Fact-checked by Grok 2 weeks ago

Domain controller

A domain controller (DC) is a in a that hosts the Domain Services (AD DS), providing centralized , , and directory data management for network users, computers, and resources within the domain. It stores the directory database, which includes user accounts, computer accounts, group policies, and security descriptors, and makes this information available to authorized clients across the network. Domain controllers operate in a model, where all writable DCs in a maintain an identical copy of the directory partition through automatic synchronization, ensuring and load balancing for requests. This replication distributes directory changes, such as password updates or group memberships, across the to support consistent and enforcement. In addition to via protocols like and , domain controllers validate logon requests, issue security tokens, and supply authorization data, such as user group memberships, to servers. There are two primary types of domain controllers: writable domain controllers, which can both read from and write to the Active Directory database, and read-only domain controllers (RODCs), introduced in Windows Server 2008 for deployment in less secure or remote locations like branch offices. Writable DCs handle all directory modifications and hold flexible single-master operations (FSMO) roles, such as the schema master or RID master, which manage specific domain-wide tasks like schema updates or security identifier allocation. RODCs, by contrast, cache a subset of credentials for faster local authentication while replicating changes unidirectionally from writable DCs, reducing exposure to compromise in high-risk environments. Domain controllers can run on physical or virtualized Windows Server instances, with functional levels determining supported features based on the lowest-version DC in the domain.

Definition and Role

Core Concept

A domain controller is a server computer that runs Domain Services (AD DS), a enabling the storage of directory data such as user accounts, computer accounts, and security policies, while authenticating users and authorizing access to network resources. Domain controllers serve as the central authority for managing identities and enforcing security across a environment. As of 2025, enhancements include new functional levels, improved scalability, and security features such as advanced authentication to further strengthen these roles. In early implementations, such as those in , the domain model featured a primary domain controller (PDC) designated to track all changes to domain accounts and serve as the authoritative source for the directory database. Backup domain controllers (BDCs), in contrast, received replicated copies of this database from the PDC to provide and distribute load, ensuring if the PDC failed. Key attributes of domain controllers include centralized , where directory objects are organized and administered from a single authoritative store, and reliance on the authentication protocol for secure verification of user or host identities using tickets issued by a (KDC) integrated with . Unlike standalone servers in workgroup configurations, which operate in networks without a domain controller and manage local accounts independently, domain controllers enforce consistent domain-wide policies and enable (SSO), allowing users to access multiple resources with one set of credentials.

Position in Network Architecture

In Windows network architecture, domain controllers operate within a hierarchical structure defined by Domain Services (AD DS). A serves as the primary boundary, encompassing a group of network objects such as users, computers, and resources that share a common database and policies. can be organized into , which are collections of one or more with a contiguous and transitive trust relationships, allowing seamless and resource access across child and parent . At the highest level, forests represent top-level containers that include one or more , sharing a common , , and global catalog but maintaining non-transitive trusts between separate to isolate administrative control. This structure enables scalable management of large enterprises while enforcing isolation where needed. Domain controllers play a central role in data replication across this hierarchy, employing a model where multiple controllers maintain synchronized copies of the directory database. Within a , the Knowledge Consistency Checker (KCC) automatically generates connection objects to form an optimized , typically a ring structure that ensures efficient, loop-free updates without requiring a full-mesh connection for every pair of controllers. This intra-site replication occurs frequently to minimize latency, while inter-site replication uses designated servers and follows the defined site-link costs for efficiency. The KCC dynamically adjusts these connections in response to changes, such as adding new domain controllers, to maintain consistency across the , , or . Placement strategies for domain controllers consider network geography and , particularly in distributed environments like branch offices. Read-only domain controllers (RODCs) are deployed in such locations to provide local without exposing writable copies of the full directory, replicating data one-way from writable domain controllers via a process called replication pull. RODCs store a filtered subset of directory data, excluding sensitive credentials unless explicitly allowed, which enhances in less-trusted sites while supporting user logons and service access. Domain controllers often integrate with global catalog servers to facilitate forest-wide queries. A global catalog server, which can be any domain controller designated for this role, maintains a partial, read-only of all objects in the , including a subset of attributes from every domain to enable searches without cross-domain referrals. This interaction supports applications and services requiring information beyond a single domain, such as group membership during , ensuring efficient across the entire .

History and Evolution

Origins in Windows NT

The domain controller concept originated with the release of on July 27, 1993, evolving from the domain-based architecture of to provide centralized and resource management in networks. This introduction marked a shift toward fault-tolerant server roles, establishing the Primary Domain Controller (PDC) as the authoritative server holding the master Security Accounts Manager (SAM) database for user accounts, groups, and security policies, while Backup Domain Controllers (BDCs) served as redundant replicas to ensure availability during PDC outages. The PDC/BDC model addressed LAN Manager's limitations in scalability and reliability, enabling single-logon access across workstations and servers in a domain. Key features of this early implementation centered on single-master replication, where the PDC maintained the writable master database, and BDCs received periodic read-only copies to support and load balancing. Synchronization occurred automatically via the Net Logon service using the Netlogon Remote Protocol over transports, with partial updates every five minutes based on a change log of up to 2,000 modifications, or full synchronizations triggered by overflows or manual commands. The Directory Replicator service complemented this by propagating read-only files like logon scripts from designated export directories on the PDC to import paths on BDCs, ensuring consistent environments. This design supported up to approximately 26,000 accounts per , prioritizing redundancy over distributed writes. Despite these advancements, the PDC/BDC model had inherent limitations, including the absence of , which created a and bottleneck at the PDC for all database modifications. Scalability challenges arose in large networks exceeding thousands of users, as the centralized writable database strained over wide area networks (WANs) and required careful planning for replication intervals to avoid delays. To mitigate these issues, administrators relied on trust relationships between domains, allowing one-way or two-way passes for resource access without full replication, though managing multiple trusts added administrative complexity. The system depended on for name resolution and browsing, serving as a foundational precursor to later integrations with DNS in subsequent versions. This NT-era framework laid the groundwork for the introduced in with Windows 2000.

