Trending Issue: SharePoint fixes fail to install after installation of September 2025 CU

Information:
The issue described in this article currently affects only customers which executed the SharePoint Configuration Wizard after installing the language independent fix from September 2025 CU and the installation of the language dependent fix.

Starting with October 2025 CU for SharePoint Server (all versions) most customers might be affected by this problem – so addressing the issue now will prevent problems in the future.

To enhance security September 2025 CU for SharePoint restricts the Windows WSS_WPG windows security group and the IIS_IUSRS windows security group from writing into the SharePoint _LAYOUTS directory (c:\program files\common files\microsoft shared\Web Server Extensions\16\TEMPLATE\LAYOUTS).

The WSS_WPG and IIS_IUSRS groups include all SharePoint service accounts including the

  • SharePoint Farm Service Account
  • SharePoint Windows Service Accounts
  • SharePoint Application Pool Accounts

A problem will occur if the local system account of Windows (NT Authority\system) is included in the WSS_WPG windows security group or the IIS_IUSRS windows security group :

The reasons is that the Windows MSI installer runs as local system and will no longer be allowed to add the updated files into the _LAYOUTS directory. This is generic will occur when trying to install a SharePoint fix if the local system account is a member of the WSS_WPG or the IIS_IUSRS group:

When checking the MSI installer log (in %localappdata\temp) – either sts-x-none_MSPLOG.LOG or the most recent wssmui-…_MSPLOG.LOG – you will find an error similar to this (the subdirectory and file name below LAYOUTS may vary):

Error 1310. Error writing to file: C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\TEMPLATE\LAYOUTS\ppsma\1033\DesignerInstall\en\Microsoft.PerformancePoint.Scorecards.DesignerPlugins.dll.deploy. System error 0. Verify that you have access to that directory.

Cause

The local system account is the default account for the following SharePoint Windows Services if not changed by a SharePoint Administrator:

  • Claims to Windows Token Service
  • Document Conversion Launcher Service

Solution

A fix for this issue has been released with October 2025 CU for SharePoint

  1. Open “Configure Service Accounts” in the “Security” Section of the SharePoint Central Administration Website and verify the credentials used for all configured Services and Application Pools.
     

    Replace all local machine accounts (e.g. Local System and Local Service) with domain accounts.

    The required permissions account used for the Claims to Windows Token Service can be found in this document:

     
    (SharePoint Server Subscription Edition no longer uses this service – so no specific permissions are required for this SharePoint Version.)

  2. After the service accounts have been corrected, remove the system and local service account from the WSS_WPG and IIS_IUSRS groups

After these steps have been performed it will be possible again to install SharePoint fixes.

Update from September 15th, 2025:
We recently identified that even with the steps above the SharePoint configuration wizard adds the local system and local service account to the WSS_WPG group when reprovisioning the SharePoint windows services. This issue is currently being investigated.

68 Comments


  1. Hi.

    I had issues with side by side copy but not with patch install.
    Both sts and wssloc installed just fine and I have local system, network service and local service (yes 3 accounts) in wss_wpg group.

    Where it ststes that we should remove this users from that group, I can’t find it on offical docu.

    Also why install went trough?
    I understand why psconfig was unsuccesfull, but I don’t why install went ok.

    Regards,Greg

    Reply

    1. Hi Gregecslo,
      for September 2025 CU you will most likely not have a problem as the code change comes with September CU and is activated with running the config wizard.
      But October CU will then hit you.
      Cheers,
      Stefan

      Reply

    2. Greg What issue did you have with SideBySide copy? What was your fix?

      Reply

      1. Hi
        My sharepoint farm admin account was used as sp service account and therefor added to wss_wpg group.
        I created new farm admin and ran psconfig with that one.

        Reply

  2. OK but will there be “official” statement somwhere that those accounts need to be removed from WSS_WPG group?
    I know that it is logical and all but still it would be cool to have that in official documentation.

