Forum Discussion
DarienHawkins
Apr 27, 2024Copper Contributor
Server 2025 Core ADDS DC, Network Profile Showing as "Public" and not as "DomainAuthenticated"
OS: Windows Server 20225 Standard Core (no GUI), build 26085.1
Role: ADDS, DNS
ForestMode: Windows2025Forest
DomainMode: Windows2025Domain
Platform: Hyper-V guest
When standing up a clean Windows Server 2025 using server core and configuring it as a domain controller, the network category (profile) always shows as "public."
A clean load of Windows Server 2022 with server core as a domain controller has the same behavior. However, in Server 2022, the fix is to add DNS as a required service to the nlasvc (Network Location Awareness) service. Once that is done, the network category reflects "DomainAuthenticed" and persists between reboots.
In Server 2025, the nlasvc service does not have the same requiredservices as Windows Server 2022, and it does not start automatically. Even after configuring the nlasvc service the same way it is in Server 2022 and adding DNS as a required service, the network category still reflects "public." The only way to get the network category to properly reflect the "DomainAuthenticated" status is to disable and reenable the network adapter after each reboot.
83 Replies
Sort By
- XqwizardCopper Contributor
So in the May release preview update for 24H2 it has this:
- [Network] Fixed: This update addresses an issue where Windows Server 2025 always shows the network as “public” on new domain controllers. It now checks for a domain controller name before using loopback addresses to ensure proper Lightweight Directory Access Protocol (LDAP) binding.
So I assume it will be fixed in the June Cumulative Update for Server 2025.
https://blogs.windows.com/windows-insider/2025/05/19/releasing-windows-11-build-26100-4188-to-the-release-preview-channel/
- sandro-acpCopper Contributor
🙃I did just now a test with this preview update and i can confirm it works
Eureka!
- XqwizardCopper Contributor
How did you get the preview update for Server 2025? - I thought it was only relevant for Windows 11?
- seatechCopper Contributor
The only solution that has worked for me is the April 5 Eric_Moreau script. I guess this issue is related to other security items in the Server 2025 code that has not been able to get resolved. Why not have done so already is puzzling, the Windows Server 2025 known issues and notifications | Microsoft Learn is not a resolution, in fact I find the above script an easier and cleaner solution.
I agree with those critics stating MS is now cloud first and also slow in responding to clients issues. Maybe it has to do with all the layoffs recently. See: Hard hit was the tech giant’s home state of Washington, where Microsoft informed state officials it was cutting 1,985 workers tied to its Redmond headquarters, many of them in software engineering and product management roles. - seatechCopper Contributor
With Server 2025 DC none of the fixes has worked so far. This is an issue that MS should fix. My guess this problem is related to how other related security items are being handled and they have not found a way to resolve it.
- GMelaIron Contributor
Hallelujah, thanks r2dluc , it's finally official: Windows Server 2025 known issues and notifications | Microsoft Learn
- SuperCacoCopper Contributor
Yes, it is now official after a year since this bug was reported.
Microsoft works worse and worse, no longer listens to their users (customers) so they make worse products that they don't even test, so they are full of bugs (that they don't fix), with less functionality, features and performance. It only adds functionality, features and products that nobody has demanded and that only benefits Microsoft (never the user) through subscriptions. Now it's all about subscriptions and artificial intelligence. Before it was “Mobile First/Cloud First” and now it is “Subscription First/IA First”.
The current Microsoft is a real disaster.
- GMelaIron Contributor
totally agree
- r2dlucCopper Contributor
Good news, they seem to have aknowledged the problem...
https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-server-2025-restarts-break-services-on-domain-controllers/
- LangellaCopper Contributor
I just wanted to post here that when the NIC is set to public on a Domain Controller, Windows Services that rely on Domain Authenticated status never starts, this raise alerts in our monitoring tool and unnecessary works from our team.
I have also experience authentication issues when endpoints choose this DC to authenticate and NIC is set to Public. ( I have other 3 DCs 2022 Server with no similar issues).
Hi,
I've created this Workaround Script:
It will create a folder C:\install\scripts, put a fix script in it and schedule it to run at startup, the script will reset the adapter if in public profile$scriptContent = @" # FixPubFWProfile.ps1 # This script fixes the public network profile # Get the network profiles `$networkProfiles = Get-NetConnectionProfile # Wait for 60 seconds Start-Sleep -Seconds 60 # Loop through each profile and restart-adapter if it is set to public foreach (`$Nprofile in `$networkProfiles) { if (`$Nprofile.NetworkCategory -eq "Public") { Restart-NetAdapter -Name `$Nprofile.InterfaceAlias } } "@ $scriptPath = "c:\Install\Scripts\FixPubFWProfile.ps1" # Create the directory if it doesn't exist if (-not (Test-Path -Path (Split-Path -Path $scriptPath))) { New-Item -ItemType Directory -Path (Split-Path -Path $scriptPath) -Force } # Write the script content to the file Set-Content -Path $scriptPath -Value $scriptContent Write-Output "Script created at $scriptPath" $action = New-ScheduledTaskAction -Execute "powershell.exe" -Argument "-ExecutionPolicy Bypass -NoProfile -File `"$scriptPath`"" $trigger = New-ScheduledTaskTrigger -AtStartup $principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -LogonType ServiceAccount -RunLevel Highest $settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -StartWhenAvailable #check if the task already exists $taskExists = Get-ScheduledTask -TaskName "FixPublicNetworkProfile" -ErrorAction SilentlyContinue if ($taskExists) { Write-Output "Scheduled task 'FixPublicNetworkProfile' already exists" } else { Register-ScheduledTask -Action $action -Trigger $trigger -Principal $principal -Settings $settings -TaskName "FixPublicNetworkProfile" -Description "Fixes the public network profile 1 minute after startup" Write-Output "Scheduled task 'FixPublicNetworkProfile' created to run at startup with a 1 minute delay in the script" }
also on my blog: https://www.technine.be/wp-content/uploads/2025/04/Fix-Public-Network-Profile.ps1
hope this helps,
- JeffW76Copper Contributor
I have a small test network running a single 2025 Server as a DC, with DNS pointing at itself via loopback (there's nowhere else to send it). On first setting it up as a DC, it appeared to work fine, but after subsequent reboot, firewall rules were blocking file-shares and various other things.
After a while I worked out the network was in the public profile and it was likely a FW problem then came across this post. Your script fixed the problem immediately and the least intrusively. Thank you!
I'm guessing the pointing DNS at itself, is probably the cause.... we all know to point at another DC, and that likely works fine. I'm guessing DNS is not up before it makes the decision on profiles.
- dazzabozzaCopper Contributor
I can confirm that setting a manual IPv6 address on the NIC has resolved this issue for us.
EDIT - appears that this reg key is required along with the IPv6 address being setHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters
Add a DWORD parameter: AlwaysExpectDomainController
Set value to:1
- seatechCopper Contributor
Hi Eleanor, any news?
- RaySumperlCopper Contributor
This is March 2025 and the issue still exists. I have spent way too many hours trying to resolve this at a client site. The resolution was to stand up a Server 2022 DC. No issues whatsoever.
Ray S