Issue with Domain and Client with Domain account

SSE@TUE 160 Reputation points
2025-08-22T12:51:45.99+00:00

Hi,

I have created some GPOs and deployed it to some client machines. The GPO does not applied on some machines.

I did do the following PS and see why:

Test-ComputerSecureChannel -Server "DCName.domain.com"

result : True

Test-ComputerSecureChannel -Verbose

Result: True

Test-ComputerSecureChannel -Repair

Result: True

Any Idea why?

Regards

Nick

Windows for business | Windows Server | Directory services | Deploy group policy objects
0 comments No comments
{count} votes

Accepted answer
  1. Marcin Policht 54,995 Reputation points MVP Volunteer Moderator
    2025-08-22T13:14:17.85+00:00

    The behavior you're describing points to trust relationship issues between the client machine and the domain, even though Test-ComputerSecureChannel initially reports True.

    Test-ComputerSecureChannel checks whether the computer account in AD can communicate securely with the domain. When you run it without -Credential, it uses the machine account to test the secure channel. A return of True means “the channel is working,” but it doesn't guarantee that the channel is fully healthy for all operations (especially GPO application which may require access to certain AD objects).

    Some GPOs might need authentication with domain credentials to access policies, SYSVOL, or scripts. If the machine account has limited permissions, or if Kerberos tickets are stale, GPOs can fail. Using -Credential forces the test to authenticate using a valid user account (typically a domain admin), which repairs/refreshes the secure channel properly.

    Test-ComputerSecureChannel -Repair alone repairs the secure channel using the machine account. Usually enough if the issue is minor. But in some cases, the machine account doesn't have sufficient rights, so the repair seems fine (True), but GPO still fails. Using -Repair -Credential (Get-Credential) provides explicit domain credentials, which:

    1. Re-establishes trust properly.
    2. Refreshes machine account permissions.
    3. Allows GPOs to apply correctly after gpupdate /force.

    Some of the common reasons for this behavior include:

    1. Stale computer account password: Domain computer accounts change passwords automatically every 30 days. Sometimes the local machine password gets out of sync.
    2. Restricted access on SYSVOL/NETLOGON: The computer account cannot read the GPO.
    3. Replication latency or AD inconsistencies: GPO objects not yet replicated.
    4. Kerberos or token issues: Stale tickets can block GPO retrieval.

    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.