Issue description
ADSelfService Plus fails to deploy the login agent to remote Windows machines.
Possible causes
Remote Registry service not running: The Remote Registry service may not be running on the target machine. This must be enabled for remote deployment.
Blocked network ports: Required ports (SMB, NetBIOS, DNS, RPC) may be blocked by firewall rules.
Admin$ share not accessible: The admin$ share must be available and accessible for remote deployment.
Incorrect service account permissions: The ADSelfService Plus service may be running under an account that does not belong to the domain admins group.
Firewall or security policies blocking communication: Windows Defender Firewall or network security policies may be preventing remote deployment.
Prerequisites
Ensure you have the following before proceeding with the resolution steps:
Administrative access to the ADSelfService Plus server and target machines.
Network connectivity between the ADSelfService Plus server and target machines.
Required ports are open and accessible.
Valid credentials for a domain admin account.
Resolution
Step 1: Verify Remote Registry service status on target machines
1. Open Services (services.msc) on the target machine.
2. Locate the Remote Registry service.
3. Ensure it is set to Automatic and is running. If not running, right-click and select Start.
Step 2: Check open ports required for deployment
ADSelfService Plus uses the following ports to deploy the GINA Agent. Ensure the following ports are open on the server where ADSelfService Plus is installed.
Port | Protocol | Service |
445 | TCP | SMB (File Sharing) |
139 | TCP | NetBIOS (Authentication, Network Logon) |
53 | TCP/UDP | DNS (Name Resolution) |
593 | TCP | RPC over HTTP |
Run the following command from the ADSelfService Plus server to the target machine:Test-NetConnection <TargetMachine> -Port <PortNumber>
Example: Test-NetConnection 192.168.1.10 -Port 445
Step 3: Validate admin$ share accessibility on target machines from the ADSelfService Plus server
1. Open Run (Win + R) and enter \<TargetMachine>\admin$
2. If prompted, enter administrator credentials for the target machine.
3. If access is denied, open Command Prompt as an administrator and enter net share. If admin$ is missing, enable it with net share admin$ /grant:Administrators,FULL.
Step 4: Verify the ADSelfService Plus service account on the server
Since ADSelfService Plus is responsible for deploying the GINA Agent, the ADSelfService Plus service on the server must run under an account with domain admin privileges. To verify this, follow these steps.
Open Services (services.msc) on the ADSelfService Plus server.
Locate the ManageEngine ADSelfService Plus service.
Right-click and select Properties.
Under the Log On tab, check the service account. The account should be a domain admin account.
To verify domain admins group membership:
Open Active Directory Users and Computers (dsa.msc).
Navigate to Users or the designated Organizational Unit (OU).
Find the service account used for ManageEngine ADSelfService Plus.
Right-click the Account > Properties > Member Of tab.
Ensure the account is listed under Domain Admins.
If the service account is incorrect, update it in Services (services.msc) under the Log On tab. If the account is missing from domain admins, add it via Active Directory Users and Computers.
Restart the ADSelfService Plus service after making changes.
Validation and confirmation
After applying the fixes, deploy the agent and verify whether the user can access the Reset Password/Unlock Account icon from the login screen.
How to reach support
If the issue persists, contact our support team here.