


Remote calls to the SAM database are being restricted using the configured registry security descriptor: O:BAG:BAD:(A RC BA). Source: Microsoft-Windows-Directory-Services-SAM This may be accompanied by the following event in the SYSTEM log of the domain controller: Log Name: System Transmission Control Protocol, Src Port: 445, Dst Port: 50848, Seq: 1518, Ack: 4455, Len: 148ĭistributed Computing Environment / Remote Procedure Call (DCE/RPC) Fault, Fragment: Single, FragLen: 32, Call: 2, SMB2 (Server Message Block Protocol version 2)įunction: FSCTL_PIPE_TRANSCEIVE (0x0011c017)ĭistributed Computing Environment / Remote Procedure Call (DCE/RPC) Request, Fragment: Single, FragLen: 136, Call: 2, Ctx: 1, ĭata Representation: 10000000 (Order: Little-endian, Char: ASCII, Float: IEEE) Network capture shows " nca_s_fault_access_denied" error from the domain controller The request will be processed at a domain controller for domain .Ģ. Command returns Access Denied C:\>net user /domain In certain cases, the following may be seen:ġ.

Net User /domain is supposed to list all user accounts in the domain.īy default, any authenticated user should be able to run the command and list all domain user accounts.
