AD Ops PartI
AD Ops PartI
AD Ops PartI
Operations Guide
Part I: Active Directory Operations
Version 1.0
Acknowledgements
Program Managers: Stuart Kwan, Andreas Luther, Paul Reiner
Writers: Mary Hillman, Dave Kreitler, Merrilee McDonald, Randy McLaughlin, Andrea Weiss
Editors: Laura Graham and Justin Hall
Copy Editors: Anika Nelson and Dee Teodoro
Test Plan: Mary Hillman and Cheryl Jenkins
Testers: Justin Hall, David Stern, Matt Winberry
Lab Staff: Robert Thingwold and David Meyer
Lab Partners: Compaq, Inc. and Cisco Systems
We thank the following people for reviewing the guide and providing valuable feedback:
Tadao Arima, Bill Bagley, Duncan Bryce, J.C. Cannon, Sudarshan Chitre, Arren Conner, Joseph
Davies, Jim Dobbin, Levon Esibov, Eric Fitzgerald, David Golds, Jin Huang, Khushru Irani, J.K.
Jaganathan, Asaf Kashi, William Lees, Jonathan Liem, Doug Lindsey, Arun Nanda, Paul
O’Connell, Boyd Peterson, Paul Rich, Sanjiv Sharma, Michael Snyder, David Stern, Mark
Szalkiewics, Kahren Tevosyan, Derek Vincent
Contents 3
Contents
Contents.........................................................................................................................3
Introduction....................................................................................................................3
Using the Microsoft Operations Framework for Active Directory Operations.......3
Audience..................................................................................................................3
Using this Guide......................................................................................................3
Overview of Active Directory Operations.....................................................................3
Planning for Active Directory Operations...............................................................3
Tools Used for Active Directory Operations...........................................................3
Operations Tasks Checklist.....................................................................................3
Monitoring Active Directory.........................................................................................3
Active Directory Backup and Restore...........................................................................3
Backing Up Active Directory and Associated Components.............................3
Performing a Non-Authoritative Restore..........................................................3
Performing an Authoritative Restore of a Subtree or Leaf Object....................3
Performing an Authoritative Restore of Entire Directory.................................3
Recovering a Domain Controller Through Reinstallation................................3
Restoring a Domain Controller Through Reinstallation and Subsequent
Restore from Backup.........................................................................................3
Managing Domain Controllers.......................................................................................3
Installing and Removing Active Directory..............................................................3
Preparing for Active Directory Installation.......................................................3
Installing Active Directory................................................................................3
Performing Active Directory Post-Installation Tasks.......................................3
Decommissioning a Domain Controller............................................................3
Renaming Domain Controllers................................................................................3
Identifying the Current Configuration of a Domain Controller........................3
Renaming a Domain Controller........................................................................3
Restoring the Original Configuration of a Domain Controller.........................3
Managing Global Catalog Servers...........................................................................3
Identifying Global Catalog Servers in a Site.....................................................3
Identifying a Site That Has No Global Catalog Servers...................................3
4 Contents
Introduction
Microsoft® Windows® 2000 Active Directory provides a robust directory service environment
that requires few regularly scheduled maintenance tasks. However, you might perform some
tasks on a regular basis, including backing up the database, and adding or removing domain
controllers. You can use this guide to help you efficiently operate your Active Directory
environment.
Although this guide specifically addresses the operating phase of the IT life cycle, Microsoft
Enterprise Services Framework provides guidelines for all four phases of the life cycle. These
four phases are listed in Table 1.
Table 1 IT Life Cycle and Microsoft Enterprise Services Frameworks Assistance
For this Phase… Microsoft Enterprise Services Frameworks Provides this Assistance…
Planning Although not currently a dedicated Enterprise Services framework,
Microsoft Business Value Services provide tools to assess and plan the IT
infrastructure, prioritize projects, and make a compelling business case for
undertaking an IT project.
Preparing Microsoft Readiness Framework helps IT organizations develop individual
and organizational readiness to use Microsoft products and technologies.
Building and Microsoft Solutions Framework provides guidelines for building and
Deploying deploying a project. The phases involved in this part of the IT lifecycle
include Envisioning, Planning, Developing, and Deploying.
Operating Microsoft Operations Framework provides guidelines for managing
production systems within complex distributed IT environments.
Active Directory operations occur after you plan, prepare, and deploy your Active Directory
implementation.
