KB5066014—Netlogon RPC Hardening (CVE-2025-49716)
CVE-2025-49716 addresses a Denial-of-Service vulnerability where remote unauthenticated users could make a series of Netlogon-based Remote Procedure Calls (RPC) that eventually consume all memory on a Domain Controller (DC).
KB5021130: How to manage the Netlogon protocol changes related to CVE ...
The Netlogon Remote Protocol remote procedure call (RPC) interface is primarily used to maintain the relationship between a device and its domain , and relationships among domain controllers (DCs) and domains. This update protects Windows devices from CVE-2022-38023 by default.
How to manage the changes in Netlogon secure channel connections ...
To provide AD forest protection, all DCs, must be updated since they will enforce secure RPC with Netlogon secure channel. This includes read-only domain controllers (RODC). To learn more about the vulnerability, see CVE-2020-1472.
KB5020276—Netjoin: Domain join hardening changes - Microsoft Support
Before you install the October 11, 2022, or later cumulative updates, the client computer queries Active Directory for an existing account with the same name. This query occurs during domain join and computer account provisioning. If such an account exists, the client will automatically attempt to reuse it.
NetLogon 3210 events are logged after MSA renews it password in Windows ...
Fixes a problem that generates NetLogon 3210 events. Occurs after the Managed Service Account (MSA) renews its password in Windows 7 SP1 and Windows Server 2008 R2 SP1.
July 8, 2025—KB5062572 (OS Build 20348.3932) - Microsoft Support
[Microsoft RPC Netlogon protocol] This update includes a security hardening change to the Microsoft RPC Netlogon protocol. This change improves security by tightening access checks for a set of remote procedure call (RPC) requests.
NetLogon 3210 events are logged after MSA renews its password in ...
Fixes an issue in which NetLogon 3210 events are generated after the MSA renews its password in Windows Server 2012 R2.
You are intermittently prompted for credentials or experience time-outs ...
To resolve the issue, use one or more of the following methods: Install the following hotfix, and then follow the steps that are described in the "Registry information" section.
MS15-071: Vulnerability in Netlogon could allow elevation of privilege ...
This security update resolves a vulnerability in Windows that could allow elevation of privilege if an attacker who has access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC).
Script to help in monitoring event IDs related to changes in Netlogon ...
To do this, open Event Viewer by selecting Start, type event viewer and select it. Once Event Viewer opens, expand Windows Logs, right click or long press on System and select Save All Events As... and save the file somewhere to allow processing of the file. The script can process more than one EVTX file at a time if you would like.