Skip to content

An AD trust between two domains stopped working and users cannot access resources.

Trusts usually break due to DNS, firewall or an expired trust password. Measure first, then fix, and put logs from both sides next to each other.

Try this first

  1. 1On a DC on each side run nltest /sc_query:OTHERDOMAIN and netdom verify /domain:OTHERDOMAIN. Read the exact error code.
  2. 2Check DNS: forward and conditional forwarders must work both ways, plus reverse zones. Test with nslookup -type=SRV _ldap._tcp.dc._msdcs.OTHERDOMAIN.
  3. 3Firewall check: ports 88 (Kerberos), 389 and 636 (LDAP), 445 (SMB), 3268 (Global Catalog) and the RPC range must be open between DCs.
  4. 4Reset the trust password if everything else looks fine but Kerberos complains: netdom trust /domain:OTHERDOMAIN /resetonewaytrustpassword (both directions, a few minutes apart).
  5. 5Test with a test account from the other domain against a share or PC, and check Event Viewer (System and Security) on both DCs for Kerberos and NTLM events.

When to bring us in

In a merger or acquisition where the other side is not under your control, gather logs and involve both AD teams. Trust troubleshooting without access to the other side is almost always a dead end.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.