perskine77
New Member
- Joined
- Jan 7, 2026
- Messages
- 2
- Thread Author
-
- #1
I recently ran an in-place upgrade of 2 file servers from 2016 to 2025, upon completion both servers are reporting "The name "(Local Domain Name):1d" could not be registered on the interface with IP address 10.16.1.70. The computer with the IP address 10.16.1.38 did not allow the name to be claimed by this computer." Everything I've researched indicates that the second ip, 10.16.1.38, should be the IP of a DC but it's not, it's the IP of an application server in my environment that we utilize for MFA on prem. I've tried pulling the MFA agents off the servers but we are still getting the error on both of them every 5 minutes. I've confirmed that DNS is configured correctly on both of them, I've confirmed that the DNS domain name suffixes are setup on both of them.
Solution
I disabled NetBIOS per your step 2 instructions and it appears to have resolved the issue, thanks for the help.
- Joined
- Mar 14, 2023
- Messages
- 98,892
Hi perskine77 — that NetBT 4321 message is almost always a NetBIOS name registration conflict, and the
What
So the log is basically saying:
You’re looking for a line showing your domain name with
Also sanity-check you don’t have an IP conflict:
If the MAC address for
GUI:
PowerShell/WMI method (per NIC):
Then reboot.
The real question is whether you care about NetBIOS browsing at all—most environments don’t anymore.
:1d suffix is the key.What DOMAIN:1d means
<1D> is the “Master Browser” NetBIOS name for your domain/workgroup on that subnet (legacy “Network Neighborhood” browse list behavior). Some machine on that subnet “wins” a browser election and registers DOMAIN<1D>.So the log is basically saying:
- Your file server (10.16.1.70) tried to register
(YourDomain)<1D> - But 10.16.1.38 already owns it (or is answering for it), so the registration is refused
- It retries periodically (commonly ~5 minutes), hence the spam
Step 1 — Confirm what 10.16.1.38 is actually registering
From one of the file servers, run:nbtstat -A 10.16.1.38You’re looking for a line showing your domain name with
<1D> (it may show as UNIQUE). This confirms that server is the one claiming the name.Also sanity-check you don’t have an IP conflict:
Code:
arp -a | findstr 10.16.1.38
ping -a 10.16.1.38
10.16.1.38 changes depending on where you run it, or ping name resolution looks “wrong”, investigate a duplicate IP or ARP weirdness first.Step 2 — Decide: do you still need NetBIOS/WINS?
Option A (recommended in most modern domains): Disable NetBIOS over TCP/IP
If you don’t have legacy apps that require NetBIOS name resolution / browse lists, the cleanest fix is to disable NetBIOS on the file servers (and optionally also on the MFA server).GUI:
- Network Connections → right-click NIC → Properties
- Select Internet Protocol Version 4 (TCP/IPv4) → Properties
- Advanced… → WINS tab
- Select Disable NetBIOS over TCP/IP
- OK out and reboot
PowerShell/WMI method (per NIC):
Code:
Get-WmiObject Win32_NetworkAdapterConfiguration -Filter "IPEnabled=True" | ForEach-Object { $_.SetTcpipNetbios(2) }
Option B: You must keep NetBIOS → stop these servers from trying to become Master Browser
If you do need NetBIOS browsing/WINS, then prevent the file servers from participating in browser elections.- On each affected file server, set:
HKLM\SYSTEM\CurrentControlSet\Services\Browser\Parameters\MaintainServerList=NoHKLM\SYSTEM\CurrentControlSet\Services\Browser\Parameters\IsDomainMaster=False
- Reboot.
Step 3 — Why the MFA server is involved
Even if “it should be a DC” per what you read: any Windows machine can become the Master Browser on a subnet if NetBIOS browsing is in play and it wins an election. So it’s completely plausible your MFA server at10.16.1.38 is simply the current Master Browser.The real question is whether you care about NetBIOS browsing at all—most environments don’t anymore.
Quick questions (so I can steer you to the least risky fix)
- Is
10.16.1.38on the same subnet/VLAN as both file servers? - Do you run WINS anywhere (or have DHCP options 044/046 configured)?
- Do you have any legacy apps that still require NetBIOS name resolution or “Network” browsing?
- the output of
nbtstat -A 10.16.1.38(you can redact names) - whether WINS is in use
perskine77
New Member
- Joined
- Jan 7, 2026
- Messages
- 2
- Thread Author
-
- #3
I disabled NetBIOS per your step 2 instructions and it appears to have resolved the issue, thanks for the help.
Solution
- Joined
- Mar 14, 2023
- Messages
- 98,892
Glad that fixed it.
A couple quick follow-ups (just to make sure it stays clean):
A couple quick follow-ups (just to make sure it stays clean):
- Confirm the event log stays quiet
- Check Event Viewer → Windows Logs → System
- Make sure NetBT 4321 events stop over the next 30–60 minutes (since you were seeing them every 5 minutes).
- Watch for any legacy dependencies
- If anything in your environment still relies on NetBIOS browsing / old name resolution (rare, but sometimes older apps/printers do), disabling NetBIOS can expose that. If you notice anything odd, tell me what breaks and we can decide whether to re-enable NetBIOS on only specific systems instead of everything.
- Optional cleanup (only if you’re standardizing)
- Ensure you’re not using WINS/DHCP options 044/046 anymore, and that systems are relying on DNS.
- Joined
- Mar 14, 2023
- Messages
- 98,892
That makes perfect sense — after an in-place upgrade, Windows can “carry forward” old NIC instances (same physical card, new device instance GUID), and you end up with non-present/hidden adapters that still have stale bindings, old IP config, or NetBIOS/WINS settings. NetBT then logs noise (often Event ID 4321 / related NetBT name-registration/binding chatter) because it’s effectively seeing a messy/duplicate network identity.
Anything with a non-OK status (or clearly old/duplicate names) is worth investigating before removal.
The “old NIC ghosts” fix (clean, repeatable steps)
Option A (GUI)
- Open Device Manager
- View → Show hidden devices
- Expand Network adapters
- Right-click and Uninstall device on any greyed out adapters you no longer use (old vNICs, old teamed NIC members, removed VLAN interfaces, etc.
- Reboot (or restart the affected services)
Option B (PowerShell – handy on Server)
Run this in an elevated PowerShell to list suspect adapters:Get-PnpDevice -Class Net | Sort-Object Status, FriendlyNameAnything with a non-OK status (or clearly old/duplicate names) is worth investigating before removal.
A few extra checks (to keep it “calm” permanently)
- Check NIC binding/order: after cleanup, confirm the active NIC is the one Windows prefers (especially if you had multiple subnets, teamed adapters, or old VPN clients).
- DNS registration: on the active NIC, confirm it’s registering the correct DNS suffix and IPs (stale registrations can also trigger name-registration weirdness).
- NetBIOS over TCP/IP: if you don’t need legacy NetBIOS name resolution in your environment, consider disabling NetBIOS on the NIC(s) to reduce NetBT involvement.
If you want to post a “solution” reply to help others
A good one-liner is:If you paste one of the exact NetBT event messages (the full text, not just the ID), I can tell you what specifically it was complaining about (name conflict, binding, WINS registration, IP mismatch, etc. and whether there’s anything else worth tightening up.“After the 2016 → 2025 in-place upgrade, NetBT Event ID 4321 spam was caused by hidden/non-present NIC instances. Removing the ghost adapters in Device Manager (Show hidden devices) immediately stopped the errors.”
Similar threads
- Solved
- Replies
- 9
- Views
- 207
- Solved
- Replies
- 3
- Views
- 1K
- Replies
- 0
- Views
- 4K