Fact-checked by Grok 2 weeks ago

Flexible single master operation

Flexible single-master operation (FSMO), also known as Flexible Single Master Operations, refers to a set of five specialized roles assigned to domain controllers in a Microsoft Active Directory forest to handle directory updates that cannot be replicated across multiple masters simultaneously, thereby preventing conflicts and ensuring data consistency. These roles address limitations in multi-master replication by designating a single domain controller as the authoritative source for specific tasks, such as schema modifications and relative ID (RID) allocation. FSMO roles originated from Microsoft's design to balance the efficiency of multi-master replication with the need for centralized control in certain operations within Windows Server environments. These roles were introduced with the initial release of Active Directory in Windows 2000. The five FSMO roles are divided into forest-wide and domain-wide categories, with two roles applying to the entire forest and three applying to each domain. The Schema Master is the sole authority for updating the , which defines the structure and attributes of objects in the directory. The Domain Naming Master manages the addition, removal, and renaming of domains and application partitions within the forest. Within each domain, the RID Master allocates pools of relative IDs used to create unique security identifiers () for users, groups, and computers. The PDC Emulator acts as the primary for backward compatibility, handling password changes, time synchronization, and updates. Finally, the Infrastructure Master maintains cross-domain object references by updating group memberships when users from other domains are added or removed. These roles can be transferred between domain controllers to optimize or ensure , but seizing them is necessary only in cases of failure to avoid prolonged outages. Proper placement of FSMO roles is critical; for instance, the Infrastructure Master should not be on a global server in a multi- to prevent issues. and managing FSMO roles is essential for maintaining the health of , as disruptions can impact , replication, and overall functionality.

Introduction

Definition and Purpose

Flexible Single Master Operation (FSMO), also known as Operations Master roles, refers to a set of five specialized roles within Domain Services (AD DS) that assign specific s to handle particular types of directory updates, thereby preventing conflicts that could arise from simultaneous across multiple s. These roles designate a single as the authoritative source for operations where concurrent modifications could lead to inconsistencies, such as changes or allocations. The primary purpose of FSMO is to provide single-master control for critical directory operations while permitting for the majority of other updates in AD DS, ensuring and in a distributed environment. This approach centralizes authority for tasks like modifications, additions, password changes for certain accounts, (SID) allocations, and updates to cross- object references, minimizing the risk of replication conflicts without overly restricting the system's . By isolating these sensitive operations to one domain controller at a time, FSMO maintains the reliability of the even as changes propagate multimaster-style to other domain controllers. In essence, FSMO implements a hybrid replication model in , where most directory objects and attributes can be updated on any writable and replicated to others in a multimaster fashion, but the five FSMO roles enforce single-master discipline for operations that require global uniqueness or sequential processing to avoid errors. This balance allows AD DS to support large-scale, fault-tolerant environments while safeguarding against issues like duplicate or invalid extensions. The five FSMO roles consist of two that apply forest-wide—Schema Master and Domain Naming Master—and three that apply domain-wide—Primary Domain Controller (PDC) , Relative ID (RID) Master, and Infrastructure Master—each held by a specific to coordinate their respective update processes.

Historical Context

Flexible Single Master Operation (FSMO) roles were introduced with Server in February 2000 as a core component of , replacing the rigid single-master model of domains where the Primary Domain Controller handled all updates and posed scalability bottlenecks. This innovation distributed five specialized roles—Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master—across to prevent update conflicts in , thereby enabling robust, scalable multi-domain forests for enterprise environments. In , released in April 2003, FSMO roles were retained with refinements to management tools, including improved procedures for role transfers and seizures using Ntdsutil.exe, alongside broader enhancements like domain rename capabilities that relied on FSMO coordination for consistency. , launched in February 2008, integrated initial scripting support for FSMO operations, with introducing the module for streamlined role viewing and transfers via cmdlets like Move-ADDirectoryServerOperationMasterRole. Subsequent releases, including , 2016, 2019, and 2022, preserved the core FSMO framework without fundamental alterations but added enhanced migration utilities, such as automated role transfer guidance during upgrades, to support smoother transitions from legacy systems. A notable milestone in 2025 involved compatibility challenges with the Schema Master role on Windows Server 2025 domain controllers during Exchange Server schema extensions, where updates could generate duplicate attribute values and disrupt replication; Microsoft recommended temporarily relocating the role to an older-version holder during installations until a fix was deployed. A cumulative update (KB5068861), released on November 11, 2025, prevents future duplicate entries, though existing issues may require manual intervention via Microsoft support. Despite the rise of cloud-native identity solutions like Azure AD (now Entra ID), FSMO roles persist as essential for on-premises Active Directory deployments, underpinning hybrid environments where local forests require single-master oversight for schema and naming integrity.

