ANAVEM
Languagefr
Windows Server Active Directory monitoring dashboard showing domain controller replication status and security event logs
Event ID 4928InformationMicrosoft-Windows-Security-AuditingWindows

Windows Event ID 4928 – Microsoft-Windows-Security-Auditing: Active Directory Replica Source Naming Context Established

Event ID 4928 indicates that an Active Directory replica source naming context has been successfully established between domain controllers during replication operations.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 202612 min read 0
Event ID 4928Microsoft-Windows-Security-Auditing 5 methods 12 min
Event Reference

What This Event Means

Event ID 4928 represents a successful establishment of an Active Directory replica source naming context, which is a critical component of AD replication infrastructure. When domain controllers replicate directory data, they must first establish naming context relationships that define what portions of the Active Directory database will be synchronized between specific servers.

The naming context establishment process involves authentication, authorization, and topology verification between the source and destination domain controllers. This event confirms that these preliminary steps completed successfully and that actual directory data replication can proceed. The event includes security identifiers, domain controller names, and naming context distinguished names that help administrators understand the replication flow.

This event is particularly important in multi-site Active Directory environments where replication topology can be complex. Network administrators rely on Event ID 4928 to verify that site links, connection objects, and replication schedules are functioning correctly. The event also serves as an audit trail for compliance requirements that mandate tracking of directory service changes and access patterns.

In modern Windows Server environments, this event integrates with advanced monitoring solutions and can trigger automated responses when replication patterns deviate from expected baselines. The event data structure has been enhanced in recent Windows Server versions to include performance metrics and security context information that wasn't available in earlier implementations.

Applies to

Windows Server 2019Windows Server 2022Windows Server 2025
Analysis

Possible Causes

  • Normal Active Directory replication operations between domain controllers
  • Initial domain controller promotion and replica establishment
  • Site topology changes triggering new replication partnerships
  • Manual replication initiation using repadmin or PowerShell commands
  • Scheduled replication cycles based on site link configurations
  • Recovery operations after domain controller outages or network issues
  • Cross-site replication establishment after network connectivity restoration
Resolution Methods

Troubleshooting Steps

01

Verify Event Details in Event Viewer

Start by examining the complete event details to understand the replication context and involved domain controllers.

  1. Open Event ViewerWindows LogsSecurity
  2. Filter for Event ID 4928 using the filter option
  3. Double-click the most recent Event ID 4928 entry
  4. Review the General tab for source DC, destination DC, and naming context details
  5. Check the Details tab for additional XML data including security identifiers
  6. Note the timestamp to correlate with other replication events

Use PowerShell to query multiple events efficiently:

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4928} -MaxEvents 20 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
Pro tip: Cross-reference Event ID 4928 with Event ID 4929 (replica source naming context removed) to track complete replication cycles.
02

Analyze Active Directory Replication Status

Verify that the replication establishment indicated by Event ID 4928 resulted in successful directory synchronization.

  1. Open Command Prompt as Administrator
  2. Run repadmin to check replication status:
repadmin /showrepl
repadmin /replsummary
  1. Use PowerShell to get detailed replication information:
Get-ADReplicationConnection -Filter * | Format-Table Name, ReplicateFromDirectoryServer, ReplicateToDirectoryServer
Get-ADReplicationFailure -Target (Get-ADDomainController).Name
  1. Check domain controller connectivity:
Test-ComputerSecureChannel -Verbose
Get-ADDomainController -Filter * | Test-NetConnection -Port 389
Warning: Replication failures following Event ID 4928 may indicate network issues or authentication problems that require immediate attention.
03

Monitor Replication Performance and Health

Establish ongoing monitoring to track replication performance and identify patterns in Event ID 4928 occurrences.

  1. Create a PowerShell script to monitor replication events:
# Monitor AD replication events
$Events = Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4928,4929; StartTime=(Get-Date).AddHours(-24)}
$Events | Group-Object Id | Select-Object Name, Count
$Events | Format-Table TimeCreated, Id, @{Name='SourceDC';Expression={($_.Message -split '\n')[1]}}
  1. Set up Performance Monitor counters for AD replication:
  2. Open Performance MonitorData Collector SetsUser Defined
  3. Create new Data Collector Set with these counters:
  4. NTDS\DRA Inbound Values (DNs only)/sec
  5. NTDS\DRA Inbound Properties Applied/sec
  6. NTDS\DRA Pending Replication Synchronizations
  1. Configure automated alerting using Windows Task Scheduler:
$Action = New-ScheduledTaskAction -Execute 'PowerShell.exe' -Argument '-File C:\Scripts\ADReplicationMonitor.ps1'
$Trigger = New-ScheduledTaskTrigger -Daily -At 6:00AM
Register-ScheduledTask -TaskName 'AD Replication Monitor' -Action $Action -Trigger $Trigger
04

Investigate Replication Topology and Site Configuration

Examine Active Directory site topology to understand why Event ID 4928 occurred and verify proper replication design.

