Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»How I solved a strange Kerberos issue
    Intune

    How I solved a strange Kerberos issue

    Peter KlapwijkBy Peter KlapwijkDecember 12, 2024Updated:February 14, 202554 Mins Read

    Today a short article that describes an issue I faced on Entra ID joined Windows devices which failed accessing on-premises resources.

    I was recently testing Microsofts Global Secure Access solution to provide access from Entra joined Windows devices to on-premises file shares as since a short time private DNS is available. The implementation of this solution was in-place and from my virtual machine I could reach the on-premises shares from my Windows device on which I was signed in with a synced user account.

    So far so good. But then I enrolled a physical device in Intune and Entra ID and noticed I couldn’t reach the file share that I previously could reach from my VM. As I used Windows hello on my physical device and not on the VM, I first thought Windows Hello was the issue in this case. I checked my Cloud Kerberos Trust implementation. Checked Microsoft documentation and this excellent blog post on this topic and scratched my head a couple of times.

    When I locked my device and signed in again, but with my password I could reach the on-prem file shares. Pretty strange if you ask me.

    I started to do some basic checks.
    Resolve-DNSName returned the information I expected for LDAP and Kerberos.

    Test-NetConnection to my Domain Controller on port 88 (Kerberos) and 389 (LDAP) worked fine.

    Test-NetConnection on port 445 (SMB) to my server on which the SMB file share is located also showed a success.

    The nltest /dsgetdc showed everything as expected.

    Opening the Advanced diagnostics of the Global Secure Access client showed a lot of connections on port 88 to my domain controllers. But these connections were active and almost immediately closed again.

    After a while I hit myself on the head. I realized the issue in my lab environment could be the exact same Kerberos timing issue for which I recently applied a workaround in another environment. And that would mean, not being able to reach the file shares using Windows Hello was just a coincidence.

    When opening the event viewer and checking the SMBclient security event, a lot of events with id 31001 were listed.

    Log Name: Microsoft-Windows-SmbClient/Security
    Source: Microsoft-Windows-SMBClient
    Event ID: 31001
    Task Category: None
    Level: Error
    Keywords: (128)
    User: SYSTEM
    Description:
    Smb2DiagReasonISC.
    Error: The system cannot contact a domain controller to service the authentication request. Please try again later.
    Security status: 0xC0000388
    User name:
    Logon ID: 0x85472
    Server name: \pkfile01.peterklapwijk.internal
    Principal name: cifs/pkfile01.peterklapwijk.internal

    In the other environment it turned out that (some) users were not able to reach on-premises resources directly after they signed in to their Windows device. The cause of that turned out to be Kerberos Negative Caching on Windows Machines.

    Kerberos Negative Caching on Windows machines refers to the process where the system temporarily stores (caches) failed Kerberos authentication attempts. This caching helps to reduce the load on the Key Distribution Center (KDC) by preventing repeated attempts to authenticate with the same invalid credentials.

    in this article of Microsoft, it is described what this Kerberos negative caching is. The default caching time is 10 minutes. It turned out for me if I just waited for 10 minutes, or executed KLIST PURGE_BIND in an elevated command prompt, I could immediately connect to the on-premises file share, even with Windows Hello.

    The workaround for me was pretty straightforward, create a DWORD registry key FarKdcTimeout under Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters.
    I set the value to 1, which means the cache timeout is 1 minute.

    On X I was pointed to this article, which contains some information regarding Kerberos Negative Cache and the Global Secure Access client. It turns out that a network change triggers the Kerberos stack to refresh itself, which is not the case for GSA, but also not for a solution like Zscaler for example.

    Entra Modern Workplace Security Windows
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Get notified of new Microsoft EPM elevation requests

    August 28, 2024

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024

    Azure AD Connect setup error

    January 4, 2024
    View 5 Comments

    5 Comments

    1. Anton on December 13, 2024 05:53

      The value you set for the registry key is 1 correct?

      Reply
      • Peter Klapwijk on December 13, 2024 08:41

        Yes, for our environment that’s correct. It configures the cache time to 1 minute.

        Reply
        • Anton on December 13, 2024 08:56

          Peter, did you tried it with 0?

          Reply
          • Peter Klapwijk on December 13, 2024 09:02

            No, I didn’t.

            Reply
    2. Jiří on December 17, 2024 10:41

      Thank you for this blog post – resolved for me with one more thing.
      KDC on DCs was hardened in Default GPO to fail on “KDC support for claims, compound authentication and Kerberos armoring” with Value 3.
      This needed to be changed at least to Value 2 – Always provide claims

      https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.KDC::CbacAndArmor

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}