Event Id | 1311 |
Source | Active Directory |
Description | The Directory Service consistency checker has determined that either (a) there is not enough physical connectivity published via the Active Directory Sites and Services Manager to create a spanning tree connecting all the sites containing the Partition %1, or (b) replication cannot be performed with one or more critical servers in order for changes to propagate across all sites (most often due to the servers being unreachable). For (a), please use the Active Directory Sites and Services Manager to do one of the following: 1. Publish sufficient site connectivity information such that the system can infer a route by which this Partition can reach this site. This option is preferred. 2. Add an ntdsConnection object to a Domain Controller that contains the Partition %1 in this site from a Domain Controller that contains the same Partition in another site. For (b), please see previous events logged by the NTDS KCC source that identify the servers that could not be contacted. |
Event Information | The Knowledge Consistency Checker (KCC) detected problems with the specified directory partition. There is insufficient site connectivity information in Active Directory Sites and Services for the KCC to create a spanning tree replication topology, or one or more domain controllers with this directory partition are unable to replicate the directory partition information. The latter situation is usually caused by inaccessible domain controllers. Use Active Directory Sites and Services to perform one of the following actions: Publish sufficient site connectivity information so that the KCC can determine a route by which this directory partition can reach this site. This is the recommended action. Add a Connection object to a domain controller that contains the directory partition in this site from a domain controller that contains the same directory partition in another site. If neither of the Active Directory Sites and Services tasks corrects this condition, review previous events logged by the KCC that identify the inaccessible domain controllers. |
Reference Links | Monitoring AD Changes: Article |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.