FSMO Roles

Forest-wide Roles

In Active Directory forests, two Flexible Single Master Operation (FSMO) roles operate at the forest-wide level to maintain structural integrity and consistency across the entire directory infrastructure, regardless of the number of domains. These roles—Schema Master and Domain Naming Master—ensure that modifications to the schema and are centralized and replicated multimaster-style to all domain controllers in the for uniform enforcement. Only one domain controller holds each role per , applying their authority globally to prevent conflicts in schema definitions and domain naming. The Master serves as the sole authority for all updates and modifications to the schema, which defines the structure and rules for objects such as users, groups, and computers, including their attributes and classes. All schema changes, such as adding new object classes or attributes, must originate from this and are then replicated forest-wide to every other via the schema naming context (LDAP://cn=schema,cn=configuration,dc=). This role is particularly critical for deploying applications that require schema extensions, such as , where custom attributes for mailboxes or contacts are introduced. The Master becomes active only after successfully replicating the schema naming context inbound since the startup, ensuring it processes updates only when fully synchronized. The Domain Naming Master manages additions, removals, and renamings of domains and application partitions within the , authorizing all changes to the directory partition naming context to maintain uniqueness. It handles objects that link to external directories and processes updates such as enlisting DNS application partitions, with changes replicating through the configuration naming context (LDAP://CN=Partitions,CN=Configuration,DC=) to all domain controllers. This role activates only after inbound replication of the configuration naming context, guaranteeing consistency in forest-wide operations like domain additions or removals. By centralizing these controls, the Domain Naming Master prevents naming conflicts that could disrupt the overall structure.

Domain-wide Roles

In domains, three Flexible Single Master Operation (FSMO) roles—PDC Emulator, RID Master, and Infrastructure Master—are assigned to a single per to handle specific domain-local tasks related to , allocation, and object . These roles ensure consistent operations within the domain while supporting replication across domain controllers, preventing conflicts in distributed environments. The PDC Emulator role provides backward compatibility with pre-Active Directory systems, such as , by emulating a primary for requests. It handles password changes with immediate replication to other , processes account lockouts, and serves as the authoritative time source for the domain using the Windows Time service. Additionally, it manages updates and acts as the initial point for domain logons, forwarding requests if necessary. This role has a high impact on performance due to its intensive interactions with client and services. The RID Master allocates blocks of Relative Identifiers (RIDs) to domain controllers, enabling them to generate unique Security Identifiers () for new security principals like users, groups, and computers. By default, these blocks consist of 500 RIDs, which are issued when a domain controller's current pool falls below a , ensuring no SID duplication across the . This distributed allocation supports efficient object creation without centralizing all SID generation, and unused RIDs from demoted domain controllers are not reclaimed. The Infrastructure Master maintains the integrity of cross-domain object references, such as group memberships, by updating attributes like GUID, SID, and distinguished name (DN) based on comparisons with the Global Catalog. It resolves "phantom" objects—stale references to deleted items from other domains—and ensures referential consistency without requiring it to be hosted on a Global Catalog server, though it performs fewer updates in such configurations unless the Recycle Bin is enabled. Each of these roles is held by exactly one domain controller per domain, with operations activating after inbound replication of the domain naming context, allowing seamless if needed. This design contrasts with forest-wide roles, which manage overarching structure changes across multiple domains.