Contents 7
Note
All references to Windows 2000 include both Microsoft® Windows® 2000 Server and
Microsoft® Windows® 2000 Advanced Server, unless otherwise specified. This document
assumes that you are using Windows 2000 with Service Pack 2 (SP2) or greater.
For more information about MOF, see the MOF link on the Web Resources page at
http://www.microsoft.com/windows/reskits/webresources.
Audience
This guide is for medium and large organizations that have one or more centralized IT operations
departments. It includes information that is relevant to different roles within an IT organization,
including IT Operations management and administrators. It contains high-level information that
is required in planning an Active Directory operations environment. This information requires
management-level knowledge of the technology and IT processes.
In addition, this guide contains low-level procedures that are designed for operators who have
varied levels of expertise and experience. Although the procedures provide operator guidance
from start to finish, operators must have a basic proficiency with the Microsoft Management
Console (MMC) and snap-ins, and know how to start programs and access the command line.
This guide is your tool. Use it in a way that best meets the needs of your particular IT
department.
Application failure. Applications that are critical to your business, such as Microsoft
Exchange or another e-mail application, can fail if address book queries into the
directory fail.
Inconsistent directory data. If replication fails for an extended period of time,
objects (known as lingering objects and re-animated objects) can be created in the
directory and might require extensive diagnosis and time to eliminate.
Account creation failure. A domain controller is unable to create user or computer
accounts if it exhausts its supply of relative IDs and the RID master is unavailable.
Security policy failure. If the SYSVOL shared folder does not replicate properly,
Group Policy objects and security policies are not properly applied to clients.
Levels of Monitoring
Use a cost-benefit analysis to determine the degree or level of monitoring that you need for your
environment. Compare the cost of formalizing a monitoring solution with the costs associated
with service outages and the time that is required to diagnose and resolve problems that might
occur. The level of monitoring also depends on the size of your organization and your service
level needs.
Organizations with few domains and domain controllers, or that do not provide a critical level of
service, might only need to periodically check the health of a single domain controller by using
the built-in tools provided in Windows 2000 Server.
Larger organizations that have many domains, domain controllers, sites, or that provide a critical
service and cannot afford the cost of lost productivity due to a service outage, need to use an
enterprise-level monitoring solution such as MOM.
Enterprise-level monitoring solutions use agents or local services to collect the monitoring data
and consolidate the results on a central console. Enterprise-level monitoring solutions also take
advantage of the physical network topology to reduce network traffic and increase performance.
In a complex environment, directory administrators need enterprise-level monitoring to derive
meaningful data and to make good decisions and analysis. For more information about MOM,
see http://www.microsoft.com/mom/.
Service-Level Baseline
A baseline represents service level needs as performance data. By setting thresholds to indicate
when the baseline boundaries are exceeded, your monitoring solution can generate alerts to
Contents 19
inform the administrator of degraded performance and jeopardized service levels. For example,
you can use performance indicators to set a baseline and monitor for low disk space on the disk
drives that contain the Active Directory database and log files, and you can monitor CPU usage
of a domain controller. You can also monitor critical services running on a domain controller.
Monitoring these indicators allows the administrator to ensure adequate performance.
To determine an accurate baseline, monitor and collect data for a time period that is long enough
to represent peak and low usage. For example, monitor during the time in the morning when the
greatest number of users log on. Monitor for an interval that is long enough to span your
password change policy and any month-end or other periodic processing that you perform. Also,
collect data when network demands are low to determine this minimal level. Be sure to collect
data when your environment is functioning properly. To accurately assess what is acceptable for
your environment, remove data caused by network outages or other failures when you establish
your baseline.
The baseline that you establish for your environment can change over time as you add new
applications, users, hardware, and domain infrastructure to the environment, and as the
expectations of users change. Over time, the directory administrator might look for trends and
changes that occur, and take actions designed to meet the increased demands on the system and
maintain the desired level of service. Such actions might include fine-tuning the software
configuration and adding new hardware.
Determining the thresholds when alerts are generated to notify the administrator that the baseline
has been exceeded is a delicate balance between providing either too much information or not
enough. The vendor of your monitoring solution, such as MOM, can provide general
performance thresholds, but you must periodically adjust these thresholds to meet your service
level requirements. To adjust these thresholds, first collect and analyze the monitoring data to
determine what is acceptable or usual activity for your environment. After you gather a good data
sample and consider your service level needs, you can set meaningful thresholds that trigger
alerts.
To determine thresholds:
For each performance indicator, collect monitoring data and determine the minimum,
maximum and average values.
Analyze the data with respect to your service level needs.