Developments in Modern Windows Server Versions

The introduction of Active Directory in Windows 2000 represented a fundamental evolution for domain controllers, transitioning from the single-master replication model of Windows NT domains to a architecture. This allowed changes to the directory to be made on any writable domain controller, with automatic synchronization across the network, improving fault tolerance and administrative flexibility. utilized LDAP version 3 as its core directory access protocol, enabling a hierarchical structure for organizing objects like users, groups, and computers in a scalable . Additionally, version 5 became the default authentication mechanism, offering and enhanced security over the legacy protocol. Windows Server 2003 further refined Domain Services by introducing domain and forest functional levels, which unlocked advanced features upon raising the levels to 2003. These included support for cross-forest trusts with selective authentication, allowing secure resource sharing between forests without full trust exposure, and the capability to rename domain controllers or even entire domains without rebuilding infrastructure. Improved replication efficiency was achieved through enhancements to the (ISTG) algorithm, optimizing knowledge consistency checker (KCC) computations for larger environments. Application partitions were also added, permitting custom replication scopes for directory data beyond the default configuration, domain, and schema partitions. A major advancement in was the introduction of read-only domain controllers (RODCs), designed for deployment in high-risk or untrusted locations like branch offices. RODCs maintain a read-only replica of the database, reducing the by not caching all credentials and supporting partial attribute sets to limit stored sensitive data. Fine-grained password policies were also debuted, enabling administrators to apply distinct password length, complexity, and lockout rules to specific users or security groups within a single , rather than enforcing a uniform policy across all users. These features addressed scalability and security challenges in distributed environments. Subsequent versions emphasized virtualization security and hybrid cloud integration. Windows Server 2016 introduced shielded virtual machines for domain controllers hosted on , encrypting the VM's memory, disk, and network traffic to protect against malicious host administrators or compromised fabric components. This guarded fabric approach uses Host Guardian Services to attest host integrity before running sensitive workloads. In and 2022, enhancements focused on hybrid identity through deeper integration with (formerly ), facilitating synchronization of on-premises directory objects to the for unified authentication. Key capabilities include device hybrid join, where on-premises domain-joined devices register with , and pass-through authentication to validate credentials directly against domain controllers without caching in the cloud. This hybrid evolution, building on 's foundations since 2014, gained significant traction from 2017 onward with features like seamless for cloud apps. As of November 2025, builds on these developments with performance optimizations for domain controllers, including support for 32k-page databases using 64-bit Long Value IDs (LIDs) to handle larger datasets efficiently, while maintaining in 8k-page mode. These changes enable better in high-volume environments without requiring updates. continues to receive extended support until October 2031, ensuring stability for existing domain controller deployments amid the shift toward hybrid and cloud-native architectures.

Technical Components

Software Architecture

Domain controllers operate on Windows Server editions, such as and Datacenter, which support the of the Domain Services (AD DS) role. These editions provide the foundational operating system environment necessary for hosting domain controller functionality, with the AD DS role enabling the server to store directory data and manage authentication requests within a domain. At the core of a domain controller's is the NTDS.dit , which serves as the primary for data, including objects, attributes, and directory partitions. This is managed by the (ESE), a transactional that handles indexing, , and recovery to ensure data consistency and durability during operations like updates and queries. ESE supports ACID-compliant transactions, allowing the domain controller to maintain across the directory while minimizing during tasks such as defragmentation. Supporting components integral to the architecture include the DNS server integration and the Netlogon service. Domain controllers automatically register Service Location (SRV) records in DNS to advertise their availability for services like LDAP and , enabling clients to locate them efficiently across the network. The Netlogon service, running on the domain controller, establishes and maintains secure channels with domain-joined computers, facilitating secure authentication traffic and password changes over RPC. The Local Security Authority Subsystem Service (LSASS.exe) plays a central role in the domain controller's authentication architecture, managing local security policies, validating logon requests, and enforcing ticket issuance. It integrates with DS to credential validation from clients, ensuring secure access to domain resources while running under protected restrictions to mitigate injection attacks. The SYSVOL folder represents another key architectural element, serving as a shared directory for Group Policy objects and logon scripts that must be replicated across all domain controllers. Replication occurs via the File Replication Service (FRS) in legacy deployments or the more efficient Distributed File System Replication (DFSR) in modern environments, which uses remote differential compression to synchronize changes with reduced usage. In virtualized environments, domain controller cloning in streamlines deployment by allowing the creation of new virtual domain controllers from an existing template, with built-in safeguards to prevent update sequence number (USN) rollback and potential duplication issues. These safeguards, introduced in and later, detect virtualization-specific restore operations and force the cloned domain controller to perform an initial replication from a partner, ensuring unique invocation IDs and avoiding conflicts in directory synchronization.

Directory Services Integration

Domain controllers in Domain Services (AD DS) provide robust support for [Lightweight Directory Access Protocol](/page/Lightweight_Directory_Access Protocol) (LDAP) and its secure variant, LDAPS, enabling directory queries and modifications across networked environments. LDAP operates on port 389 for unencrypted communications, while LDAPS uses port 636 to secure with TLS encryption, ensuring protected access to directory information such as user attributes and group memberships. These protocols allow clients to perform searches, binds, and updates against the directory database hosted on domain controllers. AD DS further extends LDAP functionality through schema extensions, which permit the addition of custom object classes and attributes to accommodate organization-specific needs. Administrators can define new attributes or classes using tools like the Schema snap-in or LDIFDE, assigning unique object identifiers (OIDs) to integrate seamlessly with existing LDAP operations; once extended, these custom objects become queryable and manageable via standard LDAP interfaces without disrupting core directory operations. Integration with certificate services enhances domain controller capabilities for secure authentication, particularly through the issuance of tickets via the PKINIT extension for logon. Domain controllers require a valid certificate—typically the "Domain Controller" template issued by an enterprise —to support PKINIT, which allows clients to authenticate using certificates from s instead of passwords, embedding the public key in pre-authentication data for mutual verification. In federation scenarios, domain controllers contribute to Active Directory Federation Services (AD FS) by embedding claims-based identity information directly into Kerberos tickets during user authentication. When a client authenticates, the domain controller retrieves relevant user and device claims from AD DS attributes—such as group memberships or device compliance status—and includes them in the ticket-granting ticket (TGT), which AD FS then consumes to issue SAML tokens for cross-domain or federated access without requiring additional directory queries. Cross-platform compatibility extends domain controller functionality to non-Windows environments through , an open-source implementation that enables and Unix systems to join AD domains as clients or even act as additional domain controllers. Samba leverages LDAP for directory access, for authentication, and tools like Winbind to map AD users and groups to Unix accounts, allowing seamless , printing, and in heterogeneous networks. For cloud-hybrid integration, Entra Domain Services (rebranded from Domain Services in 2023)—introduced in public preview in and general availability in —provides a managed domain service that synchronizes on-premises AD DS objects and credentials to via Entra Connect, supporting hybrid scenarios where legacy applications require domain join without deploying virtual domain controllers. Updates since its general availability have enhanced synchronization for , LDAPS, and replica sets across regions, facilitating lift-and-shift migrations while maintaining compatibility with on-premises domain controllers.