Role Placement and Design Considerations

Optimal Placement Strategies

Optimal placement of Flexible Single Master Operation (FSMO) roles in Domain Services (AD DS) involves assigning these roles to domain controllers (DCs) that ensure , minimal , and robust , while considering the network and operational demands of the . General principles recommend hosting FSMO roles on a limited number of reliable DCs to simplify management, prioritizing those with strong hardware, redundant power supplies, and stable network connectivity to avoid single points of failure. In multi-site deployments, roles should be distributed across sites where possible to enhance , ensuring that role holders remain online and accessible for critical operations like and schema updates. For forest-wide roles, the Schema Master and Domain Naming Master are best placed on the same, highly available DC within the forest root domain, as these roles handle infrequent but impactful tasks such as schema modifications and domain additions. This should be equipped with superior hardware and measures, given the irreversible nature of schema changes, and role transfers should be minimized to reduce administrative overhead. In environments with 2025, these placement guidelines align with prior versions. However, when using 2025 as the Schema Master, administrators should apply the November 11, 2025, update KB5068861 to prevent duplicate schema attribute values during Exchange Server cumulative update installations, which could otherwise cause replication failures; existing issues require support, with a permanent fix in development. Domain-wide roles require placement tailored to their functions for optimal performance. The Primary Domain Controller (PDC) Emulator should reside on a DC in the site with the highest concentration of clients and authentication traffic, leveraging its role in time synchronization, password changes, and group policy processing to minimize replication delays. The Relative ID (RID) Master is ideally co-located with the PDC Emulator on a well-connected DC to efficiently allocate security identifier pools for new accounts. For the Infrastructure Master, placement on a non-Global Catalog server is recommended in forests with multiple domains to prevent unnecessary cross-domain referrals and phantom object updates, though this concern diminishes in single-domain setups where all DCs typically serve as Global Catalogs. Key factors influencing placement include site topology, which dictates low-latency access for role-dependent queries; hardware redundancy, such as allocating the PDC Emulator to a DC with ample CPU and memory to handle its intensive workload; and considerations, particularly fortifying the PDC Emulator against attacks due to its central role in password replication and . In secure environments, restrict administrative access to role-holding DCs and implement to protect forest-wide masters from unauthorized schema or naming operations. During migrations to 2025, evaluate role placements to ensure compatibility with enhanced features like improved auditing, without altering core distribution strategies.

Interaction with Global Catalog Servers

The Global Catalog (GC) in Domain Services (AD DS) maintains partial, read-only replicas of all objects across the forest, including a subset of attributes for every object in every domain, to facilitate efficient forest-wide searches and processes. This structure supports universal group membership evaluation by storing the necessary attributes for users and groups, allowing domain controllers to retrieve membership information during logon without full replication of domain-specific data. Additionally, GC servers enable cross-domain queries, providing routing hints and referrals to locate objects and resources across multiple domains without requiring direct access to each domain's full directory partition. The Infrastructure Master FSMO role interacts closely with GC servers in managing cross-domain object references, such as updating group memberships when users or groups from other domains are renamed or moved. If all domain controllers in a domain are configured as GC servers, the Infrastructure Master becomes irrelevant for reference updates because GC partial replicas ensure that all references remain current across the forest, eliminating the need for the role to detect and correct stale phantoms. However, in environments where not all domain controllers host the GC, the Infrastructure Master must be placed on a non-GC domain controller to actively compare and update references against non-GC replicas, preventing outdated information from propagating; placing it on a GC server in such cases would cause it to overlook discrepancies since the GC assumes its data is synchronized. Other FSMO roles also leverage GC servers for operational efficiency without direct conflicts. The PDC Emulator benefits from GC integration during authentication referrals, particularly in cross-domain or trust scenarios, where the GC provides routing hints to direct password validation requests to the appropriate , reducing latency in handling failed logons or trust validations. Schema Master updates, which define the 's object classes and attributes, propagate through standard replication to all domain controllers, including GC servers, enabling schema-aware queries across the via the GC's full replica of the schema . Furthermore, GC servers assist in locating FSMO role holders by allowing directory queries against the fSMORoleOwner attribute in the naming context heads, which is replicated in partial form to GCs for all . Best practices for FSMO and GC integration emphasize deployment context to optimize performance and minimize workload. In single-domain forests, configuring all domain controllers as GC servers simplifies operations, as it renders the Infrastructure Master unnecessary and ensures uniform access to universal group data and searches without additional placement concerns. In multi-domain forests, strategic GC placement—at sites with over 100 users or high query volume—reduces WAN traffic and eases the Infrastructure Master's burden by limiting the scope of reference updates to non-GC domain controllers, while avoiding GC assignment to the Infrastructure Master unless universal coverage is achieved.