    Reply

    1. First PG needs to be made aware that there are systems where these accounts are in this group.
      I have a couple of farms where this is not the case as I did not configure anything with local system.
      Cheers,
      Stefan

      Reply

  3. Hey Stefan,

    Investigating our SharePoint 2019 farms in Test and Prod, the Claims To Windows Token Service and Document Conversions Launcher Service are not started on any of our servers but in Manage Service Accounts, they are still set to Local System. Do we still need to change them to a domain service account even if they are not being used?

    Thank you.

    Reply

    1. Hi Daniel,
      yes exactly. It does not matter if they are started or not. The fact that the account is configured in managed service accounts causes the account to be added to WSS_WPG and will continue to be added to this group going forward if the account is not removed in manage service accounts.
      Cheers,
      Stefan

      Reply

  4. I have removed both local users from the WSS_WPG group.

    However, I still have the following issue in the Health Analyzer (SP16 on-premises) :

    Title Verify various user groups don’t have elevated permissions.
    Severity 2 – Warning
    Category Security
    Explanation
    If a Security Principals associated with SharePoint Server processes has elevated privileges, it may put the SharePoint Server at risk. WSS_WPG has unexpected permission(s) on folder C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\14\TEMPLATE\LAYOUTS, C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\TEMPLATE\LAYOUTS. See “https://learn.microsoft.com/sharepoint/install/account-permissions-and-security-settings-in-sharepoint-server-2016” for guidance on the correct settings.

    Do I need to change the permissions on these folders too ?

    Reply

    1. Hi Olivier,
      it might be that the health rule does not take the new security settings into consideration.
      Please check if the two folders have this settings for WSS_WPG:

      Write – Deny

      (some additional permissions for Read, Execute and List are ok)

      This is the expected setting.

      Reply

    2. Hi Olivier,
      I was just able to reproduce this – indeed the health rules seem to miss the new security settings.
      Please open a ticket with Microsoft Support and send me the SR number using the “contact the blog author” option at the top right of this page.
      Thanks,
      Stefan

      Reply

      1. Hi Olivier and Stefan,

        I have the same symptom (the health rule doesn’t seem to take into account the security change).

        Did you open a ticket with Microsoft and if so, did they resolve the case ?

        Thanks,

        Jeff Ruel

        Reply

        1. Hi Jeff,
          I received a support case for another customer and was able to identify the root cause.
          To resolve the issue a programmatic change in our product will be required which I have requested.
          Cheers,
          Stefan

          Reply

          1. Thanks for the quick reply Stefan.

            Will this programmatic change be included in the next CU (october) ?

            Thanks,

            Jeff


          2. Most likely not. There are other high priority issues that need to be addressed first.
            For now just ignore this health rule report.

            Cheers,
            Stefan


  5. Thanks for the heads up on this one. My WSS_WPG also has a local NT AUTHORITY\NETWORK SERVICE account. Is that going to be a problem?

    Reply

    1. Hi Marlene,
      I’m not aware of a service or process running under this account which would require write access to the _LAYOUTS directory – so I don’t think that this will cause a problem.
      But in general all managed accounts in a SharePoint Farm should be domain accounts. I would still ckeck all the sevice accounts as described in the “Solution” section of this article and update them to use a domain account if required:
      https://blog.stefan-gossner.com/2025/09/11/trending-issue-sharepoint-fixes-fail-to-install-after-installation-of-september-2025-cu/
      Cheers,
      Stefan

      Reply

      1. Nintex installer writes files to the _Layouts directory, After applying the September 2025 CU. Nintex solutions fail to deploy to subfolders under the LAYOUTS directory.

        The creation of this directory failed: C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\Template\LAYOUTS\Nintex\Images.

        There are 4 Nintex farm solutions that fail to deploy properly due to this new security update.

        Reply

        1. Hi Stephen,
          did you ensure that the SharePoint Farm Service Account is NOT in the local administrators group of the server?
          Cheers,
          Stefan

          Reply

          1. Yes, I removed the farm account from the local admin group on all 8 servers, Ran the Nintex installer again and still had write errors to the LAYOUTS directory, Ran PSConfig wizard again on the Central Admin server because Central Admin is throwing an HTTP Error 500 after removing the farm account from local admin.
            I added the farm service account back to to the Local Admin, Restart IIS and Central Admin is working again. With the farm account removed from the Local Admin on all but the Central Admin server, I tried deploying one of the Nintex solutions again „nintexcommon.wsp“ and it failed with the same issue on all Web Front ends and Application servers:
            Error: The creation of this directory failed: C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\Template\LAYOUTS\Nintex\Images
            I am running a mid-size SE farm with duplicate roles Web, Cache, App, and Search, total of 8 servers.


          2. Farm account should never be local admin.
            And of course farm account must not be used interactively. .
            Local system must not be in WSS_WPG.
            The error indicates, that the account writing to the directory is in WSS_WPG.
            If you need assistance to get this analyzed, please open a ticket with Microsoft support.
            Cheers,
            Stefan


          3. Hello Stefan,
            I was able to successfully deploy the solutions using the Nintex Installer. After removing the farm account from the Local Admin and WSS_WPG groups on all farm servers, only then did it deploy successfully.
            By default the farm account runs the Central Admin service, when a solution is deployed in CA for a mid-size SharePoint SE farm, it is the Central Admin service account that deploys the files out to the farm servers. However, I was unable to access Central Admin when the farm account was removed from the local admin group on the CA server. To deploy Nintex successfully, I removed the farm account from all Local Administrator and WSS_WPG groups in the farm. Ran the installer, After it successfully completed I had to add the farm account back to the local administrator group on the CA server for the CA site to work properly.


          4. Hi Stephen,
            the farm account is not required to be a local administrator.
            I assume you are using this account for other purposes as well which causes the problem.
            The domain account used as SharePoint Farm account should not be used for other purposes in SharePoint.
            If you need assistance to resolve this issue I would suggest to open a ticket with Microsoft to get this analyzed.
            Cheers,
            Stefan


  6. The local system account is the default account for the following SharePoint Windows Services if not changed by a SharePoint Administrator:
    Claims to Windows Token Service
    Document Conversion Launcher Service
    -> I have “Document Conversion Load Balancer Service” running under the Local service, does it need to be changed too?

    The required permissions account used for the Claims to Windows Token Service can be found in this document:
    Claims to Windows Token Service (C2WTS)
    (SharePoint Server Subscription Edition no longer uses this service – so no specific permissions are required for this SharePoint Version.)
    -> I have SPSE, where can I find permission requirements for “Document Conversion Launcher Service” and “Document Conversion Load Balancer Service” ?

    Reply

    1. Alex, I’m not the expert, but I’ll make an observation: all three services you mentioned (Claims to Windows Token Service, Document Conversion Launcher Service, Document Conversion Load Balancer Service) are Disabled on all of my SharePoint Farms (2019 and Subscription Edition). I’m willing to be these services are Disabled on your farm(s) as well. It may seem non-intuitive, but what Stefan is saying is that it does not matter that the services are not in use, we still are required to change the account that would run them, so to speak. So even though those services almost certainly defaulted to Local System on install and never got changed due to non-use (for most of us), we still have to go and change the running account in Central Admin in order to prevent Local System from being auto-added back into the WSS_WPG group, which will cause issues with future SharePoint patching.

      All of this to say, you probably don’t need to worry about the permission requirements etc for the services in question, because in all likelihood you’re not using them anyway.

      Reply

  7. I just finished install the CUs and had none of the issues. SHould I wait to update the Service Accounts or do it now?

    Reply

    1. Hi Kevin,
      I would suggest to do it now to ensure that the next CU installs without any problems.
      Cheers,
      Stefan

      Reply

      1. But when I install updates and remove those 2 accounts from WSS_WPG group after running psconfig they are added back?
        Why?

        Reply

          1. Hi.

            No, I have 2 service accounts used and none of those are local accounts. 100%
            Single dev server with all roles.


          2. Hi Stefan,

            I have the same situation as Gregecslo – the accounts “NT AUTHORITY\LOCAL SERVICE” and “NT AUTHORITY\SYSTEM” got re-added to the group “WSS_WPG” at some stage during or after installation and configuration of September 2026 CU (even though they are not configured as Service Accounts in Central Admin for any services).

