If you log on to an Active Directory-integrated domain controller, the logon process may be very slow.
After you start the DNS snap-in, the domain name may not be displayed under Forward Lookup Zone.
After you restart the server, only administrators may be able to gain access to the server.
In addition to these symptoms, the following event ID messages may be logged in the DNS event log:
Event ID 4000 Description: The DNS server was unable to open Active Directory. This DNSserver is configured to obtain and use information from the directory forthis zone and is unable to load the zone without it. Check that the ActiveDirectory is functioning properly and reload the zone. The event data is the error code.
Event ID 4013 The DNS server was unable to open the Active Directory. This DNS server isconfigured to use directory service information and cannot operate withoutaccess to the directory. The DNS server will wait for the directory to start. If the DNS server is started but the appropriate event has not been logged, then the DNS server is still waiting for the directory to start.
Furthermore, if you try to add an Active Directory-integrated zone to DNS, you may receive the following error message:
DNS The zone cannot be created. The Active Directory service is not available.
When you try to force Active Directory replication by using Active Directory Sites and Services, you receive the following error message:
The following error occurred during the attempt to synchronize naming context NC DN from domain controller DC1 to domain controller DC2: Access is denied. The operation will not continue
This problem can occur if all of the following conditions are true:
The Security log has reached the maximum log sizethat you specify.
You set either of the following settings in the Security log:
Overwrite events older than xx days (where xx is the number of days that you specify)
Do not overwrite events
You set the Shut down system immediately if unable to log security audits Group Policy setting.
You enable security auditing.
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
To resolve this issue:
Start Registry Editor (Regedt.32.exe).
Locate and click the following registry key for the domain controller:
If the registry data type for CrashOnAuditFail is set to REG_NONE and the data value is set to 2, change the data type to REG_DWORD, and then set the data value to 0.
This step provides a temporary solution until you disable the Group Policy setting.
Disable the following Group Policy setting on either the default domain or the domain controller organizational unit:
Computer Configuration\Windows Settings\Security Settings\local Policies\Security Options\Shut down your system immediately if unable to log security audits
This policy can be found on the default domain policy, default domain controller policy, and local security policy.
NOTE: Even if you disable this policy setting, make the registry change that is described in step 2.
Disable security auditing.
If you cannot disable security auditing, archive the Security log and clear the log.
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
If you set the Shut down system immediately if unable to log security audits Group Policy setting, the CrashOnAuditFail registry value is automatically set to 1. However, if you shut down the server and then restart it, the CrashOnAuditFail registry data type is set to REG_NONE and the data value is set to 2. If you change the CrashOnAuditFail data type to REG_DWORD and set the data value to 0, the DNS snap-in can gain access to the Active Directory-integrated DNS. If you set the CrashOnAuditFail data value to 0 (disable), after you reapply the Group Policy setting, the data value is set to 1 again.
Even if you set the Security log size to 4 gigabytes (GB), the symptoms that are described in the "Summary" section of this article can occur if the Security log size reaches 200 to 300 megabytes (MB).
For more information about the problem that is described in this article, click the following article numbers to view the articles in the Microsoft Knowledge Base: