  In that case, there’s this:  Win11 24H2 breaks LDAP authentication for Enterprise app - Windows - Spiceworks Community

 

A poster claims that he worked around it by giving domain\username instead of only username.  Strange if true but you can try it.

 

--

John Wright

IT Support Specialist

1800 Old Bluegrass Avenue, Louisville, KY 40215

502.708.9953

Please submit IT requests to Hazelwoo...@bluegrass.org

24 Hour Helpline 1.800.928.8000

  

CONFIDENTIALITY NOTICE: This message contains confidential information and is intended only for the individual(s) addressed in the message. If you are not the named addressee, you should not disseminate, distribute, or copy this e-mail. If you are not the intended recipient, you are notified that disclosing, distributing, or copying this e-mail is strictly prohibited.

 

From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> On Behalf Of Anthony Meluso
Sent: Friday, February 7, 2025 2:00 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This is the first time you received an email from this sender (ame...@whrhs.org). Exercise caution when clicking links, opening attachments or taking further action, before validating its authenticity.

Secured by Check Point

 

Hi John,

 

Do you mean this policy? I have enabled for years.

 

Anthony Meluso

unread,
Feb 7, 2025, 2:28:44 PMFeb 7
to ntsys...@googlegroups.com
Turned on debugging for Netlogon and noticed this after a restart of the service.

02/07 14:24:15 [SESSION] [1684] WHRHS: NlSessionSetup: Denied access as we could not authenticate with Kerberos 0xC002002E
02/07 14:24:15 [CRITICAL] [1684] Assertion failed: ClientSession->CsState == CS_IDLE (Source File: onecore\ds\netapi\svcdlls\logonsrv\server\lsrvutil.c, line 3963)
02/07 14:24:15 [SESSION] [1684] WHRHS: NlSessionSetup: Denied access as we could not authenticate with Kerberos (translated status) 0xC00000E5
02/07 14:24:15 [SESSION] [1684] WHRHS: NlSetStatusClientSession: Set connection status to c00000e5


Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

ODONNELL Aaron M

unread,
Feb 7, 2025, 2:36:28 PMFeb 7
to ntsys...@googlegroups.com

We have this exact same problem and netlogon error on 24H2 workstations and it started sometime in November when we began to roll out 24H2 in-place upgrades. We opened a ticket with Microsoft. They first told us create this registry key on workstations:

 

HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
UseKerberosForSecureChannels = 0 (REG_DWORD)

 

That got rid of the error message but didn’t fix the machine password issue. They’ve been “discussing” the issue internally since then and we haven’t gotten any updates on the ticket.

 

We’ve since gone back to 23H2 while we wait for resolution.

 

 

Thanks,

 

Aaron O’Donnell

 

 

From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> On Behalf Of Anthony Meluso
Sent: Friday, February 7, 2025 10:45
To: ntsys...@googlegroups.com
Subject: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This message was sent from outside the organization. Treat attachments, links and requests with caution. Be conscious of the information you share if you respond.

--

Anthony Meluso

unread,
Feb 7, 2025, 2:49:52 PMFeb 7
to ntsys...@googlegroups.com
Thanks Aaron, we will hold up our roll out here. What's interesting is that they asked you to disable UseKerberosForSecureChannels. Why lol? Isn't that the preferred way to issue tickets in a Windows domain?

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Kurt Buff

unread,
Feb 7, 2025, 2:56:41 PMFeb 7
to ntsys...@googlegroups.com
Whether or not that works, it's possible that the UPN would also work. Might also be worth a try.

Kurt

Anthony Meluso

unread,
Feb 7, 2025, 2:58:44 PMFeb 7
to ntsys...@googlegroups.com
Just to be clear other than the event being logged and the machine password not updating have not seen any trust related issues to logging into the computer... yet. I'm pretty sure that will happen if this is left unfixed.

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Kurt Buff

unread,
Feb 7, 2025, 3:10:14 PMFeb 7
to ntsys...@googlegroups.com
From what I've seen, 24H2 is snakebit. It reminds me of the even-numbered Service Packs for NT4 - so many problems.