Key Functions

Authentication Mechanisms

Domain controllers primarily utilize the Kerberos protocol for secure authentication within Active Directory domains, serving as the Key Distribution Center (KDC) to issue tickets that verify user and computer identities. In this process, a client initiates authentication by sending an Authentication Service Request (AS-REQ) to the domain controller's Authentication Service (AS), which responds with an Authentication Service Reply (AS-REP) containing a Ticket Granting Ticket (TGT) encrypted with the client's secret key if credentials are valid. The TGT enables subsequent access to services; the client then submits a Ticket Granting Service Request (TGS-REQ) to the Ticket Granting Service (TGS) on the domain controller, receiving a Ticket Granting Service Reply (TGS-REP) with a service ticket for the target resource, allowing mutual authentication without transmitting passwords over the network. For legacy compatibility, domain controllers fall back to the NTLM protocol, a challenge-response mechanism that authenticates users and computers using hashed passwords without requiring a trusted third party like the KDC. NTLMv2 enhances security over earlier versions by incorporating stronger hashing (such as HMAC-MD5), session keys, and timestamps to mitigate replay attacks and support mutual authentication. This protocol is invoked when Kerberos is unavailable, such as in non-Windows environments or during network issues, but Microsoft recommends minimizing its use due to vulnerabilities compared to Kerberos. Domain controllers enforce password policies stored in the database, including requirements for complexity (e.g., minimum length, mix of character types), history (preventing of recent passwords), and account lockout after failed attempts to deter brute-force attacks. These policies apply domain-wide by default, with fine-grained options allowing tailored rules for specific user groups via Password Settings Objects (PSOs) evaluated during or password changes on the domain controller. Device relies on machine accounts in , where domain-joined computers automatically renew their passwords every 30 days to maintain secure communication with domain controllers. This renewal process uses a established during domain join, with the domain controller validating the updated password to ensure ongoing trust without manual intervention. In multi-site deployments, Read-Only Domain Controllers (RODCs) handle through pass-through mechanisms when user credentials are not cached locally, forwarding requests to a writable domain controller for verification while applying delegated authentication constraints to limit credential exposure in less secure locations. This setup supports delegated authentication by allowing RODCs to issue tickets for cached accounts or proxy non-cached ones, optimizing performance and security across distributed environments.

Policy Enforcement and Management

Domain controllers enforce security and configuration policies across the domain by replicating and applying Objects (GPOs) to users and computers, ensuring consistent settings for , resource access, and system behavior. These policies are applied after successful , building on the process to control post-login behaviors. GPOs are stored in the SYSVOL folder on each domain controller, which facilitates replication via Active Directory's File Replication Service or Distributed File System Replication, allowing domain-wide availability. The Client service on client machines processes GPOs in a specific order: local policies first, followed by site-linked, domain-linked, and organizational unit ()-linked policies, with higher-level policies overriding lower ones unless is blocked. This hierarchical processing ensures that domain controllers propagate policies that align with administrative intent, applying them during user logon, machine startup, or periodic refreshes. GPOs encompass various policy types, including settings such as assignments that define permissions like "Access this computer from the network" for specific groups, and administrative templates that configure registry-based options for applications and the operating system. Additionally, policies for software restrictions use Software Restriction Policies (SRP) to designate allowed or disallowed applications, preventing unauthorized software execution on domain-joined devices. Administrators manage GPOs using the Group Policy Management Console (GPMC), a tool for creating, editing, linking GPOs to sites, domains, or OUs, and delegating permissions. For , the Resultant Set of Policy (RSoP) feature within GPMC simulates or reports the effective policies applied to a user or computer, identifying conflicts or overrides in the processing chain. Since , domain controllers support fine-grained password policies, enabling administrators to apply varying password complexity, length, and account lockout thresholds to specific users or groups within the same , rather than enforcing a single domain-wide policy. These policies are created as Password Settings Objects (PSOs) in and assigned via the Active Directory Administrative Center or ADSI Edit. In hybrid environments combining on-premises with cloud services, domain controllers integrate with by using GPOs to enable automatic device enrollment into , allowing seamless policy deployment across on-premises and cloud-joined devices. This approach supports co-management scenarios where traditional GPOs handle domain-specific settings while Intune manages modern compliance and configuration in .

Implementation and Deployment

Setup Process

Setting up a domain controller involves several prerequisites to ensure a stable Domain Services (AD DS) environment. The server must run a supported version of , such as Windows Server 2025, 2022 or 2019, with the operating system fully installed and updated. A static is recommended for the domain controller to maintain consistent network communication, as dynamic IP changes can disrupt DNS resolution and authentication services. DNS configuration is essential, and it is common to install the DNS Server role on the domain controller itself during setup, as AD DS relies on DNS for locating domain controllers and resolving names. Appropriate administrative credentials are required: local administrator for a , Enterprise Admins for child or tree domains, and Domain Admins for additional domain controllers. The installation process begins with adding the AD DS role through Server Manager. In the Add Roles and Features Wizard, select , confirm dependencies like .NET Framework, and proceed with installation; this includes management tools for post-install . Upon completion, the Active Directory Domain Services Configuration Wizard launches to promote the server. For a , specify the root domain name (e.g., contoso.com), set the forest and domain functional levels, provide a Directory Services Restore Mode (DSRM) password, and optionally install DNS if not already present; the wizard handles delegation and name configuration. Alternatively, since , PowerShell cmdlets replace the legacy dcpromo.exe tool, which was deprecated to streamline ; use Install-WindowsFeature AD-Domain-Services -IncludeManagementTools to add the role, followed by Install-ADDSForest -DomainName "contoso.com" -InstallDns for a , specifying parameters like -SafeModeAdministratorPassword and -DomainNetbiosName. The server restarts automatically after promotion. Post-installation tasks focus on expanding and optimizing the environment. To promote an additional domain controller, join the server to the existing first, then use Server Manager to add the AD DS role and run the Configuration Wizard, selecting "Add a domain controller to an existing domain" and specifying replication options; via , employ Install-ADDSDomainController -DomainName "contoso.com" -InstallDns -Credential (Get-Credential). Replication partners are configured automatically by the Knowledge Consistency Checker (KCC) on each domain controller, creating connection objects for inbound replication from designated sources, though manual connections can be added using Sites and Services if needed for custom . Delegating Flexible Single Master Operations (FSMO) roles, such as the schema master or domain naming master, involves transferring them from the initial domain controller to a more suitable one post-replication verification; use the Move-ADDirectoryServerOperationMasterRole cmdlet with parameters like -Identity "TargetDC" -OperationMasterRole SchemaMaster,DomainNamingMaster after ensuring the target holds a recent copy of the directory. For scripted deployments, automation has been supported since , allowing unattended setups via scripts that chain cmdlets like Install-WindowsFeature and Install-ADDSDomainController, often integrated with Desired State Configuration (DSC) for repeatable configurations across multiple servers. Demoting a domain controller safely removes AD DS without by transferring roles and replicating changes first. Using Manager, select Remove Roles and Features, uncheck AD DS, provide credentials (Domain Admin for additional DCs), and confirm options like exporting credentials or handling the last DC in the domain; the process sets a local administrator password and reboots the server. In , run Uninstall-ADDSDomainController -LocalAdministratorPassword (ConvertTo-SecureString "Password" -AsPlainText -Force) -Confirm:$false for a standard demotion, or add -ForceRemoval only if the server is unreachable, followed by manual cleanup to avoid orphaned objects. After demotion, uninstall the AD DS feature binaries with Uninstall-WindowsFeature AD-Domain-Services.

