This article describes an update for Windows Server 2012 R2-based or Windows Server 2012-based domain controller dated April 2016 that addresses the following issues:
-
Issue 1 Faster insertions to the change notification queue. See details.
-
Issue 2 Renames of domain-joined computers that are running Microsoft SQL Server may fail if the rename operation is serviced by Windows Server 2012 R2 DCs. See details.
-
Issue 3 Single logons are reported incorrectly in Active Directory as two logons. See details.
-
Issue 4 LSSAS access violation occurs with error "0xC0000005" when targeted by AAD Connect clients that run "full import". See details.
-
Issue 5 LSASS access violation occurs when it is targeted by recursive LDAP query against an AD group. See details.
Prerequisites section.
Before you install this update, see theIssues that are fixed in this update
Issue 1 Faster inserts to Active Directory change notification queue delays servicing of Asynchronous Thread Queue (ATQ) thread pool, LDAP queries, and notification based replication.Â
When this condition is true, domain controller (DC) Local Security Authority Subsystem Service (LSASS) consumes high CPU usage or 100% CPU usage in extreme cases. The following operations are blocked when change notification queues develop on a given DC:-
Active Directory Replication triggered by change notification is delayed.
-
ATQ thread registration or unregistration is delayed.
-
Writes to the DC are blocked.
-
When the insertion string is ongoing, the processing of the notification queue is also blocked. Notification based replication is blocked during this operation.
-
CPU usage for the LSASS process runs cold on DCs as all multiple operations are blocked and the only thread gets CPU time as Active Directory replication.
This update includes an upper limit on the number of change notification items that a domain controller will add to the queue. Once this threshold is reached, the DC will respond with "ERROR_DS_ADMIN_LIMIT_EXCEEDED". By default, the threshold is 4096. The following registry key can be added to modify this threshold as needed:
HKEY_LOCAL_MACHINE\CCS\Services\NTDS\Parameters DWORD "Maximum Concurrent LDAP Notifications"A maximum value for change notifications that's too low could result in unnecessary failures to change notification clients. Therefore, it's important to determine the "normal" range of this counter prior to implementing the hotfix. To establish the upper range of the change notification queue, consider monitoring the DS Notify Queue Size counter on all domain controllers in the forest to determine peak values. security update 3160352.
Consider a buffer of at least 25% on top of the peak value experienced while monitoring this counter to determine an appropriate value of Maximum Concurrent LDAP Notifications. Note The fix for this issue is included inÂIssue 2Â Renames of domain-joined Microsoft SQL Server member computers fails with error "The directory service is busy". This issue occurs when the following conditions are true:
-
Microsoft SQL Server is installed on a Windows-based computer that is joined to an Active Directory domain.
-
The Service Principal Name (SPN) that's registered by Microsoft SQL Server or Microsoft SQL Express contains non-numeric characters after the ":" delimiter in the SPN attribute of the computer account that's being renamed.
-
The computer that is hosting Microsoft SQL Server is renamed in Control Panel.
-
A Windows Server 2012 R2 domain controller services the rename operation.
Similarly, adding an alternative computer name also fails. And the NetDom add computername command fails with the following an on-screen error:
Unable to add newhost.domain.com as an alternate name for the computer
The error is: The requested resource is in use. The command failed to complete successfully.update 3152220. Issue 3 A single logon attempt on the website is counted as two logon attempts in Active Directory. Therefore, count of incorrect password increases by two instead of by one. Issue 4 LSASS access violation occurs together with error "0xc0000005" on Windows Server 2012 R2 DCs targeted by Azure AD Connect identity sync clients that run "Full Import". When a user runs "Full Import" on Azure AD Connect identity sync client against a Windows Server 2012 R2-based DC, access violation occurs on LSASS process, and the DC restarts with error code "0xc0000005". This issue occurs when the Active Directory Recycle Bin is disabled. For more information about this issue, see update 3145339. Issue 5 Lsass.exe crashes on a DC with an access violation when a user runs a recursive Lightweight Directory Access Protocol (LDAP) query against an Active Directory group that has many nested groups. An example of a query that can trigger this kind of crash is as follows:
For more information about this issue, seeldifde -f t.txt -d "dc=contoso,dc=com" -r "(memberof:memberID:=cn=cn,cn=cn,dc=contoso,dc=com)"
How to get this update
Important If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
Method 1: Windows Update
This update is provided as a Recommended update on Windows Update. For more information on how to run Windows Update, see How to get an update through Windows Update.