  1. Open Active Directory Sites and Services console
  2. Navigate to Sites[Your Site]Servers
  3. Examine connection objects under each domain controller's NTDS Settings
  4. Use PowerShell to analyze site topology programmatically:
# Get site information
Get-ADReplicationSite -Filter * | Format-Table Name, Description

# Analyze site links
Get-ADReplicationSiteLink -Filter * | Format-Table Name, Cost, ReplicationFrequencyInMinutes, SitesIncluded

# Check connection objects
Get-ADReplicationConnection -Filter * | Where-Object {$_.AutoGenerated -eq $false} | Format-Table Name, ReplicateFromDirectoryServer
  1. Verify Knowledge Consistency Checker (KCC) operations:
repadmin /kcc
repadmin /showconn
  1. Check for replication errors in Directory Service logs:
Get-WinEvent -FilterHashtable @{LogName='Directory Service'; Level=2,3} -MaxEvents 50 | Format-Table TimeCreated, Id, LevelDisplayName, Message
Pro tip: Use repadmin /bridgeheads to identify which domain controllers serve as bridgehead servers for inter-site replication.
05

Advanced Troubleshooting with Replication Diagnostics

Perform comprehensive replication diagnostics when Event ID 4928 patterns indicate potential issues or when troubleshooting complex replication problems.

  1. Enable detailed Active Directory diagnostic logging:
# Enable replication events logging
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics' -Name '5 Replication Events' -Value 3
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics' -Name '9 Internal Processing' -Value 1
  1. Capture network traces during replication:
netsh trace start capture=yes provider=Microsoft-Windows-LDAP-Client provider=Microsoft-Windows-ActiveDirectory_DomainService maxsize=500MB
# Trigger replication
repadmin /syncall /AdeP
# Stop trace after replication completes
netsh trace stop
  1. Use dcdiag for comprehensive domain controller health analysis:
dcdiag /v /c /d /e /s:%COMPUTERNAME%
dcdiag /test:replications /v
  1. Analyze replication metadata for specific objects:
repadmin /showobjmeta %COMPUTERNAME% "CN=Configuration,DC=domain,DC=com"
repadmin /showattr %COMPUTERNAME% "DC=domain,DC=com" /subtree /filter:"(objectClass=*)" /atts:whenChanged,uSNChanged
  1. Generate comprehensive replication reports:
# Generate replication health report
$Report = @()
Get-ADDomainController -Filter * | ForEach-Object {
    $DC = $_.Name
    $ReplStatus = repadmin /showrepl $DC /csv | ConvertFrom-Csv
    $Report += $ReplStatus | Select-Object 'Source DSA', 'Naming Context', 'Last Success Time', 'Last Failure Time'
}
$Report | Export-Csv -Path "C:\Reports\ADReplication_$(Get-Date -Format 'yyyyMMdd').csv" -NoTypeInformation
Warning: Detailed diagnostic logging can generate large amounts of data. Monitor disk space and disable verbose logging after troubleshooting is complete.

Overview

Event ID 4928 fires when Active Directory successfully establishes a replica source naming context during domain controller replication. This event appears in the Security log and indicates normal AD replication health between domain controllers. The event occurs when a destination domain controller successfully connects to a source domain controller to begin replicating a specific naming context (domain partition, configuration partition, or schema partition).

This event is part of the Active Directory replication audit trail and helps administrators track replication topology changes and verify that domain controllers can establish proper replication partnerships. The event contains details about the source domain controller, destination domain controller, and the specific naming context being replicated.

In Windows Server 2025 and current 2026 deployments, this event has become more detailed with additional metadata about replication performance and security context. Administrators use this event to monitor AD health, troubleshoot replication issues, and ensure proper domain controller connectivity across sites.

Frequently Asked Questions

What does Event ID 4928 mean in Active Directory?+
Event ID 4928 indicates that an Active Directory replica source naming context has been successfully established between domain controllers. This means a destination domain controller has successfully connected to a source domain controller and established the preliminary relationship needed to replicate a specific portion of the Active Directory database (such as the domain partition, configuration partition, or schema partition). This is a normal informational event that occurs during healthy AD replication operations.
How often should I expect to see Event ID 4928 in my environment?+
The frequency of Event ID 4928 depends on your Active Directory replication topology and schedule. In a typical environment, you'll see this event whenever replication cycles occur, which is usually every 15 minutes for intra-site replication and according to your site link schedule for inter-site replication. You might also see it during domain controller startup, after network outages, or when administrators manually trigger replication. A sudden increase in frequency could indicate replication issues or topology changes.
Should I be concerned if I see many Event ID 4928 entries?+
Multiple Event ID 4928 entries are typically normal and indicate active replication. However, you should investigate if you see an unusual spike in these events, especially if accompanied by replication error events. Excessive Event ID 4928 occurrences might indicate replication loops, network connectivity issues causing frequent reconnections, or misconfigured site topology. Use repadmin /showrepl and monitor for corresponding error events to determine if the high frequency indicates a problem.
Can Event ID 4928 help me troubleshoot Active Directory replication issues?+
Yes, Event ID 4928 is valuable for replication troubleshooting. The event shows which domain controllers are successfully establishing replication relationships and for which naming contexts. If you're missing expected Event ID 4928 entries, it might indicate connectivity issues, authentication problems, or site topology misconfigurations. Compare the timing and frequency of these events with replication schedules and look for patterns that might reveal underlying issues. The event details also help identify the specific domain controllers and naming contexts involved in replication operations.
How does Event ID 4928 relate to other Active Directory replication events?+
Event ID 4928 is part of a series of replication-related events. It typically precedes actual data replication events and is often followed by Event ID 4929 when the replica source naming context is removed after replication completes. Other related events include Event ID 1864 (replication success), Event ID 1865 (replication failure), and various Directory Service log events. Monitoring these events together provides a complete picture of your Active Directory replication health and can help identify patterns or issues in the replication process.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...