pps 4 Posted July 31, 2020 Share Posted July 31, 2020 (edited) Hello, Since today I get an error message while I run the task Active Directory Sync Daily Schedule CN=Computers Quote Failed to bind to the specified object (LDAP://XXX.XX.XX.XX/CN=Computers,DC=XXXXXXXXX,DC=XX). Error code = 0x8007203a, The server is not operational. Error code: 0x8007203a I used different AD servers and different creds and server reboot but no change. Before one week was working fine. Quote ESET Security Management Center (Server), Version 7.2 (7.2.1266.0) ESET Security Management Center (Web Console), Version 7.2 (7.2.221.0) Copyright (c) 1992-2020 ESET, spol. s r.o. All Rights Reserved. End-user license agreement Microsoft Windows Server 2016 Standard (64-bit), Version 10.0.14393.3750 Connected Clients: 275 Active Licenses: 1 License Management Installed Components: Update module 1021 (20200218) Translation support module 1807 (20200714) SysInspector module 1278 (20200609) SSL module 1048 (20200608) Push Notification Service module 1064 (20200625) Configuration module 1822.4 (20200505) Also when I edit the task when I complete the password I get an: Failed to load data: Input not valid: Validated value is empty Thanks, Peter Edited July 31, 2020 by pps Link to comment Share on other sites More sharing options...
ESET Moderators Peter Randziak 1,170 Posted July 31, 2020 ESET Moderators Share Posted July 31, 2020 Hello Peter, I would first check https://help.eset.com/esmc_admin/72/en-US/sg_server_tasks_ad.html Important ESMC Server 7.2 on Windows uses the encrypted LDAPS (LDAP over SSL) protocol by default for all Active Directory (AD) connections. If you upgrade an earlier ESMC version to ESMC 7.2 and you were using the Active Directory synchronization, synchronization tasks will fails in ESMC 7.2. For a successful AD connection over LDAPS, configure the following: 1.The domain controller must have installed a machine certificate. To issue a certificate for your domain controller, follow the steps below: a)Open the Server Manager, click Manage > Add Roles and Features and install the Active Directory Certificate Services > Certification Authority. A new Certification Authority will be created in Trusted Root Certification Authorities. b)Navigate to Start > certmgr > Certificates - Local Computer > Personal > right click the empty pane > All Tasks > Request New Certificate > Enroll Domain Controller role. c)Verify that the issued certificate contains the FQDN of the domain controller. 2.When providing connection settings to the AD server, type the FQDN of the domain controller (as provided in the domain controller certificate) in the Server or Host field. IP address is no longer sufficient for LDAPS. Peter Link to comment Share on other sites More sharing options...
pps 4 Posted July 31, 2020 Author Share Posted July 31, 2020 Hello, We used instead 'Use LDAP instead of Active Directory' Thanks, Peter Link to comment Share on other sites More sharing options...
Recommended Posts