Managing FSMO Roles

Transferring Roles Between Domain Controllers

Transferring Flexible Single Master Operations (FSMO) roles between domain controllers is a planned process used during maintenance, upgrades, or to optimize role distribution within an Domain Services (AD DS) environment. This graceful transfer assumes the source domain controller holding the role is online and accessible, allowing for synchronization of any pending changes before the handover. Forest-wide roles, such as Schema Master and Domain Naming Master, can be transferred to any domain controller in the forest, while domain-wide roles (RID Master, PDC Emulator, and Infrastructure Master) must move to another domain controller within the same domain.

Prerequisites

Before initiating a transfer, verify that both the source and target s are online, healthy, and replicating successfully without errors. The target must be a fully operational capable of holding the specific role; for instance, domain-wide roles require the target to reside in the same , while forest-wide roles can target any in the . Administrative accounts performing the transfer need appropriate group memberships: Enterprise Admins (and Schema Admins for Master), Domain Admins for domain-wide roles, or Enterprise Admins for Domain Naming Master. Ensure no outstanding replication issues exist, as the process includes automatic to prevent . For Master transfers, register the schmmgmt.dll on the machine running the tools if using the snap-in. These prerequisites apply across versions from 2008 onward, including 2025.

Methods for Transfer

FSMO roles can be transferred using (GUI) tools, the NTDSUTIL command-line utility, or cmdlets. GUI methods leverage administrative snap-ins and are suitable for most environments, while NTDSUTIL and offer scripting and automation capabilities. The choice depends on the role and administrative preference, with all methods requiring connection to the source initially.

GUI Transfer Process

For domain-wide roles (RID Master, PDC Emulator, Infrastructure Master), open Users and Computers (dsa.msc), connect to the source by right-clicking the object and selecting "Connect to ," then right-click the again and choose "Operations Masters." Select the appropriate tab, click "Change" to specify the target , and confirm the transfer. For the , use Domains and Trusts (domain.msc): connect to the source, right-click the root node, select "Operations Master," and change to the target. For the Master, first register regsvr32 schmmgmt.dll if needed, open the snap-in via , connect to the source, right-click " ," select "Operations Master," and change to the target. The prompts for confirmation and completes the transfer after synchronization.

NTDSUTIL Command-Line Transfer

Launch an elevated Command Prompt and run ntdsutil. Enter the roles context, then connections, followed by connect to server <SourceServerName> (replace with the source domain controller's name). Proceed to transfer a specific role with commands like transfer rid master, transfer schema master, transfer domain naming master, transfer pdc, or transfer infrastructure master. Confirm with "yes" when prompted; the tool synchronizes data before completing the transfer. Exit with quit twice. This method works on all supported versions and provides a non-interactive option for scripting.

PowerShell Transfer

Since , use the module in . Import the module if necessary (Import-Module ActiveDirectory), then execute Move-ADDirectoryServerOperationMasterRole -Identity <TargetServerName> -OperationMasterRole <RoleName>, where <RoleName> is one of SchemaMaster, DomainNamingMaster, RidMaster, PdcEmulator, or InfrastructureMaster. Confirm the prompt with "Y." This cmdlet handles internally and supports bulk transfers for multiple roles. It is recommended for modern environments, including 2025 migrations.

Verification

After transfer, verify the new role holder using GUI tools (reopen the Operations Masters dialog to confirm the target server is listed) or : run Get-ADDomain | Select-Object PDCEmulator, RIDMaster, InfrastructureMaster for domain-wide roles and Get-ADForest | Select-Object SchemaMaster, DomainNamingMaster for forest-wide roles. Alternatively, use NTDSUTIL: in the roles context after connecting to the target, run select operation target then list roles for connected server to display held roles. Command-line tools like dcdiag /test:knowsofroleholders /v can also list all FSMO holders across the environment.

Post-Transfer Considerations

Upon successful transfer, FSMO roles replicate automatically through AD DS to other domain controllers, ensuring consistency. Monitor the Directory Service event logs on both source and target for confirmation events (e.g., Event ID 1458 indicating role changes). In Windows Server 2025 environments, especially during migrations or upgrades, perform transfers before demoting older domain controllers to avoid disruptions; no version-specific changes to the process are required. Audit logs should be reviewed to track the operation for compliance.

