KB5066014—Netlogon RPC Hardening (CVE-2025-49716)
CVE-2025-49716 addresses a Denial-of-Service vulnerability where remote unauthenticated users could make a series of Netlogon-based Remote Procedure Calls (RPC) that eventually consume all memory on a Domain Controller (DC).
KB5021130: How to manage the Netlogon protocol changes related to CVE ...
The Netlogon Remote Protocol remote procedure call (RPC) interface is primarily used to maintain the relationship between a device and its domain , and relationships among domain controllers (DCs) and domains. This update protects Windows devices from CVE-2022-38023 by default.
How to manage the changes in Netlogon secure channel connections ...
To provide AD forest protection, all DCs, must be updated since they will enforce secure RPC with Netlogon secure channel. This includes read-only domain controllers (RODC). To learn more about the vulnerability, see CVE-2020-1472.
The Net Logon service does not start in Windows Server 2003 or in ...
Fixes an issue in which the Net Logon service does not start in Windows Server 2003 or in Windows Server 2008 after you restart the computer.
KB5020276—Netjoin: Domain join hardening changes - Microsoft Support
Before you install the October 11, 2022, or later cumulative updates, the client computer queries Active Directory for an existing account with the same name. This query occurs during domain join and computer account provisioning. If such an account exists, the client will automatically attempt to reuse it.
NetLogon 3210 events are logged after MSA renews it password in Windows ...
Fixes a problem that generates NetLogon 3210 events. Occurs after the Managed Service Account (MSA) renews its password in Windows 7 SP1 and Windows Server 2008 R2 SP1.
NetLogon 3210 events are logged after MSA renews its password in ...
Fixes an issue in which NetLogon 3210 events are generated after the MSA renews its password in Windows Server 2012 R2.
MS15-071: Vulnerability in Netlogon could allow elevation of privilege ...
This security update resolves a vulnerability in Windows that could allow elevation of privilege if an attacker who has access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC).
You are intermittently prompted for credentials or experience time-outs ...
To resolve the issue, use one or more of the following methods: Install the following hotfix, and then follow the steps that are described in the "Registry information" section.
A domain controller returns the "NO_SUCH_USER (0xc0000064)" status code ...
Fixes an authentication request issue that occurs when the domain controller is shutting down or restarting in Windows Server 2008.