Kurt

Anthony Meluso

unread,
Feb 7, 2025, 3:22:13 PMFeb 7
to ntsys...@googlegroups.com
Just looking some more at the debug log. I'm guess there is some flaw in how it determines the age of the machine password based on these two lines?

02/07 15:01:18 [MISC] [3000] DsGetDcName function returns 0 (client PID=1440): Dom:WHRHS Acct:(null) Flags: DS RET_DNS 
02/07 15:01:18 [MISC] [12268] NlpStoreKeyInDS: Key already provisioned in DS, nothing to do
02/07 15:01:18 [MISC] [12268] NlProvisionMachineAuthKey: Successfully provisioned the machine auth key


Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Lieckfeldt.Sven

unread,
Feb 10, 2025, 3:40:04 AMFeb 10
to ntsys...@googlegroups.com

What could be the impact for the end user? The machine password is not expiring, so logon will not be a problem, right?

Von: ntsys...@googlegroups.com <ntsys...@googlegroups.com> Im Auftrag von Anthony Meluso
Gesendet: Freitag, 7. Februar 2025 21:22
An: ntsys...@googlegroups.com
Betreff: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

Achtung! Externe E-Mail. Bitte mit Links und Anhängen aufpassen!

ODONNELL Aaron M

unread,
Feb 10, 2025, 4:23:17 PMFeb 10
to ntsys...@googlegroups.com

Assuming the domain trust is actually fine and working despite the error message and the machine password not changing, the end user probably won’t really see an issue, at least not according to this: Secure Channel/Expired Machine Account Password Concerns – Revisited | Microsoft Community Hub

 

It complicates our efforts to locate stale AD objects because we scan for computers with a machine password of -60 days to determine if the object should be deleted, and now we have hundreds of active PCs that haven’t reset their password since October even though they’re online on-prem and in use every day.

 

Thanks,

 

Aaron O’Donnell

 

 

From: 'Lieckfeldt.Sven' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Monday, February 10, 2025 00:40
To: ntsys...@googlegroups.com
Subject: AW: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This message was sent from outside the organization. Treat attachments, links and requests with caution. Be conscious of the information you share if you respond.

What could be the impact for the end user? The machine password is not expiring, so logon will not be a problem, right?

Lieckfeldt.Sven

unread,
Feb 11, 2025, 4:07:28 AMFeb 11
to ntsys...@googlegroups.com

Oh, I didn’t think about cleaning up computers. You’re right. That’s not good. We have such a job in place, which could lead to trouble…

 

Thanks,

Sven 

Charles F Sullivan

unread,
Feb 11, 2025, 11:47:48 AMFeb 11
to ntsys...@googlegroups.com
In a test lab I have a Windows 2025 AD running with a Windows 11 24H2 VM as a client. The 5719 events don't happen on that workstation. It was joined to that domain just under 30 days ago, so it will be a couple of days before it attempts to change its password, which I assume will succeed.

I have one such workstation in our Windows 2019 domain, which was joined to AD just a few days ago. It's getting the 5719 events, but I was able to manually change its password. I'm not sure if letting the machine change its own password might behave differently.





--

Charlie Sullivan

Principal Windows Systems Administrator

Anthony Meluso

unread,
Feb 11, 2025, 11:58:29 AMFeb 11
to ntsys...@googlegroups.com
Hi Charles,

Thanks for testing this out. The more I look into this issue, it keeps coming back to the DC server version installed. We just moved our DCs to Windows Server 2022 this past summer, I have no intention to move them to 2025 with it being only a few months old.

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

ODONNELL Aaron M

unread,
Feb 11, 2025, 4:56:18 PMFeb 11
to ntsys...@googlegroups.com

We just got an update to our Microsoft ticket – they have this issue posted on their internal documentation system but not made public yet. The only interesting thing they noted is that Credential Guard being enabled might be a factor, and Server 2025 is affected as well as Win11 24H2.

