Hi
perskine77 — that
NetBT 4321 message is almost always a
NetBIOS name registration conflict, and the
:1d suffix is the key.
What DOMAIN:1d means
<1D> is the
“Master Browser” NetBIOS name for your
domain/workgroup on that subnet (legacy “Network Neighborhood” browse list behavior). Some machine on that subnet “wins” a browser election and registers
DOMAIN<1D>.
So the log is basically saying:
- Your file server (10.16.1.70) tried to register
(YourDomain)<1D>
- But 10.16.1.38 already owns it (or is answering for it), so the registration is refused
- It retries periodically (commonly ~5 minutes), hence the spam
This is
not a DNS problem and is usually unrelated to AD/DCs unless you still rely on WINS/NetBIOS browsing.
Step 1 — Confirm what 10.16.1.38 is actually registering
From one of the file servers, run:
nbtstat -A 10.16.1.38
You’re looking for a line showing your domain name with
<1D> (it may show as
UNIQUE). This confirms that server is the one claiming the name.
Also sanity-check you don’t have an
IP conflict:
Code:
arp -a | findstr 10.16.1.38
ping -a 10.16.1.38
If the MAC address for
10.16.1.38 changes depending on where you run it, or ping name resolution looks “wrong”, investigate a duplicate IP or ARP weirdness first.
Step 2 — Decide: do you still need NetBIOS/WINS?
Option A (recommended in most modern domains): Disable NetBIOS over TCP/IP
If you don’t have legacy apps that require NetBIOS name resolution / browse lists, the cleanest fix is to disable NetBIOS on the
file servers (and optionally also on the MFA server).
GUI:
- Network Connections → right-click NIC → Properties
- Select Internet Protocol Version 4 (TCP/IPv4) → Properties
- Advanced… → WINS tab
- Select Disable NetBIOS over TCP/IP
- OK out and reboot
This stops the NetBT name registration attempts, so the 4321 events stop.
PowerShell/WMI method (per NIC):
Code:
Get-WmiObject Win32_NetworkAdapterConfiguration -Filter "IPEnabled=True" | ForEach-Object { $_.SetTcpipNetbios(2) }
Then reboot.
Option B: You must keep NetBIOS → stop these servers from trying to become Master Browser
If you
do need NetBIOS browsing/WINS, then prevent the
file servers from participating in browser elections.
- On each affected file server, set:
HKLM\SYSTEM\CurrentControlSet\Services\Browser\Parameters\MaintainServerList = No
HKLM\SYSTEM\CurrentControlSet\Services\Browser\Parameters\IsDomainMaster = False
- Reboot.
(If the
Computer Browser service exists on your build, you can also stop/disable it, but newer Windows versions may not expose it the same way.
Step 3 — Why the MFA server is involved
Even if “it should be a DC” per what you read:
any Windows machine can become the Master Browser on a subnet if NetBIOS browsing is in play and it wins an election. So it’s completely plausible your MFA server at
10.16.1.38 is simply the current Master Browser.
The real question is whether you care about NetBIOS browsing at all—most environments don’t anymore.
Quick questions (so I can steer you to the least risky fix)
- Is
10.16.1.38 on the same subnet/VLAN as both file servers?
- Do you run WINS anywhere (or have DHCP options 044/046 configured)?
- Do you have any legacy apps that still require NetBIOS name resolution or “Network” browsing?
If you reply with:
- the output of
nbtstat -A 10.16.1.38 (you can redact names)
- whether WINS is in use
…I can tell you whether to go straight to
disable NetBIOS (usually best) or to tune the browser/master-browser settings instead.