            Quick info about my environment:
            – SharePoint 2016
            – 1 SP server, 1 SQL server
            – Previous update level: August 2025 CU
            – Used as Test environment – for testing CUs, code changes and other things before Production
            – The environment is configured according to “good practices”. Therefore, the only thing I had to do before the September 2025 CU installation was to reconfigure the Service Accounts as per the article https://blog.stefan-gossner.com/2025/09/11/trending-issue-sharepoint-fixes-fail-to-install-after-installation-of-september-2025-cu/

            Below are the main steps I took as part of the September 2025 CU installation – perhaps they are helpful in troubleshooting:
            1) Executed steps described in the article https://blog.stefan-gossner.com/2025/09/11/trending-issue-sharepoint-fixes-fail-to-install-after-installation-of-september-2025-cu/
            There were three services which had local accounts specified in Central Admin. They all were disabled and not used. As I understand, SharePoint by default creates them with local accounts. Therefore, I had this situation “by default”.
            – Windows Service – Claims to Windows Token Service : NT AUTHORITY\SYSTEM
            – Windows Service – Document Conversions Launcher Service : NT AUTHORITY\SYSTEM
            – Windows Service – Document Conversions Load Balancer Service : NT AUTHORITY\LOCAL SERVICE
            So, I changed accounts in Central Admin for all three services to domain accounts. No other services were using local accounts.
            Eventually I removed the accounts “NT AUTHORITY\LOCAL SERVICE” and “NT AUTHORITY\SYSTEM” from the group “WSS_WPG”.
            OBSERVATION: Changing the Service Accounts in Central Admin didn’t change the accounts for the actual underlying Windows Services – the Windows Services still had the local accounts specified in “Log on as”. I left it as it was as no additional instructions were mentioned about it in the article.
            2) Installed September 2025 CU and run Config for it. It succeeded without issues.
            3) Performed verification steps – major and important standard and custom functionality for our solution (Site provisioning, Timer Jobs, Event Receivers, JavaScript, checking Windows Logs, SharePoint Logs etc.). No issues were observed.
            Well, the only issue was the new Health report – described here: https://blog.stefan-gossner.com/2025/09/11/trending-issue-sharepoint-health-rule-complains-about-elevated-permissions-for-wss_wpg-group/. But it is a “known issue” post September 2025 CU.
            4) I didn’t check immediately if the accounts “NT AUTHORITY\LOCAL SERVICE” and “NT AUTHORITY\SYSTEM” got re-added to the group “WSS_WPG”. But I noticed Gregecslo’s comment and decided to check. And yes – the accounts are re-added.
            Service Accounts for the services in Central Admin are still the newly specified domain accounts (not local accounts). However, to repeat – the underlying Windows Services (which are disabled) still display the local accounts in “Log on as”. Perhaps it is somehow related to the issue.

            I could remove the local accounts again from the group “WSS_WPG” – so next CU installations succeed. But it would not be an optimal solution if next CU installations would again add them back.

            I hope the above information helps to narrow down the potential problem.
            Let me know if I can assist in any way.


          3. Hi Martins,

            thanks a lot for this valuable input!
            I have sent you an email to the email address you provided when writing this response with possible next steps.

            Cheers,
            Stefan


          4. I tried changing the accounts for c2wts and Document Launcher / Document Load Balancer services. They are disabled in Servics.msc console

            It has created three one-time timer jobs, which aren’t executing

            Windows Service “DCLoadBalancer16” Credential Deployment One-time
            Windows Service “c2wts” Credential Deployment One-time
            Windows Service “DCLauncher16” Credential Deployment One-time

            I’ve had this same behaviour in two different farms.

            Also another one-time job isn’t running either
            Product Version Job on SERVERNAME One-time

            Seems there may be some issues with One-time timer jobs?

            The farm service account is not local admin on my servers.