 

All they gave us was telling us to either reset the machine password manually on all the affected systems with powershell (lol) or to use a group policy that just blocks the event ID 5719 from showing up in event viewer:

 

Workaround #2
On a wide scale we can disable the following policy as another workaround. This will prevent the machine from attempting to use the machine bound certificate for Kerberos auth entirely. That may or may not affect other things in the customer environment so test.
Computer Configuration\Administrative Templates\System\Kerberos Support device authentication using certificate

 

They’re “still investigating”

 

 

 

From: 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Tuesday, February 11, 2025 08:47
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This message was sent from outside the organization. Treat attachments, links and requests with caution. Be conscious of the information you share if you respond.

Anthony Meluso

unread,
Feb 11, 2025, 5:42:30 PMFeb 11
to ntsys...@googlegroups.com
If they made this public, adoption of 24H2 would drop to zero. Thanks for keeping us updated.

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School 
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962


From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> on behalf of ODONNELL Aaron M <Aaron.M....@odot.oregon.gov>
Sent: Tuesday, February 11, 2025 4:56:09 PM
To: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
Subject: RE: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719
 

Charles F Sullivan

unread,
Feb 11, 2025, 5:42:30 PMFeb 11
to ntsys...@googlegroups.com
Thanks for the update. We have a couple of Windows 2025 member servers and I see event 5719 after each reboot. I hadn't thought to check until now.

susan.eli...@gmail.com

unread,
Feb 11, 2025, 7:40:57 PMFeb 11
to ntsysadmin
Mind if I make this a bit more public? Firstly to cc to the patchmanagement list and then to start making this more known.

I HATE the quiet support cases but there's nothing on the "known issues" section yet.

ODONNELL Aaron M

unread,
Feb 11, 2025, 8:14:13 PMFeb 11
to ntsys...@googlegroups.com

Fine with me. I first saw mention of this in a reddit post from December about the same error message but not specifically the machine password issue (NETLOGON 5719 after W11 24H2 : r/sysadmin) so it kind of seems like this has been known for a while but we were told the internal document was dated yesterday 2/10 so who knows.

 

susan.eli...@gmail.com

unread,
Feb 11, 2025, 9:46:52 PMFeb 11
to ntsysadmin
BTW credential guard is not a factor.  I have a 24H2 that I see that event and I don't have credential guard running on that machine.

Markus Klocker

unread,
Feb 12, 2025, 12:24:58 AMFeb 12
to ntsys...@googlegroups.com
We have VBS disabled so no CredGuard.
I picked one machine with 24H2 that has this event but only after installing the machine.
At some point the event doesn't occur any more.

The issue has been introduced with 24H2 it seems cause 23H2 don't have the event.

    Markus

Charles F Sullivan

unread,
Feb 12, 2025, 12:00:34 PMFeb 12
to ntsys...@googlegroups.com

I think that if you reboot that 24H2 machine you *will* still see the 5719 error a minute or two after the machine starts. I've been watching this for a couple of weeks and without exception a reboot of Win11 24H2 or Windows Server 2025 throws the error.

 

Charles F Sullivan

unread,
Feb 12, 2025, 2:09:56 PMFeb 12
to ntsys...@googlegroups.com
I think that if you reboot that 24H2 machine you *will* still see the 5719 error a couple of minutes after the machine starts. I've been watching this for a couple of weeks and without exception a reboot of Win11 24H2 or Windows Server 2025 throws the error.

On Wed, Feb 12, 2025 at 12:24 AM Markus Klocker <markus....@univie.ac.at> wrote:

Anthony Meluso

unread,
Feb 20, 2025, 2:29:51 PMFeb 20
to ntsys...@googlegroups.com
Checking if there has been an update from Microsoft on this issue. I know a Preview CU was posted but did not see anything mentioned around this issue.

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

ODONNELL Aaron M

unread,
Feb 20, 2025, 2:41:57 PMFeb 20
to ntsys...@googlegroups.com

Nope. We’ve been asking for our ticket to be escalated past tier one but we’re getting the usual runaround and zero progress that we seem to get from msft support lately.

 

 

Thanks,

 

Aaron O’Donnell

 

Michael B. Smith

unread,
Feb 20, 2025, 2:43:30 PMFeb 20
to ntsys...@googlegroups.com

I haven’t checked since Monday, but there wasn’t as of then.

