Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

DNS and AD error

Status
Not open for further replies.

muosman

Technical User
Jul 18, 2003
84
0
0
GB
I'm getting this 2 error in my new 2008 server and I simply don't know why. Any help welcome!

Log Name: DNS Server
Source: Microsoft-Windows-DNS-Server-Service
Date: 04/07/2008 22:09:31
Event ID: 4013
Task Category: None
Level: Warning
Keywords: Classic
User: N/A
Computer: CALAUS01.Caledus.local
Description:
The DNS server is waiting for Active Directory Domain Services (AD DS) to signal that the initial synchronization of the directory has been completed. The DNS server service cannot start until the initial synchronization is complete because critical DNS data might not yet be replicated onto this domain controller. If events in the AD DS event log indicate that there is a problem with DNS name resolution, consider adding the IP address of another DNS server for this domain to the DNS server list in the Internet Protocol properties of this computer. This event will be logged every two minutes until AD DS has signaled that the initial synchronization has successfully completed.

Error

Log Name: Directory Service
Source: Microsoft-Windows-ActiveDirectory_DomainService
Date: 04/07/2008 22:09:20
Event ID: 2886
Task Category: LDAP Interface
Level: Warning
Keywords: Classic
User: ANONYMOUS LOGON
Computer: CALAUS01.Caledus.local
Description:
The security of this directory server can be significantly enhanced by configuring the server to reject SASL (Negotiate, Kerberos, NTLM, or Digest) LDAP binds that do not request signing (integrity verification) and LDAP simple binds that are performed on a cleartext (non-SSL/TLS-encrypted) connection. Even if no clients are using such binds, configuring the server to reject them will improve the security of this server.

Some clients may currently be relying on unsigned SASL binds or LDAP simple binds over a non-SSL/TLS connection, and will stop working if this configuration change is made. To assist in identifying these clients, if such binds occur this directory server will log a summary event once every 24 hours indicating how many such binds occurred. You are encouraged to configure those clients to not use such binds. Once no such events are observed for an extended period, it is recommended that you configure the server to reject such binds.

For more details and information on how to make this configuration change to the server, please see
You can enable additional logging to log an event each time a client makes such a bind, including information on which client made the bind. To do so, please raise the setting for the "LDAP Interface Events" event logging category to level 2 or higher.



\\muos o(-_-)o
 
I am going to take a stab in the dark that there is more then one dc in your environment and the one with the issue points to itself for dns and didn't intially replicate properly when dcpromoed.

My other guess is one of the dc's hasn't replicated in more then 180days, there will be records indicating this thou in the logs.
 
3rd guess is you use that evil macafee antivirus product.
 
you are right on the first one ! thanks for the pointer :)

\\muos o(-_-)o
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top