        1. I am also experiencing the same issue.

          I changed all the accounts in “Configure service accounts” section so that none are running under Local System / Local Service. I removed System and Local Service accounts from WSS_WPG and IIS_IUSRS groups. I rebooted the server after that.

          I also manually changed the “Disabled” services for c2wts, and the two Document Conversion services to specify a domain account in the Log On As section. The services are still disabled.

          After running psconfig wizard, the System account is back in the WSS_WPG group.

          Would you please share the “next possible steps” for troubleshooting and resolving this?

          Reply

  8. Maybe I am missing something here but Microsoft official documentation states the following:
    The SharePoint Farm service account, which is also referred to as the database access account, is used as the application pool identity for Central Administration and as the process account for the SharePoint Timer Service. The server farm account has the following requirement:
    It must have domain user account permissions.
    Extra permissions are automatically granted to the SharePoint Farm Service account on SharePoint servers that are joined to a server farm.
    After you run Setup, machine-level permissions include:
    Membership in the WSS_ADMIN_WPG Windows security group for the SharePoint Timer Service.
    Membership in WSS_RESTRICTED_WPG for the Central Administration and Timer service application pools.
    Membership in WSS_WPG for the Central Administration application pool. <– this is contradicting the September CU and makes it impossible to deploy a solution to a mini-role farm.

    https://learn.microsoft.com/en-us/sharepoint/install/account-permissions-and-security-settings-in-sharepoint-server-2016#sharepoint-farm-administrator-account Are you testing in a single server or mini-role farm? I have seen SharePoint act completely different when it comes to single server and mini-role farms.

    Reply

    1. Hi Stephen,
      this is not correct. SharePoint Timer Service does ONLY try to deploy the solutions if the farm account is in the local administrators group – which is not recommended.
      If the farm account is NOT in the local administrator group the timer service delegates the work to the SharePoint Administration Service (WSSADMIN.EXE) which runs as local system and can deploy the solutions – at least if the local system account is not a member of the WSS_WPG or IIS_IUSRS group. If the local system account is a member of either of these group, that has to be fixed – otherwise a lot of things will break. E.g. installing future SharePoint hotfixes will fail if the local system account is in one of these two groups.
      Cheers,
      Stefan

      Reply

  9. To prepare for the Sept CU install on our SharePoint SE non-prod next week, in Configure services accounts, I updated the service accounts on the three services showing Local Service and Local System. None of the three services are enabled. I now see three One-time Credential Deployment Timer jobs that are not clearing out. Do I need to be concerned with the Timer Jobs in this state? I assume this is because the services are not enabled.

    TIA

    Reply

    1. Hi Tom,
      this did not happen on my machine.
      Did you ensure that the farm service account is NOT in the local administrator group?
      Cheers,
      Stefan

      Reply

    2. I managed to fix the issue with One-Time scheduled running jobs for setting credentials

      You have to start the services for the One-Time jobs to clear.

      $appServer1 = Get-SPServer “servername”

      Get-SPServiceInstance -Server $appServer1 | where {$.TypeName -eq “Document Conversions Launcher Service”} | Start-SPServiceInstance
      Get-SPServiceInstance -Server $appServer1 | where {$
      .TypeName -eq “Document Conversions Load Balancer Service”} | Start-SPServiceInstance
      Get-SPServiceInstance -Server $appServer1 | where {$_.TypeName -eq “Claims to Windows Token Service”} | Start-SPServiceInstance

      Note, to start the Document Conversion services, you need the below registry key added before they will start.

      https://support.microsoft.com/en-us/topic/some-document-conversion-services-in-sharepoint-server-are-not-secure-when-they-run-in-a-particular-environment-c39cd633-1e6a-18b1-9f2f-d0e7073a26bd

      Windows Registry Editor Version 5.00

      [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office Server\16.0\LauncherSettings]
      “AcknowledgedRunningOnAppServer”=dword:00000001

      [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office Server\16.0\LoadBalancerSettings]
      “AcknowledgedRunningOnAppServer”=dword:00000001

      Reply

      1. Hi Vladimir. What version of SharePoint are you using, 2016, 2019, SPSE? I do not see these timer jobs with 2016. Thehe disabled services still have the local account names.