Seizing Roles in Failure Scenarios

Seizing FSMO roles is an emergency procedure reserved for scenarios where the current role holder is permanently unavailable, such as when the has failed catastrophically, been forcibly demoted without prior role transfer, or is otherwise unreachable and will not be restored. This contrasts with role transfer, which is the preferred method for planned or temporary unavailability. Administrators should avoid seizing roles during transient outages, as it can introduce unnecessary complications. The process carries significant risks, including potential data loss from unreplicated changes on the original role holder and inconsistencies in the Active Directory database. For the Schema Master, seizure bypasses synchronization mechanisms, which may lead to schema update failures or inconsistencies across the forest. Similarly, seizing the Domain Naming Master risks naming conflicts or loss of pending child domain operations if unsynchronized data exists. Seizure of the RID Master can result in duplicate security identifiers (SIDs) or an increased allocation in the next RID pool—by 30,000 when using PowerShell or 10,000 with NTDSUTIL—potentially wasting resources. In all cases, the original role holder's metadata must be cleaned up afterward to prevent lingering references that could cause replication errors. Seizure cannot be performed using graphical user interface (GUI) tools like Active Directory Domains and Trusts or Active Directory Users and Computers; it requires command-line utilities. The primary method is NTDSUTIL, a built-in tool for FSMO maintenance. To seize a role, open an elevated command prompt and run ntdsutil, then enter the roles context followed by connections, connect to the target with connect to server <ServerFQDN>, quit the connections context, and issue the seize command for the specific role (e.g., seize schema master or seize rid master). Role-specific commands require appropriate credentials, such as Schema Admins for the Master or Domain Admins for domain-wide roles. Alternatively, PowerShell's Move-ADDirectoryServerOperationMasterRole cmdlet supports via the -Force parameter, which attempts a transfer first but proceeds to if the original holder is unresponsive. For example, to seize the RID Master and Infrastructure Master on a target server:
powershell
Move-ADDirectoryServerOperationMasterRole -Identity "TargetDC" -OperationMasterRole RIDMaster,InfrastructureMaster -Force
This cmdlet can target multiple roles in a single invocation and operates remotely, but it warns of potential if the original holder remains active. After seizure, immediately transfer the role to a permanent holder to minimize exposure, as the interim server should not perform role-specific operations until replication stabilizes. Verify the new ownership using netdom query fsmo and monitor replication with tools like repadmin /showrepl to detect issues. If the role holder's or DNS records change, update DNS manually to ensure locator records (SRV) reflect the new . Clean up the failed source domain controller's metadata using NTDSUTIL's metadata cleanup action to remove obsolete objects and prevent conflicts. Special caution applies to the Infrastructure Master: avoid seizing this role unless all domain controllers are Global Catalog servers, as non-GC holders may fail to update phantom objects, leading to stale references in client queries. If the environment uses the Recycle Bin, the Infrastructure Master's function is further diminished, reducing the need for seizure in most cases.

Troubleshooting and Maintenance

Common Failure Modes

Flexible single master operation (FSMO) roles in can experience outages or malfunctions that disrupt domain and forest operations, with impacts varying by role. An outage of the Schema Master prevents any schema modifications, such as extensions required for application installations like Exchange Server, leading to failed updates across the forest. Similarly, unavailability of the Domain Naming Master blocks the addition or removal of domains and application partitions, halting forest expansion or restructuring efforts. For domain-wide roles, RID Master failure or pool exhaustion stops the assignment of relative IDs to new security principals, preventing the creation of users, computers, or groups until resolved. PDC Emulator downtime results in password change replication delays, causing authentication mismatches for users and computers, as well as time synchronization skews that affect ticket validity. Infrastructure Master issues cause stale cross-domain object references in group memberships, resulting in users losing access to resources from other domains due to outdated phantom objects. Common symptoms of FSMO failures include event log errors such as 1908 ("Could not find the for this "), indicating general replication issues where a cannot be located, and 5722 (Netlogon failure), frequently linked to PDC Emulator unavailability during mismatches. Other indicators encompass replication delays between , widespread failures, and error messages like "cannot contact FSMO role holder" during operations dependent on the affected role. Contributing factors to these failures range from hardware crashes on the role-holding to network partitions that isolate it from replicas, improper domain controller demotions without role transfers, and software-specific issues like the Windows Server 2025 schema bug during Exchange Server cumulative updates (CUs), which generates duplicate schema attributes on the Schema Master and triggers replication error 8418. Detection of FSMO issues can be performed using tools such as DCDiag with the /test:KnowsOfRoleHolders parameter to verify a domain controller's awareness of current holders, Repadmin /showrepl to inspect replication status involving FSMO holders, and the PowerShell cmdlet Get-ADDomainController -Discover -Service to identify the server holding a specific FSMO .

Recovery and Best Practices

In cases of FSMO , recovery begins with assessing whether a recent is available for . If a backup exists from before the failure, perform an authoritative restore on a to recover the roles, ensuring the restored DC replicates the changes to other domain controllers in the . When restoration from backup is not feasible, seize the affected roles to a healthy using Ntdsutil.exe, which forcibly transfers ownership without contacting the original holder. After seizing, clean up associated with the failed using the metadata cleanup feature in Ntdsutil.exe to remove lingering references and prevent replication conflicts. Post-recovery verification involves querying the current role holders with tools such as LDP.exe to connect to the directory and view FSMO owners, or using ADREPLSTATUS to confirm replication health across domain controllers. For ongoing maintenance, regularly monitor FSMO role holders using scripts, such as Get-ADDomain and Get-ADForest cmdlets, to identify the current owners and detect any anomalies. Implement automation for alerts via or to notify administrators of role disruptions or high-load conditions on role-holding domain controllers. Best practices include planning redundancy by distributing roles across multiple domain controllers, including virtualized ones on for rapid , while avoiding placement on the same physical host to mitigate single points of failure. Document all role assignments and test transfers annually in a controlled environment to ensure smooth operations during planned maintenance. In environments running 2025, apply relevant patches to the schema master before upgrading to Exchange Server to prevent replication issues from duplicate schema attributes. This issue was resolved by the November 11, 2025, update (KB5068861); ensure it is installed on the schema master. For long-term reliability in hybrid setups, align FSMO management with AD Connect by ensuring role-holding s remain healthy and accessible for , and avoid concentrating all roles on a single to maintain availability.

