Event Id | 12 |
Source | Microsoft-Windows-Time-Service |
Description | Time Provider NtpClient: This machine is configured to use the domain hierarchy to determine its time source, but it is the PDC emulator for the domain at the root of the forest. There is no machine above this machine in the domain hierarchy to use as a time source. It is recommended that you either configure a reliable time service in the root domain, or manually configure this PDC emulator in the root domain to synchronize with an external time source. Otherwise, this machine will function as the authoritative time source in the domain hierarchy. If an external time source is not configured or used for this computer, you may choose to disable the NtpClient. |
Event Information | According to Microsoft : Cause : This event is logged when the machine is configured to use the domain hierarchy to determine its time source but it is the PDC emulator for the domain at the root of the forest Resolution : Configure an external time source This computer is configured to hold the primary domain controller (PDC) emulator operations master role (also known as flexible single master operations or FSMO) in the forest root domain. This computer should not use itself as a time source. Configure an external time source as the authoritative time source for the forest, or configure a member domain controller as the time source peer. The configuration must be done manually. Perform the following procedure on the computer that is logging the event to be resolved. To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority. To configure a manual time source peer:
To perform this procedure, you must have membership in Administrators, or you must have been delegated the appropriate authority. To verify that the Windows Time service is synchronizing correctly:
|
Reference Links | Event ID 12 from Source Microsoft-Windows-Time-Service |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.