Attempts to protect or pair with a Rapid Recovery Agent fail.
In the user interface, the following error is shown:
Service Host Error: Service error while handling request [POST https://localhost:8006/apprecovery/api/core/agents/validateAgentProtectionAbility]: Failed to connect to remote machine using provided credentials. This can be caused by one of the following:
- Destination host name is incorrect or host is offline.
- Destination host is behind firewall or similar protection software that prevents connection.
- If you are trying to connect to Windows machine:
- WMI service is not started or blocked by firewall.
- If you are trying to connect to Linux machine:
- SSH service is not started or blocked by firewall.
- Provided SSH port is incorrect.
In the Core logs (C:\ProgramData\AppRecovery\Logs\AppRecovery.log), a related internal error appears:
ERROR - Replay.Agent.Client.AgentPairManagementAgentClient () Error while deserialize ServerError object. GET https://[AgentName]:8006/apprecovery/api/agent/pair/connect/?useNtlmOnly=True failed with HTTP status code InternalServerError:
This indicates the Core attempted to connect to the agent using NTLM authentication, but the connection was blocked or failed on the agent side.
Unable to protect or pair a Rapid Recovery Agent from the Core
UI displays: Failed to connect to remote machine using provided credentials
Core logs show: useNtlmOnly=True and InternalServerError
Remote WMI tests (wbemtest
or Get-WmiObject
) return Access Denied
Local WMI tests on the agent using \\localhost\root\cimv2
may succeed
The protected machine is often a Domain Controller or hardened Windows Server
Windows Event Viewer may show WMI/DCOM errors (e.g., Event ID 10028 or 10036)
This issue occurs when NTLM authentication is restricted or blocked on the protected machine due to local or domain-level security policies.
Rapid Recovery requires NTLM authentication for agent pairing and communication. If NTLM traffic is denied by Group Policy, registry configuration, or user rights assignments, the protection attempt fails with both UI and internal errors.
Update NTLM and local security policies on the protected machine to allow NTLM authentication and remote WMI access.
Open gpedit.msc
and navigate to:Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
Set the following policies:
Network security: Restrict NTLM: Incoming NTLM traffic → Allow all
Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers → Allow all
Network security: Restrict NTLM: Audit NTLM authentication in this domain → Enable all
Network security: Restrict NTLM: Audit Incoming NTLM Traffic → Enable auditing for all accounts
Run gpupdate /force
to apply changes.
After running gpupdate /force
, re-check the settings in gpedit.msc
.
If the changes were reverted, a domain Group Policy Object (GPO) is enforcing restrictions.
To confirm:
Run gpresult /h gporeport.html
Open the report and check which policy is applying the settings
Work with your domain administrator to adjust or create exceptions
For background, see KB 4033596 – NTLM and Pass-Through Authentication
Related WMI troubleshooting KB: KB 4033088 – Using wbemtest to Test DCOM and WMI Connections
If you are still experiencing issues after following the steps in this article, please contact Quest Support for further assistance.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center