Multi-Domain and Forest Configurations

In multi-domain and forest configurations, Domain Services (AD DS) enables scalable environments by organizing domains into and implementing site-aware topologies to optimize replication and resource access. A represents the top-level security boundary, encompassing one or more domains that share a common , configuration, and global catalog. Raising the forest functional level activates advanced features unavailable at lower levels; for instance, elevating to or higher enables the Recycle Bin, which preserves deleted objects and their attributes for restoration without relying on backups. This level requires all domain controllers to run or later, and the upgrade is performed via the Active Directory Domains and Trusts console or , ensuring compatibility before irreversible changes. Higher levels, such as or the Windows Server 2025 functional level (introduced in 2024), introduce additional capabilities like privileged access management, improved authentication, and support for 32k database page sizes to handle larger multivalued attributes and enhance performance in large-scale deployments. Site topology in AD DS uses the Active Directory Sites and Services tool to model physical network structure, defining sites as collections of well-connected subnets to control replication traffic and authentication referrals. Administrators associate IP subnets with sites to direct clients to the nearest domain controller, minimizing and WAN usage. Inter-site replication occurs between designated servers, which consolidate changes from intra-site domain controllers and forward them across site links using over IP (RPC/IP) as the primary transport protocol. This configuration supports efficient scaling in geographically distributed environments by scheduling replication over costlier links and compressing data to reduce consumption. Trust configurations facilitate secure resource access across domain and forest boundaries, with types tailored to organizational needs. External trusts establish one-way or two-way relationships between domains in separate forests, enabling authentication for specific resources but remaining non-transitive to limit propagation. Forest trusts, in contrast, create transitive relationships across all domains within two forests, allowing seamless Kerberos-based access while supporting selective authentication to restrict logons to designated services or computers, thereby enhancing security in merged or federated setups. These trusts are configured via the Active Directory Domains and Trusts snap-in, requiring compatible functional levels and DNS resolution between forests. For scaling in multi-domain environments, best practices emphasize and load distribution to maintain . recommends deploying at least two domain controllers per for , with an capacity model to handle failures—such as planning three domain controllers if load may double within a year. In larger deployments, domain controllers to 1,200 per to ensure reliable recovery, and distribute global catalog servers across sites based on query patterns, such as placing them near servers for mailbox access or in sites for universal load balancing. This placement optimizes partial attribute set replication and reduces inter-site traffic. Hybrid forest setups integrate on-premises AD DS with (formerly Azure AD) using Microsoft Entra Connect, enabling synchronized identities across multiple s since its initial release in September 2014. Supported topologies include a single sync server connecting multiple reachable s to one tenant, such as account-resource models where user accounts reside in one and resources like in another, with two-way trusts and optional Global Address List synchronization via Microsoft Identity Manager. This configuration supports hybrid join for devices and password hash , ensuring consistent in cloud-extended environments while adhering to forest accessibility requirements.

Security and Best Practices

Vulnerability Management

Domain controllers, as central components of environments, are prime targets for credential theft and attacks due to their role in and . involves attackers requesting service tickets for accounts with service principal names and cracking the encrypted tickets offline to obtain service account passwords, exploiting the protocol's ticket-granting service. This attack is particularly effective against domain controllers because they issue these tickets, allowing adversaries with domain access to target high-privilege service accounts without direct interaction with the controller itself. Similarly, pass-the-hash attacks leverage by reusing captured hashes to authenticate to other systems, including domain controllers, bypassing the need for plaintext passwords and enabling lateral movement within the network. Privilege escalation threats like DCSync further compound risks by abusing domain replication rights, where attackers mimic a legitimate domain controller to request and extract password hashes from via the Directory Replication Service Remote Protocol. This technique, often executed using tools like , allows unauthorized dumping of credentials for domain admins and other sensitive accounts directly from the domain controller's database. Notable vulnerabilities include ZeroLogon (CVE-2020-1472), which enables unauthenticated attackers to impersonate domain controllers and reset the machine account password, potentially leading to full domain compromise, with patches released in 2020 but persistent risks in legacy, unpatched systems as of 2025. Likewise, (CVE-2021-34527) exploits the Windows Print Spooler service on domain controllers to achieve remote execution with privileges, allowing attackers to load arbitrary drivers or execute , remaining relevant in 2025 for environments supporting older Windows versions without full remediation. In 2025, a vulnerability in Domain Services (CVE-2025-21293) allows authorized attackers to elevate privileges over the network via the Network Configuration Operators group. Additionally, vulnerabilities like BadSuccessor, which abuses device-managed service accounts (dMSA) for in 2025, and CVE-2025-32724 (Win-DDoS), which can force domain controllers into DDoS attacks via memory exhaustion, underscore the need for ongoing vigilance and timely updates. To mitigate these vulnerabilities, organizations should implement robust patching strategies, prioritizing the application of Microsoft's monthly cumulative updates for , which bundle security fixes for domain controllers. These updates must be tested in isolated lab environments simulating production topologies to verify compatibility and avoid replication disruptions before deployment. Effective monitoring involves auditing security event logs on domain controllers for indicators of compromise, such as Event ID 4624 for successful logons from anomalous sources and Event ID 4768 for Kerberos ticket requests that may signal Kerberoasting attempts. Integration with enhances detection by analyzing domain controller traffic and events in real-time to identify suspicious activities like replication abuse or credential dumping. These measures, when combined, significantly reduce the while preserving domain functionality.

