Microsoft August 2020 Patch issues and unanswered questions: No Netlogon events in Domain Controller logs after August 2020 Patches

By | October 7, 2020

August 2020 Patch (CVE-2020-1472) is fixing Netlogon Elevation of Privilege Vulnerability, we have to patch all the Domain Controllers to secure our environment from this Vulnerability and its two-part rollout stars on August 2020 and Feb 2021, we have many unanswered questions like, is the August 2020 patch will affect the non-secure clients? is there any known affected client list that uses the Non-secure RPC? how do I know how many affected non-compliant devices are connected in our Domain? and how to fix/remediate the non-compliant devices and is the August 11, 2020 update will fix the Vulnerability?

Also Read: Compare Installed Windows Security Patches with other Servers

Is the August 11, 2020 patch only to identify the device which uses the Non-secure RPC usage or it will fix or Enforces secure RPC connection? and if so what is the impact if we have any device using Non-secure RPC

Microsoft included the fix for the many vulnerabilities, so we have to patch ASAP.

With respect to Netlogon Vulnerability, Yes it is fixing or Enforcing secure RPC usage for all the Windows-based devices (not for the Non-Windows devices)

Also Read: Planning safe Decommission of Domain Controller (Decommission of Active Directory site) Without Impacting Users

Is the August 2020 patch will affect the non-secure clients?

NO: There is no impact as this is Enforcing secure RPC usage only for the Windows based devices which is supported natively without any outage unless you have very old legacy Windows Operating systems (OS)

Windows 2000 and above are not impacted

Also Read: How do I find what is accessing my LDAP Server and what LDAP query used and how many queries for a period of time?

Any known list of affected devices which use the Non-secure RPC?

Only the Non-Windows devices are still using the Non-secure RPC and you have to install the August 11, 2020 update and extract the event ID 5829 from the Domain Controllers System event logs to get the affected non-compliant device list

How we can fix/remediate the non-compliant devices?

Once you have the list of affected non-compliant devices then raise it with the vendor to get the fix to supports secure RPC with Netlogon secure channel

Also See: How secure channel determine the Domain controller in cross-forest

What happen to the non-compliant devices after February 9, 2021 Enforcement Phase?

Try to get remediated with the help of vendor support, if still want to continue to use these non-compliant devices connected to you Domain Controller then you have to create security filtered GPO to Allow vulnerable Netlogon secure channel connections

Note: it’s not recemented to use non-compliant devices with can be a security risk to your environment

Also Read: How to troubleshoot workstation Trust relationship issues on Domain

Event ID: 5827, 5828, 5830, 5831 and 5829 Not Visible on Domain Controller event logs after August 2020 Update

Currently, we only need to look for Event ID 5829, Check the System event logs on the Domain controller, if no event then there is no non-compliant devices are connecting to the particular Domain Controller

Event ID 5827 and 5828: only available if any Non-secure RPC connections are denied.

Event ID 5830 and 5831: if any Non-secure RPC connections are allowed through GPO (Allow vulnerable Netlogon secure channel connections)

Event ID 5829: whenever non-compliant devices are connecting using Vulnerable Netlogon secure channel connection, this can be used to collect the non-compliant devices and needs to be remediated before February 9, 2021 Enforcement Phase

Also Read: Difference between Windows cumulative update and native Microsoft Windows update

Hope this will clarify all the queried related to Netlogon Elevation of Privilege Vulnerability and August 11, 2020 patches

More about Windows Server 2016 and Windows Server 2012 

Leave a Reply

Your email address will not be published. Required fields are marked *