        NOTE: When pasting from this article, the quote marks need to be re-entered.
        NOTE: Also, There’s a couple typos in the commands $.TypeName should be $_TypeName.

        Reply

        1. I got the script working with the corrections above and the services now are using the correct account.

          Thanks for your post! :0)

          Reply

          1. We’re on SP2016. Apologies about the copy paste issues with the script, not sure how the syntax got messed up in the post. Glad you managed to get it fixed up and working!


  10. What about the “Sharepoint Web Services Root” apppool that runs under “LocalService”? Does it need to be changed to use domain user account as identity?

    Reply

    1. No this is not required. The SharePoint Web Services Root application pool is disabled and not configured with a managed service account.

      Reply

  11. During the weekend I set up new SP SE farm on single server.
    What I found out:

    Here: http://si-sp-dev-se:15394/_admin/FarmCredentialManagement.aspx
    I clicked trough every single account and NO LocalSystem or LocalService accounts are used, only managed accounts I registered.
    Sharepoint services use this accounts:
    https://imgur.com/BLGFNje
    If I run psconfig GUI system account is NOT added to group
    If I run this:
    PSConfig.exe -cmd upgrade -inplace b2b -wait -cmd applicationcontent -install -cmd installfeatures -cmd secureresources -cmd services -install
    Both LOCAL service AND SYSTEM are added to WSS_WPG group but NOT to IIS_IUSRS
    https://imgur.com/a/gpEbZJt

    So next month patch install will fail because SYSTEM is in WSS_WPG?

    What am I doing wrong?

    Regards,Grega

    Reply

    1. Hi Gregecslo,
      thanks for these details!
      So there seems to be a difference between executing the GUI and the command line version of the configuration wizard.
      I will try to reproduce this on my machine.
      As a workaround to install the fixes, please manually remove the local system account from the WSS_WPG group before installing the updates.
      Cheers,
      Stefan

      Reply

  12. Hello everyone, an update has been added to this article (see yellow box at the end).
    We have identified why the config wizard still adds local system to the WSS_WPG windows security group even after fixing the account as discussed in the solution section of this blog post

    Reply

    1. Do you have any info when a fixed update might be made available? I am rather hesitant to install this one on our productive farm.
      Installation was planned for this weekend here, but I think I can postpone that?

      Reply

      1. Hi Daniel,
        the current plan is to temporarily roll back the restricted permissions for the WSS_WPG group in October CU.
        Cheers,
        Stefan

        Reply

        1. Moin Stefan,
          Thanks for the reply. So I assume all the restrictions/changes that are being put in place now with the September CU, will not have an effect with the upcoming October update(s)?

          I know we will have to deal with them but it’s not a thing that HAS to be done in the next ~4wks?

          THX,
          Daniel

          Reply

          1. Hi Daniel,
            no this is not correct. Only the restricted permissions for the WSS_WPG group and the IIS_IUSRS group will be TEMPORARILY reverted as they caused unforeseen side effects.
            The other restrictions will still be active.
            Cheers,
            Stefan


  13. I seem to not be able to reply to your last post.

    With over a dozen articles/”Trending issues” for the September updates alone, it might be a good idea to a have a single post outlining the changes of this CU, what will be rolled back in October and what will stay after installing this months’ updates.

    Either this is ‘slightly’ confusing or it is just me being confused 😀 One way or the other, thanks A LOT for all the updates you provide for us here!!

    Reply

    1. Hi Daniel,
      you are stealing my thoughts! 🙂
      I started drafting such an article already but did not have time to finish it due to other work.
      Will try to get it online later today.
      Cheers,
      Stefan

      Reply

      1. I agree with Daniel. The issues impacting the September CU has caused me to reconsider applying the patch. It would be helpful to have a post (or update the yellow box above) with a summary of the issues and workarounds. I have attempted to keep up with the workarounds and will be patching non-prod today. Fingers crossed. Production is scheduled for Saturday.

        Thanks for your active participation. The past couple of months (since the zero day) have been nuts.