High Availability Strategies

High availability (HA) in Active Directory Domain Services (AD DS) is primarily achieved through the deployment of multiple domain controllers (DCs) that replicate directory data, ensuring that , , and directory queries remain accessible even if individual DCs fail. Unlike traditional clustering, AD DS relies on its built-in model, where writable DCs maintain full copies of the directory partitions and synchronize changes via Active Directory Replication, providing inherent redundancy without shared storage dependencies. recommends deploying at least two DCs per domain to mitigate single points of failure, with one serving as a backup to handle during outages. Strategic placement of DCs is critical for , balancing factors such as network reliability, , and user proximity. In multi-site environments, place DCs in hub sites with stable links to support low-latency replication and , while evaluating satellite locations for additional DCs if user counts are 100 or more, or if availability is below 100% in environments requiring constant , such as . For branch offices with limited IT support or security risks, deploy read-only domain controllers (RODCs), which host cached, read-only copies of the directory and replicate changes unidirectionally from writable DCs, reducing exposure to compromise without sacrificing availability. In cloud-hybrid scenarios, such as , position DCs across availability zones to protect against zone-specific failures, ensuring at least two DCs per region for redundancy. To enhance resilience for specialized roles, distribute Flexible Single-Master Operations (FSMO) roles across multiple DCs and designate standby holders as direct replication partners for seamless . The PDC and RID Master should reside on highly reliable hardware in a central hub site, remaining online 24/7 to support time synchronization and allocation, while avoiding co-location of the Infrastructure Master with global catalog servers in multi-domain forests to prevent phantom object issues. Transfer roles proactively when the primary holder is available, seizing them only in emergencies, to maintain operational continuity. Supporting requires robust and processes, including regular system-state backups of all DCs and testing restores to verify post-failure. Integrate AD-integrated DNS zones across DCs for automatic replication and , and monitor replication health using tools like Active Directory Replication Status Tool to detect and resolve inconsistencies promptly. In scenarios, ensure at least one DC survives outages by diversifying hardware and locations, with automated scripts for FSMO role reassignment if needed.