Anthony Meluso

unread,
Feb 24, 2025, 9:16:07 AMFeb 24
to ntsys...@googlegroups.com

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

ODONNELL Aaron M

unread,
Mar 7, 2025, 12:31:09 PMMar 7
to ntsys...@googlegroups.com

We got an update on the issue after it got escalated to someone in microsoft support past their useless tier 1 support that actually understood the issue. It turns out … it’s actually two issues, and we now have them both after some testing:

 

Issue #1

Machine does not change password at defined interval.

 

This occurs because the machine has Credential Guard enabled and has been able to provision itself a machine certificate for use with Active Directory.  During the password change it is using the machine certificate the authenticate and obtain the kadmin/changepw ticket.  However, credential guard is blocking the attempt to get that ticket.

 

Workarounds:

  1. Manually reset the computer password from the machine.
  2. Disable the machine use of machine bound certificate for authentication via GPO.  This forces the machine to use the machine password for the password change instead of the machine bound certificate with Kerberos.  This does not affect other uses of certificates like for SSL connections.

Computer Configuration\Administrative Templates\System\Kerberos - Support device authentication using certificate – Disable

Issue #2

Machine changing password can crash lsass and cause the machine to reboot if the following auditing is configured in Advanced Audit Policies

Object Access Auditing -> Audit Other Object Access Events

 

Workarounds:

  1. Configure the following object Access to NOT audit for in Advanced Audit Policies for the following category.

Object Access Auditing -> Audit Other Object Access Events

  1. Temporarily disable the machine from attempting to change the password via GPO.

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options - Domain member: Disable machine account password changes – Enable

 

 

We haven’t tried any of the workaround yet. Still no ETA on a resolution or apparent public acknowledgement of this problem.

 

 

 

Thanks,

 

Aaron O’Donnell

 

From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> On Behalf Of Anthony Meluso
Sent: Monday, February 24, 2025 6:16 AM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This message was sent from outside the organization. Treat attachments, links and requests with caution. Be conscious of the information you share if you respond.

Anthony Meluso

unread,
Mar 7, 2025, 1:38:22 PMMar 7
to ntsys...@googlegroups.com
Both of these workarounds suck lol. We have Credential Guard enabled since Windows 11 22H2 and machine passwords updated just fine. It's only on Windows 11 24H2 does this now become a problem. Not even going to bother to test this. I'm not even sure how disabling "Kerberos - Support device authentication using certificate" could impact us in other ways and lessen our security posture. The second issue we have not seen since we do not have Advanced Auditing configured for client workstations, just DCs.

I'm not sure why they haven't publicly acknowledged this yet. It's 100% reproducible. We will continue to sit on 23H2.

Thanks for following up Aaron.

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Charles F Sullivan

unread,
Mar 10, 2025, 5:32:04 PMMar 10
to ntsys...@googlegroups.com
On the couple of Windows 2025 servers we have, I see the 5719 events at startup, but I see that the servers have updated their passwords on their own. Both have Credential Guard enabled. I figured I would need to manually update the passwords for now. Not sure why this is.

Anthony Meluso

unread,
Mar 19, 2025, 7:00:35 PMMar 19
to ntsys...@googlegroups.com
Microsoft released a preview of April CU yesterday, KB5053656 (Releasing Windows 11 Build 26100.3613 to the Release Preview Channel | Windows Insider Blog). There are two fixed items that could be related to this issue. I am waiting for this to become available in the catalog to test.

image.png
image.png

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

ODONNELL Aaron M

unread,
Mar 20, 2025, 2:40:29 PMMar 20
to ntsys...@googlegroups.com

Since we have an open ticket still I queried msft and got this response:

 

There is nothing in the preview release mentioned that would directly address the machine password rotation question that I can find.”

 

Sorry to be the bearer of bad news. I got excited too hoping this would be a fix.

 

Thanks,

 

Aaron O’Donnell

 

From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> On Behalf Of Anthony Meluso
Sent: Wednesday, March 19, 2025 4:00 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This message was sent from outside the organization. Treat attachments, links and requests with caution. Be conscious of the information you share if you respond.

Microsoft released a preview of April CU yesterday, KB5053656 (Releasing Windows 11 Build 26100.3613 to the Release Preview Channel | Windows Insider Blog). There are two fixed items that could be related to this issue. I am waiting for this to become available in the catalog to test.

 


Anthony Meluso

unread,
Mar 20, 2025, 2:43:05 PMMar 20
to ntsys...@googlegroups.com
Bah! I'm still going to test it when it's released to the catalog.

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Charles F Sullivan

unread,
Mar 20, 2025, 3:57:12 PMMar 20
to ntsys...@googlegroups.com
I have a couple of test VMs which hadn't been started up in a few weeks. One is Windows 11 24H2, the other Windows Server 2025. I started them both up today and got the same behavior on both. Despite the 5719 error, the computers changed their passwords.

You can see on the Windows 11 machine that the PW change happened a second after the error:

image.png

They belong to a Windows 2019 domain. Single forest, single domain, Windows 2016 functional level.

This makes it seem that it doesn't really have an impact for us.
 

Anthony Meluso

unread,
Mar 20, 2025, 4:48:10 PMMar 20
to ntsys...@googlegroups.com
What does the password last change attribute for that machine in Active Directory show? From the computers and users console?

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School 
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

From: 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Thursday, March 20, 2025 3:56:50 PM
To: ntsys...@googlegroups.com <ntsys...@googlegroups.com>

Charles F Sullivan

unread,
Mar 20, 2025, 5:15:23 PMMar 20
to ntsys...@googlegroups.com

Anthony Meluso

unread,
Mar 20, 2025, 6:03:40 PMMar 20
to ntsys...@googlegroups.com
I just used Powershell to check for machine passwords over 30 days old. I did notice a few 24H2 machines are correctly updating their machine passwords. But the vast majority are not. No idea why.

Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Anthony Meluso

unread,
Apr 8, 2025, 6:20:16 PMApr 8
to ntsys...@googlegroups.com
Looks like Microsoft finally identified the issue and this month's CU helps to resolve it, WI1050811. I can confirm 24H2 machines are updating their passwords again!


Take care,

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

Charles F Sullivan

unread,
Apr 9, 2025, 12:01:48 PMApr 9
to ntsys...@googlegroups.com
I'm still getting the 5719 errors after installing the CU. I can't find any here that are having trouble changing passwords, so I can't report any changes with that.

Lieckfeldt.Sven

unread,
Apr 10, 2025, 8:35:58 AMApr 10
to ntsys...@googlegroups.com

I still see the error 5719 as well.

But password change for the client has worked after CU installation.

 

Cheers,

Sven 

Von: 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com>
Gesendet: Mittwoch, 9. April 2025 18:01
An: ntsys...@googlegroups.com
Betreff: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

Achtung! Externe E-Mail. Bitte mit Links und Anhängen aufpassen!

I'm still getting the 5719 errors after installing the CU. I can't find any here that are having trouble changing passwords, so I can't report any changes with that.

 

On Tue, Apr 8, 2025 at 6:20PM Anthony Meluso <ame...@whrhs.org> wrote:

Looks like Microsoft finally identified the issue and this month's CU helps to resolve it, WI1050811. I can confirm 24H2 machines are updating their passwords again!

 

 

Take care,

 

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

 

 

On Thu, Mar 20, 2025 at 6:03PM Anthony Meluso <ame...@whrhs.org> wrote:

I just used Powershell to check for machine passwords over 30 days old. I did notice a few 24H2 machines are correctly updating their machine passwords. But the vast majority are not. No idea why.

 

Take care,

 

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

 

 

On Thu, Mar 20, 2025 at 5:15PM 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com> wrote:

Same thing, as I would expect.

 

 

 

On Thu, Mar 20, 2025 at 4:48PM Anthony Meluso <ame...@whrhs.org> wrote:

What does the password last change attribute for that machine in Active Directory show? From the computers and users console?

 

Take care,

 

Anthony Meluso
Director of Technology
Watchung Hills Regional High School 
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

 


From: 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Thursday, March 20, 2025 3:56:50 PM
To: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
Subject: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

I have a couple of test VMs which hadn't been started up in a few weeks. One is Windows 11 24H2, the other Windows Server 2025. I started them both up today and got the same behavior on both. Despite the 5719 error, the computers changed their passwords.