        Tom C

        Reply

  14. Stefan,
    I’m not sure if you hear this often, but I would like to thank you for all that you are doing to keep us informed and helping us work through these issues month after month. This blog you have created is a God send to us SharePoint architects and admins, its allowed us to look like champions to our employers, end users and colleagues.

    Again, Thank you

    Reply

    1. I wholeheartedly agree. Thank you from the bottom of my heart’s service application! (which also is running as SYSTEM 😉 )

      Reply

    2. Thanks, both of you! — I really appreciate your feedback! 🙂

      Reply

  15. My experience after installing the Sept patch in my pre-prod environment and running the Configuration Wizard is that both LOCAL SERVICE and SYSTEM are added back to WSS_WPG group.

    Reply

    1. Correct. This issue is now being investigated.
      More exactly, not the fact that they are added (we know exactly why) – but to see if this is really necessary.
      Cheers,
      Stefan

      Reply

  16. Hi Stefan!
    After making these changes on 9/16 & making sure the disabled services have a service account then updating SP on 9/18 and re-configuring then 9/22 re-removed the local accounts it re-added, I’m getting some excessive database login errors on the database server.

    The IPs in the error messages for the past 2 days have been 2 of the 4 Search servers, both at 12:36 AM (9/23 12:25:54) AM & 1:16 AM. The errors started on Friday 9/19 12:34 AM. Earlier, 2 of the WFE servers had the same issue. I’m was getting 217 then 165 now 172 errors per day.

    SQL Server Alert 20 – Fatal Error in Current Process DESCRIPTION: SSPI handshake failed with error code 0x8009030c, state 14 while establishing a connection with integrated security; the connection has been closed. Reason: AcceptSecurityContext failed. The Windows error code indicates the cause of failure. The logon attempt failed [CLIENT (IP address)]

    The DB SQL server log at the same time has: Login failed. The login is from an untrusted domain and cannot be used with Windows authentication. [Client (same IP)]

    On the Search server, there’s an windows log application error event 5586, “Unknown SQL Exception 18452 occurred. (same info as the SQL server)
    Log Name: Application
    Source: SharePoint Foundation
    Event: 5586
    User: NT Authority\IUSR

    The crawl jobs seem to be running OK, every 2 minutes with the normal number of errors 25 or 27.
    Any ideas on how I can figure out what process is getting these errors? I assume it’s related to this change.

    Thanks so much!!

    Reply

      1. Thanks. In IIS on all the servers (APP, Search, WFEs), the “SharePoint Web Services Root” application pool is using LocalService as the Identity. I’m assuming this should be a domain service account. Since I removed the LocalService from the IIS_IUSERS groups, I assume that is what caused the problem and that I need to fix all the servers to use the farm account then stop/start the application pools. Please confirm. Thanks so much!!

        Reply

        1. Hi Marlene,
          SharePoint Web Services Root application pool is always disabled and not used at all. The only reason it exists is that IIS does not allow to create a website without adding an application pool to it.
          The root of the SharePoint Web Services website does not contain any logic. it is only a container for child web application which each have a different application pool.

          So there is no need to modify the identity SharePoint Web Services Root application pool.

          Cheers,
          Stefan

          Reply

  17. I followed the steps in the beginning of the thread and after removing local and system from on WSS_WPG and IIS_IUSRS Group. After the patches the local and system are added back to WSS_WPG which is mentioned is a known issue.

    I want to make sure that it is by design should not be added back to IIS_IUSRS Group

    My problem is is per MS support, I should make the services that were local system back to local system but I am not seeing it in the drop down. Was the permanent solution to have local system run any services or have a domain user run the services

    Reply

    1. Hi EJohnson,
      this is perfectly expected and your configuration is ok!
      Currently there is no need to change service account associations as the relevant change that required it was reverted with October 2025 CU.
      Cheers,
      Stefan

      Reply

  18. If i never installed the september patch but installed the october patch, will i have this problem if i install the november patch?

    Reply

    1. No you will not experience this issue if you never installed September CU.

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.