Posted on 2012-09-18
Last Modified: 2012-09-21
I recently replaced a DC that went down suddenly.  After I replaced the DC and expnaded my scope in the process, the follow event log entry is persistent:

Event Type:      Warning
Event Source:      NETLOGON
Event Category:      None
Event ID:      5807
Date:            9/18/2012
Time:            4:00:36 AM
User:            N/A
Computer:      LSDC02
During the past 4.21 hours there have been 340 connections to this
Domain Controller from client machines whose IP addresses don't map to any of the existing
sites in the enterprise. Those clients, therefore, have undefined sites and may connect to any
Domain Controller including those that are in far distant locations from the clients.
A client's site is determined by the mapping of its subnet to one of the existing sites.
To move the above clients to one of the sites, please consider creating subnet object(s)
covering the above IP addresses with mapping to one of the existing sites.  
The names and IP addresses of the clients in question have been logged on this computer in the
following log file '%SystemRoot%\debug\netlogon.log' and, potentially,
in the log file '%SystemRoot%\debug\netlogon.bak' created if the former log becomes full.
The log(s) may contain additional unrelated debugging information. To filter out the needed information,
please search for lines which contain text 'NO_CLIENT_SITE:'. The first word after this string is the client name
and the second word is the client IP address. The maximum size of the log(s) is controlled by the
following registry DWORD value 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\LogFileMaxSize';
the default is 20000000 bytes.  The current maximum size is 20000000 bytes.  To set a different maximum size, create the
above registry value and set the desired maximum size in bytes.

For more information, see Help and Support Center at
Question by:lipotech
    1 Comment
    LVL 18

    Accepted Solution


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Integrate social media with email signatures

    Is your company active on social media? Do you also use email signatures? Including social media icons in your email signature is a great way to get fans for free. Let all your email users know you’re on social media quickly and easily, in a single click.

    Some time ago I faced the need to use a uniform folder structure that spanned across numerous sites of an enterprise to be used as a common repository for the Software packages of the Configuration Manager 2007 infrastructure. Because the procedu…
    Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and…
    This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
    With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now