Overview 💥
Sometimes, the Active Directory inspector in Liongard can fail to collect information for one or more object types like Users, Computers, Groups, or DNS. When this happens, you might notice:
Missing or incomplete data prints
Failed alerting and reporting
Debug logs showing errors like:
Task timed outNo such host is knownPowerShell module import failures
These issues are typically environment-specific and relate to:
DNS misconfigurations
Stale or offline domain controllers (DCs)
Performance bottlenecks due to large object counts
Insufficient permissions or restrictive GPOs
Think of it like a communication channel between two systems: the pathway must be clear, properly configured, and both endpoints must be able to accurately send and receive signals.
Why Does This Happen? 🤔
Cause | Explanation |
DNS Resolution Failures |
|
Missing PowerShell Modules |
|
High Object Volume / Latency |
|
Stale or Decommissioned DCs |
|
Replication Failures / Broken NTDS Settings |
|
Insufficient Permissions / GPO Interference |
|
Pro Tip: Even the most diligent inspector can’t retrieve data if the network is blocked or DNS is misconfigured. Think of it as trying to read a book through a brick wall! 🕵️♂️
Common Errors Observed 👀
Object Type | Error Message in Logs |
Groups | Task timed out after 600 seconds |
Users | Task timed out after 600 seconds |
Computers | Error retrieving IP address: No such host is known |
DHCP | The specified module 'DhcpServer' was not loaded |
Computers | Task timed out after 300 seconds |
DHCP | Failed to get version/configuration from DHCP server |
AD Attributes | The 'msDS-SPNSuffixes' attribute is not present |
DNS | Unable to obtain DNS hostname of domain controller |
DNS | Unable to resolve the DNS hostname |
Step-by-Step Resolution 🧑🏫
1️⃣ Run Inspector in Clear Cache + Debug Mode
Why: Forces a fresh data pull and exposes the exact failure points.
How:
Go to
Admin > Inspectors > Active Directory.Right-click the inspector → Run > Clear Cache + Debug Mode.
Check logs for failed object types.
Next: Focus troubleshooting on the failed object types (Users, Groups, DNS, etc.).
2️⃣ Verify Agent Connectivity & DNS Resolution
Why: Liongard agents must resolve and reach DC hostnames.
How: On the agent server:
Test-Connection <DomainControllerName> Resolve-DnsName <DomainControllerFQDN>
Watch For:
Resolve-DnsNamefailure → stale/missing DNS entriesTest-Connectionfailure → DC offline or firewall issues
Next: Fix DNS records, ensure DC availability, adjust firewall as needed.
3️⃣ Check Event Logs & PowerShell Output
Why: Some errors are visible only locally, not in inspector logs.
How: On the DC:
Get-ADUser -Filter * -ResultSetSize 10 Get-ADComputer -Filter * -ResultSetSize 10 Get-ADGroup -Filter * -ResultSetSize 10
Interpretation:
Slow results → performance bottlenecks
Failures → missing modules or insufficient permissions
Next: Install missing features, raise permissions, or split inspector loads.
4️⃣ Verify PowerShell Modules & Features
Required Modules:
ActiveDirectoryDhcpServer
Check Installed Modules:
Get-Module -ListAvailable
Install Missing Modules:
Install-WindowsFeature RSAT-AD-PowerShell Install-WindowsFeature RSAT-DHCP
Next: Re-run the inspector.
5️⃣ Verify Agent Permissions
Why: Insufficient read access or GPO restrictions cause missing/partial data.
Check:
Service account group membership
GPOs or UAC restrictions
6️⃣ Split the Load (Optional)
Why: Very large AD environments can exceed inspector processing limits.
How:
Create separate inspectors for individual DCs
Next: Test object-specific inspectors (e.g., Users-only or DNS-only) to isolate load impact.