Method 2: Microsoft Update Catalog
To get the stand-alone package for this update, go to one of the following Microsoft Update Catalog websites:
Note You must be running Microsoft Internet Explorer 6.0 or later.
Update detail information
Prerequisites
To install this update, you should first install April 2014, update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 (2919355) in Windows Server 2012 R2. Note The update should be installed on Windows Server 2012 R2-based or Windows Server 2012-based computers that are hosting the Active Directory domain services (ADDS) domain controller role.
Registry information
To apply this update, you don't have to make any changes to the registry.
Restart requirement
You may have to restart the computer after you apply this update.
Update replacement information
This update doesn't replace a previously released update.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
References
Learn about the terminology that Microsoft uses to describe software updates.
File Information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. security update 3160352.
Note For the file attributes of Windows Server 2012, seeNotes
-
The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
Version
Product
Milestone
Service branch
6.3.960 0.18 xxx
Windows Server 2012 R2
RTM
GDR
-
GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
-
The MANIFEST files (.manifest) and the MUM files (.mum) that are installed for each environment are listed in the "Additional file information" section. MUM, MANIFEST, and the associated security catalog (.cat) files, are very important to maintain the state of the updated components. The security catalog files, for which the attributes are not listed, are signed with a Microsoft digital signature.
x64 Windows Server 2012 R2
File name |
File version |
File size |
Date |
Time |
Platform |
SP requirement |
Service branch |
---|---|---|---|---|---|---|---|
Dsparse.dll |
6.3.9600.18264 |
30,208 |
10-Mar-2016 |
17:03 |
x64 |
SPA |
AMD64_MICROSOFT-WINDOWS-D..ORYSERVICES-DSP |
Ntdsa.mof |
Not applicable |
227,765 |
18-Jun-2013 |
14:45 |
Not applicable |
None |
Not applicable |
Ntdsai.dll |
6.3.9600.18264 |
3,688,960 |
10-Mar-2016 |
16:35 |
x64 |
None |
Not applicable |
Dsparse.dll |
6.3.9600.18264 |
24,064 |
10-Mar-2016 |
16:48 |
x86 |
SPA |
X86_MICROSOFT-WINDOWS-D..ORYSERVICES-DSP |
x64 Windows Server 2012 R2
File property |
Value |
---|---|
File name |
Amd64_3ef9ed1c8590f18a3bf33c09005c0f1f_31bf3856ad364e35_6.3.9600.18264_none_960b72d9006ce7ae.manifest |
File version |
Not applicable |
File size |
715 |
Date (UTC) |
11-Mar-2016 |
Time (UTC) |
06:59 |
Platform |
Not applicable |
File name |
Amd64_a0f821498d30bf5782ea5bdd17d82c0d_31bf3856ad364e35_6.3.9600.18264_none_d759f7b093fc696a.manifest |
File version |
Not applicable |
File size |
717 |
Date (UTC) |
11-Mar-2016 |
Time (UTC) |
06:59 |
Platform |
Not applicable |
File name |
Amd64_b54e6887a3b63dc95598e1202abb7c85_31bf3856ad364e35_6.3.9600.18264_none_dc56a5e0793b4723.manifest |
File version |
Not applicable |
File size |
716 |
Date (UTC) |
11-Mar-2016 |
Time (UTC) |
06:59 |
Platform |
Not applicable |
File name |
Amd64_microsoft-windows-d..oryservices-dsparse_31bf3856ad364e35_6.3.9600.18264_none_40eb9734562e9403.manifest |
File version |
Not applicable |
File size |
2,613 |
Date (UTC) |
10-Mar-2016 |
Time (UTC) |
19:25 |
Platform |
Not applicable |
File name |
Amd64_microsoft-windows-d..toryservices-ntdsai_31bf3856ad364e35_6.3.9600.18264_none_e19a12598d09c94c.manifest |
File version |
Not applicable |
File size |
3,356 |
Date (UTC) |
10-Mar-2016 |
Time (UTC) |
19:25 |
Platform |
Not applicable |
File name |
Update.mum |
File version |
Not applicable |
File size |
2,465 |
Date (UTC) |
11-Mar-2016 |
Time (UTC) |
06:59 |
Platform |
Not applicable |
File name |
X86_microsoft-windows-d..oryservices-dsparse_31bf3856ad364e35_6.3.9600.18264_none_e4ccfbb09dd122cd.manifest |
File version |
Not applicable |
File size |
2,609 |
Date (UTC) |
10-Mar-2016 |
Time (UTC) |
18:57 |
Platform |
Not applicable |