 

You can see on the Windows 11 machine that the PW change happened a second after the error:

 

Charles F Sullivan

unread,
Apr 10, 2025, 10:32:41 AMApr 10
to ntsys...@googlegroups.com
In our environment I have not come across a Windows 11 24H2 or Windows 2025 machine that has failed to update its password once the 30 days has passed, so for us there seems to be nothing to fix. (We only have about 6 of these in total so it's easy to track.) 

This article does say that the current CU resolves the issue, consistent with what you're saying. It says devices using PKINT are susceptible, so maybe that's the difference.  Windows Server 2025 known issues and notifications | Microsoft Learn

James Iversen

unread,
May 5, 2025, 3:43:57 PMMay 5
to ntsys...@googlegroups.com
Has there been any traction to this issue? Am seeing similar behavior on domain and followed additional rabbit holes including new cert templates. Didn't make much progress. Thanks! 

ODONNELL Aaron M

unread,
May 5, 2025, 5:07:11 PMMay 5
to ntsys...@googlegroups.com

Once we applied the April CU for 24h2, the machine passwords started updating again: Windows 11, version 24H2 known issues and notifications | Microsoft Learn

 

The microsoft tech in our ticket basically told us to just ignore that event log error if the machine password is updating (which ours are) so that’s what we’ve been doing.

 

 

Thanks,

 

Aaron O’Donnell

James Iversen

unread,
May 5, 2025, 9:37:34 PMMay 5
to ntsys...@googlegroups.com, ntsys...@googlegroups.com
I’ll look into the update as it may have already been installed. That 5719 is bugging me tho. Every time I see an error in the system logs related to authentication or policy processing my hair stands on end. 
Thank you sir!
Sent from my iPhone

On May 5, 2025, at 5:07 PM, ODONNELL Aaron M <Aaron.M....@odot.oregon.gov> wrote:



<image001.png>

 

 

On Thu, Mar 20, 2025 at 4:48PM Anthony Meluso <ame...@whrhs.org> wrote:

What does the password last change attribute for that machine in Active Directory show? From the computers and users console?

 

Take care,

 

Anthony Meluso
Director of Technology
Watchung Hills Regional High School 
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

 


From: 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Thursday, March 20, 2025 3:56:50 PM
To: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
Subject: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

I have a couple of test VMs which hadn't been started up in a few weeks. One is Windows 11 24H2, the other Windows Server 2025. I started them both up today and got the same behavior on both. Despite the 5719 error, the computers changed their passwords.

 

You can see on the Windows 11 machine that the PW change happened a second after the error:

 

<image002.png>

 

They belong to a Windows 2019 domain. Single forest, single domain, Windows 2016 functional level.

 

This makes it seem that it doesn't really have an impact for us.
 

On Thu, Mar 20, 2025 at 2:43PM Anthony Meluso <ame...@whrhs.org> wrote:

Bah! I'm still going to test it when it's released to the catalog.

 

Take care,

 

Anthony Meluso
Director of Technology
Watchung Hills Regional High School
108 Stirling Rd.
Warren, NJ 07059
908-647-4800 Ext. 4962

 

 

On Thu, Mar 20, 2025 at 2:40PM ODONNELL Aaron M <Aaron.M....@odot.oregon.gov> wrote:

Since we have an open ticket still I queried msft and got this response:

 

There is nothing in the preview release mentioned that would directly address the machine password rotation question that I can find.”

 

Sorry to be the bearer of bad news. I got excited too hoping this would be a fix.

 

Thanks,

 

Aaron O’Donnell

 

From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> On Behalf Of Anthony Meluso
Sent: Wednesday, March 19, 2025 4:00 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Windows 24H2 Netlogon Event ID 5719

 

This message was sent from outside the organization. Treat attachments, links and requests with caution. Be conscious of the information you share if you respond.

Microsoft released a preview of April CU yesterday, KB5053656 (Releasing Windows 11 Build 26100.3613 to the Release Preview Channel | Windows Insider Blog). There are two fixed items that could be related to this issue. I am waiting for this to become available in the catalog to test.

 

<image003.png>

<image004.png>

<image005.png>

Reply all
Reply to author
Forward
0 new messages