XGEN: The "DisableNetLogonCheck" Registry Value and How to Use It

Article translations Article translations
Article ID: 320228 - View products that this article applies to.
This article was previously published under Q320228
This article has been archived. It is offered "as is" and will no longer be updated.
IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:
256986 Description of the Microsoft Windows Registry
Expand all | Collapse all

SUMMARY

This article provides information about the DisableNetlogonCheck registry value and how to use it.

MORE INFORMATION

WARNING: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.


The version of DSAccess that is included with Exchange 2000 Server Service Pack 2 (SP2) and later makes a call to the NetLogon service of each domain controller and global catalog server that DSAccess discovers. This is a remote procedure call (RPC) from the Exchange 2000 server to the domain controller. Therefore, the call fails if RPC connectivity is blocked.

DSAccess recognizes that the port is probably blocked and still considers the domain controller "up." However, each call takes an unusually long time to fail. Each call also degrades DSAccess startup and failover performance.

You can use the DisableNetlogonCheck registry value to turn off this check against all of the domain controllers and save the time that it takes to make the failed calls. The DisableNetlogonCheck registry value is very useful on any server that does not have RPC connectivity to all of the domain controllers in the same site as the Exchange 2000 server. To use the DisableNetlogonCheck registry value, you have to edit the registry.

To disable the calls to the NetLogon service for each domain controller and global catalog server that Exchange 2000 discovers, add the DisableNetlogonCheck value:
  1. Start Registry Editor (Regedt32.exe).
  2. Locate and click the following key in the registry:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSExchangeDSAccess
  3. On the Edit menu, click Add Value, and then add the following registry value:
    Value name: DisableNetlogonCheck
    Data type: REG_DWORD
    Value data: 1
  4. Quit Registry Editor.
For more information, click the following article numbers to view the articles in the Microsoft Knowledge Base:
320529 Using DSAccess in a perimeter network firewall scenario requires a registry key setting
246175 The role of DSAccess in Exchange 2000 Server
307413 General information on Exchange Management Service
More information is also available in the Microsoft Exchange 2000 Server Service Pack 2 Release Notes. You can find that information at the following Microsoft Web site:
http://www.microsoft.com/exchange/downloads/2000/sp2/RNotes_us.htm#DSA

Properties

Article ID: 320228 - Last Review: October 24, 2013 - Revision: 5.3
APPLIES TO
  • Microsoft Exchange 2000 Server Service Pack 2
Keywords: 
kbnosurvey kbarchive kbhowto KB320228

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com