References

  1. [1]
    Active Directory Domain Services overview | Microsoft Learn
    Mar 11, 2025 · A replication service that distributes directory data across a network. All domain controllers in a domain participate in replication and ...
  2. [2]
    [MS-AUTHSOD]: Network Domains and Domain Controllers
    Oct 30, 2024 · A domain controller is a server that has made its account database available to other machines in a controlled manner.
  3. [3]
    Active Directory Domain Services Overview - Microsoft Learn
    Aug 31, 2016 · A server that is running AD DS is called a domain controller. Administrators can use AD DS to organize elements of a network, such as users, ...
  4. [4]
    Overview of Active Directory Domain Services | Microsoft Learn
    Nov 1, 2024 · All domain controllers in a domain participate in replication and contain a complete copy of all directory information for their domain. Any ...
  5. [5]
    Understanding the Active Directory Logical Model - Microsoft Learn
    May 12, 2025 · Domain controllers provide authentication services for users and supply additional authorization data such as user group memberships, which can ...
  6. [6]
    Read-Only DCs and the Active Directory Schema - Win32 apps
    Sep 5, 2024 · Windows Server 2008 introduces a new type of domain controller, the Read-only Domain Controller (RODC). This provides a domain controller for use at branch ...<|control11|><|separator|>
  7. [7]
    Using the Organizational Domain Forest Model | Microsoft Learn
    May 12, 2025 · An RODC is a new type of domain controller in the Windows Server 2008 operating system that hosts read-only partitions of the Active Directory ...
  8. [8]
    Active Directory FSMO roles in Windows - Microsoft Learn
    Jan 15, 2025 · Schema master FSMO role · Domain naming master FSMO role · RID master FSMO role · PDC emulator FSMO role · Infrastructure master FSMO role.
  9. [9]
    Active Directory Domain Services Functional Levels | Microsoft Learn
    Oct 30, 2025 · Discover the capabilities of Active Directory Domain Services functional levels and learn how they impact domain controllers and Windows ...
  10. [10]
    Securing Domain Controllers Against Attack | Microsoft Learn
    Jul 9, 2025 · Domain controllers provide the physical storage for the Active Directory Domain Services (AD DS) database, in addition to providing the services ...
  11. [11]
    [MS-DSSP]: Glossary - Microsoft Learn
    Jun 24, 2021 · domain controller (DC): The service, running on a server, that implements Active Directory, or the server hosting this service. The service ...
  12. [12]
    [MS-NRPC]: Glossary - Microsoft Learn
    Sep 20, 2022 · backup domain controller (BDC): A domain controller (DC) that receives a copy of the domain directory database from the primary domain ...
  13. [13]
    Kerberos authentication overview in Windows Server - Microsoft Learn
    Jul 17, 2025 · Kerberos is an authentication protocol used to verify user or host identity. It uses a KDC and Active Directory, and is more efficient than ...
  14. [14]
    Create a workgroup cluster in Windows Server | Microsoft Learn
    Jul 18, 2024 · Workgroup clusters aren't domain joined, and instead are workgroup joined. They still require use of a Domain Name System (DNS). Typically, ...
  15. [15]
    Active Directory Replication Concepts | Microsoft Learn
    May 12, 2025 · The KCC runs at specified intervals to adjust the replication topology for changes that occur in AD DS, such as when new domain controllers ...
  16. [16]
    Planning Domain Controller Placement - Microsoft Learn
    May 12, 2025 · Plan where you want to place domain controllers, including forest root domain controllers, regional domain controllers, operations master role holders, and ...
  17. [17]
    Windows NT 3.1 - BetaWiki
    On 27 July 1993, Windows NT 3.1 was released for x86 and MIPS, followed by the DEC Alpha version in September. The Workstation version was sold at US$495 while ...Build 196 · Windows NT 3.5 · Windows NT 3.1 build 311 · Windows NT 3.1 build 404
  18. [18]
    [PDF] Study Guide for the Microsoft Windows NT Server Version 3.5 ...
    Oct 18, 1994 · ... LAN. Manager on OS/2 could not deliver. In 1993, Microsoft shipped Windows NT Advanced Server 3.1. Combined with a new generation of hardware ...
  19. [19]
    [PDF] Concepts and Planning
    The Windows NT Server domain is the administrative unit of Windows NT. Server Directory Services. Within a domain, an administrator creates one user account ...
  20. [20]
    [MS-NRPC]: Netlogon NT Replication Details - Microsoft Learn
    The PDC updates the database serial number in the local state information for the BDC after processing the synchronization call from that BDC. pict03174391 ...
  21. [21]
    Evolution of Windows Domain Controller - Netwrix
    Jan 30, 2017 · Windows NT 3.1 introduced the original Microsoft domain​​ Thus, there was a primary domain controller (PDC) and backup domain controllers (BDCs). ...
  22. [22]
    Active Directory Domain Services - Win32 apps | Microsoft Learn
    Oct 19, 2020 · Microsoft Active Directory Domain Services are the foundation for distributed networks built on Windows 2000 Server, Windows Server 2003 and ...
  23. [23]
    Deploying AD DS in a Windows 2000 Organization - Microsoft Learn
    May 12, 2025 · Adprep extends the AD DS schema, updates default security descriptors of selected objects, and adds new directory objects as required by some ...
  24. [24]
    How to raise Active Directory domain and forest functional levels
    Jan 15, 2025 · This article discusses raising the domain and forest functional levels that are supported by Microsoft Windows Server 2003-based or newer domain controllers.Missing: evolution | Show results with:evolution
  25. [25]
    Deploying AD DS in a Windows Server 2003 Organization
    May 12, 2025 · Adprep extends the AD DS schema, updates default security descriptors of selected objects, and adds new directory objects as required by some ...
  26. [26]
    Understanding "Read Only Domain Controller" authentication
    Apr 4, 2019 · The “ Read Only Domain Controller ” is new to Windows Server 2008 and allows for the installation of a domain controller to accommodate common ...
  27. [27]
    [PDF] Windows Server 2008 Active Directory Feature Components
    Fine-grained password policy removes the restriction of a single password policy per domain. Active Directory Domain Services (AD DS) in Windows Server 2008 ...
  28. [28]
    Guarded Fabric and Shielded VMs overview | Microsoft Learn
    Feb 17, 2023 · To help protect against compromised virtualization fabric, Windows Server 2016 Hyper-V introduced shielded VMs. A shielded VM is a generation 2 ...
  29. [29]
    What is Microsoft Entra Connect and Connect Health. - Microsoft Learn
    Apr 9, 2025 · Microsoft Entra Connect is an on-premises Microsoft application designed to meet and accomplish your hybrid identity goals.Missing: domain | Show results with:domain
  30. [30]
    Azure Active Directory (AD) Connect - Microsoft Lifecycle
    Initially released in September 2014, Azure AD Sync changed its name to Azure AD Connect in June 2015, starting with version 1.0.8641.0. English (United States).Missing: introduction | Show results with:introduction
  31. [31]
    What's new in Windows Server 2025 - Microsoft Learn
    Feb 28, 2025 · You can install new domain controllers (DCs) with a 32k-page database that uses 64-bit Long Value IDs (LIDs) and run in 8k-page mode for ...Server 2022 · DTrace on Windows · Mica material
  32. [32]
    Comparison of Windows Server editions | Microsoft Learn
    May 1, 2025 · Use this article to compare the Standard, Datacenter, and Datacenter: Azure Edition of Windows Server to see which is most appropriate for you.
  33. [33]
    Install Active Directory Domain Services on Windows Server
    Apr 21, 2025 · In Server Manager, select Manage and select Add Roles and Features to start the Add Roles Wizard. · On the Before you begin page, select Next.
  34. [34]
    Use Ntdsutil to manage AD files - Windows Server - Microsoft Learn