References

  1. [1]
    Flexible Single Master Operations roles in Windows Server
    Jul 2, 2024 · FSMO roles prevent conflicts in the directory by ensuring that certain updates are processed by only one domain controller at a time.
  2. [2]
    Active Directory FSMO roles in Windows - Microsoft Learn
    Jan 15, 2025 · FSMO roles in Active Directory are single-master roles that can be transferred to any DC. There are five: Schema, Domain Naming, RID, PDC ...
  3. [3]
    What are FSMO roles? - Quest Software
    Flexible single-master operator (FSMO) roles are special roles assigned to Active Directory domain controllers (DCs).
  4. [4]
    5 FSMO Roles in Active Directory - Varonis
    FSMO roles give you confidence that your domain will be able to perform the primary functions of authenticating users and permissions. Learn more today.
  5. [5]
    Planning Operations Master Role Placement | Microsoft Learn
    May 12, 2025 · Three operations master roles (also known as flexible single master operations or FSMO) exist in each domain: The primary domain controller (PDC) ...
  6. [6]
    FSMO placement and optimization on Active Directory domain ...
    Jan 15, 2025 · This article describes the placement of Active Directory Flexible Single-Master Operation (FSMO) roles in the domain and forest for these operations.
  7. [7]
    Transfer or seize Operation Master roles - Windows Server
    Apr 7, 2025 · This article describes when and how to transfer or seize Operation Master roles, formerly known as Flexible Single Master Operations (FSMO) roles.
  8. [8]
    View and transfer FSMO roles - Windows Server - Microsoft Learn
    Jan 15, 2025 · This article describes how to transfer Flexible Single Master Operations (FSMO) roles (also known as operations master roles) by using the Active Directory ...Summary · Fsmo Roles · Transfer The Domain Naming...
  9. [9]
    Upgrade domain controllers to a newer version of Windows Server
    May 28, 2025 · The recommended way to upgrade a domain is to promote new servers to DCs that run a newer version of Windows Server and demote the older DCs as needed.Missing: evolution | Show results with:evolution
  10. [10]
  11. [11]
  12. [12]
  13. [13]
    Active Directory Domain Services Maximum Limits and Scalability
    Jul 21, 2025 · RIDs are assigned in blocks of 500 by default from the domain controller that holds the RID operations master role in each domain. If you demote ...
  14. [14]
  15. [15]
  16. [16]
    Balance FSMO roles on domain. - Microsoft Q&A
    Nov 29, 2021 · The best practice is to split the FSMO roles between the different domain controllers. The forest-wide FSMO roles should be placed on one DC, and the domain- ...
  17. [17]
    Active Directory schema extension issue if you use a Windows ...
    Oct 9, 2025 · Windows Server 2025 schema master FSMO role holder might create duplicate schema attribute values after Exchange Server CU update is installed.
  18. [18]
  19. [19]
    Reducing the Active Directory Attack Surface | Microsoft Learn
    May 12, 2025 · Reduce Active Directory attack surface by implementing least-privilege models, secure administrative hosts, and securing domain controllers.
  20. [20]
    Global Catalog - Win32 apps - Microsoft Learn
    Aug 17, 2020 · The global catalog (GC) allows users and applications to find objects in an Active Directory domain tree, given one or more attributes of the target object.
  21. [21]
    Active Directory Replication Concepts | Microsoft Learn
    May 12, 2025 · A global catalog server is a domain controller that stores information about all objects in the forest, so that applications can search AD DS ...<|control11|><|separator|>
  22. [22]
    How trust relationships work for forests in Active Directory
    Jun 30, 2025 · The PDC emulator in the trusting domain makes a remote call to a domain controller in the trusted domain asking it to set the password on the ...<|control11|><|separator|>
  23. [23]
    Planning Global Catalog Server Placement | Microsoft Learn
    May 12, 2025 · Place global catalog servers at all locations that contain more than 100 users to reduce congestion of network WAN links and to prevent productivity loss.
  24. [24]
    Transfer and seize FSMO roles - Windows Server - Microsoft Learn
    Jan 15, 2025 · This article describes how Flexible Single Master Operations (FSMO) roles are transferred from one domain controller to another and how this role can be ...<|control11|><|separator|>
  25. [25]
    Transfer Flexible Single Master Operations roles in Windows Server
    Jul 2, 2024 · Learn how to transfer FSMO roles in Active Directory Domain Services (AD DS) to optimize performance and simplify administration.
  26. [26]
    Find servers that hold FSMO roles - Windows Server - Microsoft Learn
    Jan 15, 2025 · Active Directory defines five FSMO roles: Schema master; Domain naming master; RID master; PDC master; Infrastructure master.Use The Windows 2000 Server... · Use The Ntdsutil Tool · Use Dcdiag<|control11|><|separator|>
  27. [27]
    AD Forest Recovery - Seizing an Operations Master Role
    May 12, 2025 · Use the following procedure to seize an operations master role (also known as a flexible single master operations (FSMO) role).
  28. [28]
    Move-ADDirectoryServerOperationMasterRole (ActiveDirectory)
    The Move-ADDirectoryServerOperationMasterRole cmdlet moves one or more operation master roles to a directory server.
  29. [29]
    Active Directory Forest Recovery - Perform initial recovery
    Jul 10, 2023 · Beginning with a writeable DC in the forest root domain, complete the steps in this section in order to restore the first DC.
  30. [30]
    Clean up Active Directory Domain Controller server metadata
    May 12, 2025 · As an alternative, you can clean up metadata by using ntdsutil.exe, a command-line tool that is installed automatically on all domain ...
  31. [31]
    Easily Use PowerShell to Discover the Holders of Active Directory ...
    Mar 10, 2012 · Summary: Microsoft Scripting Guy, Ed Wilson, shows how to use Windows PowerShell to discover the Active Directory FSMO role holders.Missing: monitoring | Show results with:monitoring
  32. [32]
    Virtualizing domain controllers with Hyper-V - Microsoft Learn
    Mar 7, 2024 · Learn about considerations for virtualizing Windows Server Active Directory domain controllers (DCs) in Hyper-V.