Microsoft has resolved a identified situation that induced some Home windows Server 2025 area controllers to develop into unreachable after a restart and triggered app or service failures.
As Redmond defined when it acknowledged the bug in April, servers loading the usual firewall profile as an alternative of the area firewall one after rebooting can have points managing community visitors accurately.
Due to this situation, providers and functions operating on impacted area controller servers or distant units might fail or develop into unreachable for endpoints and servers on the identical community.
“Home windows Server 2025 area controllers (equivalent to servers internet hosting the Energetic Listing area controller position) may not handle community visitors accurately following a restart,” Microsoft stated.
“In consequence, Home windows Server 2025 area controllers might not be accessible on the area community, or are incorrectly accessible over ports and protocols which ought to in any other case be prevented by the area firewall profile.”
This week, the corporate addressed this identified situation within the KB5060842 Home windows safety replace launched in the course of the June 2025 Patch Tuesday.
Admins who cannot instantly set up this month’s updates to mitigate the bug can even apply a short lived workaround requiring them to restart the community adapter manually on impacted servers utilizing the Restart-NetAdapter *
PowerShell command.
Nonetheless, it is essential to notice that they’re going to must restart it after each reboot till they set up the KB5060842 replace as a result of this identified situation will set off routinely each time affected area controllers are restarted.
On Tuesday, Microsoft additionally fastened one other identified situation stopping some Home windows customers from logging into their accounts utilizing Home windows Howdy after putting in the KB5055523 April 2025 safety replace.
In April, the corporate resolved one other KB5055523 situation that was inflicting authentication points when Credential Guard was enabled on methods utilizing the Kerberos PKINIT pre-auth safety protocol.
Patching used to imply complicated scripts, lengthy hours, and limitless hearth drills. Not anymore.
On this new information, Tines breaks down how fashionable IT orgs are leveling up with automation. Patch sooner, scale back overhead, and give attention to strategic work — no complicated scripts required.