    Jan 15, 2025 · This article describes how to manage the Active Directory (AD) database file, Ntds.dit, from the command line.
  35. [35]
    Memory usage considerations in AD DS performance tuning
    May 18, 2022 · The Active Directory database services (NTDSAI.dll) work with the Extensible Storage Engine (ESE, ESENT.dll). Here is a visual diagram of ...
  36. [36]
    Offline defragmentation of Active Directory database - Windows Server
    Jan 15, 2025 · Online defragmentation does not reduce the size of the database file (Ntds.dit) but instead optimizes data storage in the database and reclaims ...
  37. [37]
    How to verify that SRV DNS records have been created for a domain ...
    Jan 15, 2025 · It's used to identify computers hosting specific services. SRV resource records are used to locate domain controllers for Active Directory.
  38. [38]
    [MS-NRPC]: Netlogon Operational Flow on Domain Controllers
    Netlogon determines the account domain, sets up a secure channel to a DC, passes the logon request, receives validation data, and synchronizes account ...
  39. [39]
    Service overview and network port requirements - Windows Server
    Jan 15, 2025 · Active Directory runs under the Lsass.exe process and includes the authentication and replication engines for Windows domain controllers.<|separator|>
  40. [40]
    Migrate SYSVOL replication from FRS to DFS Replication
    May 14, 2025 · This article provides a guide to help you migrate the SYSVOL folder from FRS to DFS Replication. The migration process is complex and requires careful planning ...
  41. [41]
    Force synchronization for Distributed File System Replication (DFSR ...
    Jan 15, 2025 · This article introduces how to force an authoritative and non-authoritative synchronization for DFSR-replicated sysvol replication.
  42. [42]
    Virtualizing domain controllers with Hyper-V - Microsoft Learn
    Mar 7, 2024 · Windows Server 2012 and later support virtualized domain controllers (DCs) with safeguards to prevent update sequence number (USN) rollback on virtual DCs.
  43. [43]
    Virtualized Domain Controller Deployment and Configuration
    There are a number of stages and steps to cloning a virtualized domain controller, regardless of using graphical tools or Windows PowerShell.
  44. [44]
    Configure firewall for AD domain and trusts - Windows Server
    Jan 15, 2025 · Examples are Windows NT-based operating systems or third-party Domain Controllers that are based on Samba. For more information about how to ...Missing: platform | Show results with:platform
  45. [45]
    How to extend the schema - Win32 apps | Microsoft Learn
    Sep 5, 2024 · Extend schema by choosing a method (manual or programmatic), enabling changes, obtaining OIDs, creating new attributes/classes, updating the  ...
  46. [46]
    Certificate Requirements and Enumeration | Microsoft Learn
    Oct 29, 2024 · This topic for the IT professional and smart card developers describes how certificates are managed and used for smart card sign-in.
  47. [47]
    Passwordless RDP Authentication for On-Prem Servers with Smart ...
    Issue Kerberos Authentication Certificate to Domain Controller: Go to the Certificate Server and open the Certificate Authority console. Click on Templates ...
  48. [48]
    Using AD DS Claims with AD FS | Microsoft Learn
    Apr 8, 2025 · AD DS issued claims can be used with AD FS to access both user and device claims directly from the user's authentication context.About Dynamic Access Control · Benefits of Using AD DS...
  49. [49]
    Joining a Samba DC to an Existing Active Directory - SambaWiki
    Oct 7, 2025 · Running one domain controller (DC) is sufficient for a working Active Directory (AD) forest. However, for redundancy and load balancing reasons, ...Missing: cross- platform
  50. [50]
    Overview of Microsoft Entra Domain Services - Microsoft Entra ID
    ### Summary of Microsoft Entra Domain Services
  51. [51]
    Azure AD Domain Services is now in Public Preview &#8211
    Sep 6, 2018 · Azure AD Domain Services is an entirely new concept. It's a cloud based service which gives you a fully Windows Server Active Directory compatible set of API's ...Missing: DS | Show results with:DS
  52. [52]
    NTLM overview in Windows Server - Microsoft Learn
    Apr 18, 2025 · The NTLM authentication protocols authenticate users and computers based on a challenge response mechanism that proves to a server or domain ...
  53. [53]
    Password Policy - Windows 10 | Microsoft Learn
    Apr 19, 2017 · This feature provides organizations with a way to define different password and account lockout policies for different sets of users in a domain ...
  54. [54]
    Configure fine grained password policies for Active Directory ...
    Jun 16, 2025 · Fine Grained Password Policies provide you with a way to define different password and account lockout policies for different sets of users in a domain.Prerequisites · Create a fine grained...
  55. [55]
    Machine Account Password Process | Microsoft Community Hub
    The machine account password change is initiated by the computer every 30 days by default. Since Windows 2000, all versions of Windows have the same value.
  56. [56]
    Domain member Maximum machine account password age
    May 28, 2020 · We recommend that you set Domain member: Maximum machine account password age to about 30 days. Setting the value to fewer days can increase ...Reference · Policy management
  57. [57]
    Group Policy overview for Windows Server | Microsoft Learn
    Jun 16, 2025 · A GPO is a virtual collection of policy settings, security permissions, and scope of management (SOM) that you can apply to users and computers ...Missing: restrictions | Show results with:restrictions
  58. [58]
    Group Policy processing for Windows | Microsoft Learn
    Jun 16, 2025 · Local Group Policy is processed before domain-based policies. Policy settings from GPOs linked to AD containers override local policy settings.How Group Policy Processing... · Block Inheritance · Loopback Processing ModeMissing: types restrictions
  59. [59]
    Recommendations for managing Group Policy administrative ...
    Jan 15, 2025 · In the Sysvol folder of each domain controller, each domain GPO maintains a single folder, and this folder is named the Group Policy Template ( ...Missing: processing OU
  60. [60]
    Security policy settings - Windows 10 | Microsoft Learn
    Apr 18, 2017 · The processing is according to the Group Policy processing order of local, site, domain, and organizational unit (OU), as described earlier ...
  61. [61]
    Active Directory Security Groups | Microsoft Learn
    Sep 22, 2025 · The Domain Admins group controls access to all domain controllers in a domain, and it can modify the membership of all administrative accounts ...
  62. [62]
    Administer Software Restriction Policies | Microsoft Learn
    Jul 29, 2021 · Software Restriction Policies (SRP) is Group Policy-based feature that identifies software programs running on computers in a domain, and controls the ability ...Missing: assignment templates
  63. [63]
    Group Policy Management Console in Windows | Microsoft Learn
    May 14, 2025 · Learn how to create, edit, link, and manage Group Policy Objects using the Group Policy Management Console.
  64. [64]
    Use Resultant Set of Policy to Manage Group Policy | Microsoft Learn
    Aug 31, 2016 · This topic describes how Resultant Set of Policy (RSoP) is used by Group Policy Management Console (GPMC) and describes the procedures to ...
  65. [65]
    AD DS Simplified Administration | Microsoft Learn
    May 12, 2025 · Windows Server 2012 introduced the next generation of Active Directory Domain Services Simplified Administration, and was the most radical ...Missing: evolution | Show results with:evolution
  66. [66]
    Enroll a Windows device automatically using Group Policy
    Aug 4, 2025 · You can use a Group Policy to trigger autoenrollment to Mobile Device Management (MDM) for Active Directory (AD) domain-joined devices.Microsoft Entra ID · Automatic MDM enrollment in... · Diagnose MDM enrollment
  67. [67]
    Endpoint management services and solutions at Microsoft