Advance Troubleshooting 👨💻
Step | Action & How-To | Reason / Why It Matters | Expected Outcome / What to Look For |
1 | Run
| Checks DC health, DNS resolution, and replication integrity to ensure Liongard can collect data reliably | dcdiag /v: Look for DNS errors, unreachable DCs, replication failures |
2 | Review Active Directory Sites & Services
| Ensures Inspector targets only live, reachable DCs | Prevents failures caused by querying offline or misconfigured DCs |
3 | Remove stale NTDS connections / decommissioned DCs
| Avoids Inspector targeting non-existent DCs, improving reliability | Streamlined replication and consistent object retrieval |
4 | Confirm agent server DNS suffix
| Accurate DNS ensures agent can resolve and communicate with all DCs | Successful hostname resolution and stable connectivity for data collection |
5 | Restart Liongard agent & rerun inspectors
| Applies configuration changes and refreshes cached data | Confirms fixes are effective; Inspector collects complete and accurate data |
Why Cleaning Up AD / NTDS / DNS Settings Matters for Security 🔒
Maintaining a clean and accurate Active Directory environment isn’t just about preventing inspector failures, it’s also a critical security best practice. Here’s why:
Reduces Attack Surface
Stale or decommissioned domain controllers that remain in AD Sites and Services or NTDS settings may still appear in network scans. Attackers could target these outdated systems if they’re not properly removed.
Removing old objects ensures that only legitimate, active systems can be queried or attacked.
Prevents Unauthorized Access
Stale computer accounts or orphaned DCs can have old credentials or tokens cached, which may be exploited.
By cleaning up NTDS and DNS entries, you ensure that only active, properly configured systems can authenticate and interact with AD.
Improves Audit and Compliance Posture
Security audits often flag inconsistencies in AD, like inactive DCs or stale NTDS connections.
Regular cleanup demonstrates compliance with internal security policies and standards like ISO 27001 or SOC 2.
Enhances Incident Response
Accurate AD data ensures that logs, alerts, and audit trails reflect reality.
If a breach or suspicious activity occurs, knowing exactly which systems are active allows faster detection and containment.
Supports Secure Agent Operations
Liongard agents rely on AD accuracy to pull data securely. Stale or misconfigured entries could result in misrouted queries, failed inspections, or incomplete alerts, which might mask potential security gaps.
Tip 💡: Combine this cleanup with regular DNS health checks, DC decommissioning procedures, and OU trimming to maintain a robust, secure AD environment.
Quick Summary 🌟
Issue Encountered!
│
▼
Run Inspector (Clear Cache + Debug Mode)
│
▼
Check Debug Logs
│
├─► Failure in Users/Groups/Computers/DNS?
│ │
│ ▼
│ Check Agent Connectivity & DNS Resolution
│ │
│ ├─► DNS Fails?
│ │ │
│ │ ▼
│ │ Update DNS Records & Verify Host Availability
│ │
│ └─► Connectivity Fails?
│ │
│ ▼
│ Check Firewall & Network
│
▼
Check PowerShell Modules & Features
│
├─► Missing ActiveDirectory/DHCP Modules?
│ │
│ ▼
│ Install RSAT-AD-PowerShell / RSAT-DHCP
│
▼
Check Agent Permissions & GPOs
│
├─► Insufficient Permissions?
│ │
│ ▼
│ Adjust Account Rights / Test with Elevated Account
│
▼
Optional: Split Load
│
├─► Large AD Environment?
│ │
│ ▼
│ Create Separate Inspectors per DC / Limit Object Scope
│
▼
Additional Checks
│
├─► Run dcdiag / repadmin / Check AD Sites & Services
│
└─► Confirm DNS Suffix & Agent Hostname
│
▼
Rerun Inspector
│
├─► Success?
│ │
│ ▼
│ Data Collected Successfully ✅
│
└─► Failure?
│
▼
Contact Liongard Support
Contact Liongard Support 🦁
If the issue persists:
Provide:
Inspector debug logs
PowerShell outputs (
dcdiag,repadmin,Resolve-DnsName)Agent version & OS
Domain topology details (DCs, OUs, decommissioned servers)
Open a ticket: Click the support icon or visit support.liongard.com