    Aug 21, 2024 · In hybrid work environments ... Configuration Manager is an on-premises management solution that uses Active Directory and Group Policy Objects ( ...Microsoft Intune · Configuration Manager And... · Intune Suite
  68. [68]
    Best practices for DNS client settings in Windows Server
    Jan 15, 2025 · Configure the Preferred DNS server in TCP/IP properties on each Domain Controller to use itself as Primary DNS Server. · Configure all Domain ...Domain controller with DNS... · Domain controller without DNS...
  69. [69]
    DNS and AD DS | Microsoft Learn
    May 12, 2025 · Active Directory Domain Services (AD DS) uses Domain Name System (DNS) name resolution services to make it possible for clients to locate domain controllers.
  70. [70]
    AD DS Configuration Wizard Page Descriptions - Microsoft Learn
    Jul 17, 2025 · Watch the following video to get an overview of promoting and demoting domain controllers using the AD DS Configuration Wizard: Summary of each ...
  71. [71]
    What's New in Active Directory Domain Services Installation and ...
    May 12, 2025 · AD DS installation is simpler, faster, built on PowerShell, integrated with Server Manager, and includes adprep.exe integration and ...
  72. [72]
    Install-ADDSDomainController (ADDSDeployment) | Microsoft Learn
    The Install-ADDSDomainController cmdlet installs a domain controller in Active Directory. Examples. Example 1: Install a domain controller and DNS server.
  73. [73]
    View and transfer FSMO roles - Windows Server - Microsoft Learn
    Jan 15, 2025 · This article describes how to transfer Flexible Single Master Operations (FSMO) roles (also known as operations master roles) by using the Active Directory ...Missing: delegating | Show results with:delegating
  74. [74]
    Demote Domain Controllers and Domains - Microsoft Learn
    Jul 11, 2025 · There are two methods you can use to remove the AD DS role: On the Manage menu on the main dashboard, select Remove Roles and Features:.
  75. [75]
    Uninstall-ADDSDomainController (ADDSDeployment)
    This command removes AD DS from an additional domain controller in a domain. The user is prompted to set and confirm the local Administrator password prior to ...Syntax · ADDSDomainControllerUninst... · Description
  76. [76]
    Enable Active Directory Recycle Bin in Windows Server
    Jun 6, 2025 · The forest and domain functional level must be Windows Server 2008 R2 or higher. · You must be a member of the Domain Admins group in the domain ...
  77. [77]
    Raise Domain and Forest Functional Levels in AD DS on Windows ...
    Jul 21, 2025 · For example, to raise the domain functional level to Windows Server 2025, all domain controllers in the domain must be running Windows Server ...
  78. [78]
    Designing the Site Topology | Microsoft Learn
    May 12, 2025 · Designing a site topology for Active Directory Domain Services (AD DS) involves planning for domain controller placement and designing sites, subnets, site ...
  79. [79]
    How trust relationships work for forests in Active Directory
    Jun 30, 2025 · In a two-way trust, Domain A trusts Domain B and Domain B trusts Domain A. This configuration means that authentication requests can be passed ...Trust relationship flows · Forest trusts
  80. [80]
    Capacity planning for Active Directory Domain Services
    Sep 12, 2025 · After you restart the computer or the AD DS service, the Extensible Storage Engine (ESE) cache is empty. Performance is disk-bound while the ...
  81. [81]
    Active Directory Domain Services Maximum Limits and Scalability
    Jul 21, 2025 · We recommend that you limit the number of domain controllers that you use per domain to 1,200. This limit ensures that you can reliably recover ...Missing: best multi-
  82. [82]
    Microsoft Entra Connect: Supported topologies
    Apr 9, 2025 · This article describes various on-premises and Microsoft Entra topologies that use Microsoft Entra Connect Sync as the key integration solution.
  83. [83]
    Microsoft's guidance to help mitigate Kerberoasting
    Oct 11, 2024 · Kerberoasting is a well-known Active Directory (AD) attack vector whose effectiveness is growing because of the use of GPUs to accelerate ...Missing: controller | Show results with:controller
  84. [84]
    Cracking Kerberos TGS Tickets Using Kerberoast - ADSecurity.org
    Dec 31, 2015 · Tim Medin's DerbyCon “Attacking Microsoft Kerberos Kicking the Guard ... Attack Methods for Gaining Domain Admin Rights in… Kerberos ...
  85. [85]
    Guidance about how to configure protected accounts - Microsoft Learn
    Jul 9, 2025 · Through Pass-the-hash (PtH) attacks, an attacker can authenticate to a remote server or service by using the underlying NTLM hash of a ...Protected Users · Restrict A User Account To... · Create A User Account Audit...
  86. [86]
    OS Credential Dumping: DCSync, Sub-technique T1003.006
    Feb 11, 2020 · Adversaries may attempt to access credentials and other sensitive information by abusing a Windows Domain Controller's application programming interface (API)<|separator|>
  87. [87]
    DCSync Attack Protection Against Active Directory - SentinelOne
    Jan 20, 2024 · The DCSync attack allows attackers to simulate the replication process from a remote Domain Controller (DC) and request credentials from another ...
  88. [88]
  89. [89]
    Clarified Guidance for CVE-2021-34527 Windows Print Spooler ...
    Jul 8, 2021 · On Tuesday July 6, 2021, Microsoft issued CVE-2021-34527 regarding a Windows Print Spooler vulnerability. Updates were released on July 6 ...Missing: domain | Show results with:domain
  90. [90]
    4624(S) An account was successfully logged on. - Windows 10
    Sep 6, 2021 · This event generates when a logon session is created (on destination machine). It generates on the computer that was accessed, where the session was created.<|separator|>
  91. [91]
    4768(S, F) A Kerberos authentication ticket (TGT) was requested.
    Oct 19, 2021 · This event generates every time Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT). This event generates only on domain controllers.
  92. [92]
    What is Microsoft Defender for Identity? - Microsoft Learn
    Nov 26, 2024 · Microsoft Defender for Identity is a cloud-based security solution that helps secure your identity monitoring across your organization.
  93. [93]
    FSMO placement and optimization on Active Directory domain ...
    Jan 15, 2025 · This article describes the placement of Active Directory Flexible Single-Master Operation (FSMO) roles in the domain and forest for these operations.Missing: delegating | Show results with:delegating
  94. [94]
    How to use Windows Server cluster nodes as domain controllers
    Dec 25, 2023 · It is recommended that 2+ nodes be configured as domain controllers, so that there be at least one backup domain controller.Missing: strategies | Show results with:strategies
  95. [95]
    Planning Regional Domain Controller Placement | Microsoft Learn
    May 12, 2025 · Place a regional domain controller only in locations that include personnel who can administer the domain controller, or be sure that the domain controller can ...
  96. [96]
    Additional Domain Controllers as Azure VMs (on-prem AD DS ...
    May 24, 2025 · Deploy regional Azure VMs that will host your AD DCs. For each location, deploy at least 2 DCs (VMs) per site for high availability: Expand ...<|control11|><|separator|>
  97. [97]
    Planning Operations Master Role Placement | Microsoft Learn
    May 12, 2025 · zip, and open Domain Controller Placement (DSSTOPO_4.doc). You need to refer to the information about locations in which you need to place ...
  98. [98]
    Implement domain controller as HA version - Microsoft Q&A
    Aug 25, 2020 · It's recommended to set DNS zone as integrated active directory DNS zone on all domain controller , in this case the DNS zone will be replicated automatically.
  99. [99]
    PAM disaster recovery | Microsoft Learn
    Apr 8, 2025 · This article describes considerations for high availability and disaster recovery when deploying Active Directory Domain Services (AD DS) and Microsoft ...<|control11|><|separator|>