Adjust thresholds to trigger alerts when indicators cross the parameters for acceptable
service levels.
As you become more familiar with the monitoring solution you choose, it becomes easier to
correlate the thresholds that trigger the alerts to your service level delivery. If you are uncertain,
it is usually better to set the thresholds low to view a greater number of alerts. As you understand
the alerts you receive and determine why you receive them, you can increase the threshold at
which alerts are generated, thereby reducing the amount of information that you receive from
your monitoring solution. MOM uses thresholds that are a reasonable starting point and work for
the majority of medium-sized customers. Larger organizations might need to increase the
thresholds.
20 Contents
Reports
Many important problems do not cause alerts, but they still require periodic attention. Your
monitoring solution might generate reports that display data over time and present patterns that
indicate problems. Review the reports to resolve issues before they generate alerts.
Verify that all domain controllers are Communication failure between the domain
communicating with the central monitoring controller and the monitoring infrastructure
console or collector. prevents you from receiving alerts so you can
examine and resolve them.
View and examine all new alerts on each This precaution helps you avoid service
domain controller, resolving them in a timely outages.
fashion.
Resolve alerts indicating the following Active Directory depends on these services.
services are not running: FRS, Net Logon, They must be running on every domain
KDC, W32Time, ISMSERV. MOM reports controller.
these as Active Directory Essential Services.
Resolve alerts indicating SYSVOL is not Active Directory cannot apply Group Policy
shared. unless SYSVOL is shared.
Resolve alerts indicating that the domain Domain controllers must register DNS
controller is not advertising itself. records to be able to respond to LDAP and
other service requests.
Resolve alerts indicating time synchronization The Kerberos authentication protocol requires
problems. that time be synchronized between all domain
controllers and clients that use it.
Resolve all other alerts in order of severity. If The highest priority alerts indicate the most
alerts are given error, warning, and serious risk to your service level..
information status similar to the event log,
resolve alerts marked error first.
A backup that is older than the tombstone lifetime set in Active Directory is not a good backup.
At a minimum, perform at least two backups within the tombstone lifetime. The default
tombstone lifetime is 60 days. Active Directory incorporates the tombstone lifetime into the
backup and restore process as a means of protecting itself from inconsistent data.
Deleting an object from Active Directory is a two-step process. When an object is deleted in
Active Directory, the object gets converted into a tombstone, which is then replicated to the other
Contents 25
domain controllers in the environment to inform them of the deletion. Active Directory purges
the tombstone when the tombstone lifetime is reached.
If you restore a domain controller to a state prior to the deletion of an object, and the tombstone
for that object is not replicated to the restored domain controller before the tombstone expires,
the object remains present only on the restored domain controller, resulting in inconsistent data.
Thus, you must restore the domain controller prior to expiration of the tombstone, and allow
inbound replication from a domain controller containing the tombstone to complete prior to
expiration of the tombstone.
Active Directory protects itself from restoring data older than the tombstone lifetime by
disallowing the restore. As a result, the useful life of a backup is equivalent to the tombstone
lifetime setting for the enterprise.
For example, you might perform an authoritative restore of SYSVOL if an administrator has
accidentally deleted an object that resides in SYSVOL, such as a Group Policy object.
Recover a domain controller through reinstallation
To recover a domain controller through reinstallation, you do not restore the system state from
backup media; instead, you reinstall Windows, install Active Directory, and allow replication
partners to bring the recovered domain controller up to date.
Recovering a domain controller through reinstallation can quickly return the computer to service
if the following conditions exist:
A domain controller has failed and you cannot restart in Directory Services Restore
mode. If failure was caused by a hardware failure, you have resolved the hardware
problem (for example, by replacing the disk).
There are other domain controllers in the domain, to serve as replication partners.
The computer is functioning only as a domain controller (it does not run other server
services such as Exchange), and it does not contain other data that needs to be
recovered from a backup.
Restore a domain controller through reinstallation and restore from backup
This method involves first reinstalling Windows 2000, to enable you to start in Directory
Services Restore Mode. During the Windows 2000 Server setup process, you will obtain more
information about the nature of the failure and you can then determine whether you can reinstall
Windows 2000 Server into the same partition as it was previously installed or whether you will
need to re-partition the drive. After you successfully reinstall Windows 2000, you can start in
Directory Services Restore Mode and perform a normal non-authoritative restore from backup
media.
Restore a domain controller through reinstallation and restore the system state from backup if the
following conditions exist:
A domain controller has failed and you cannot restart in Directory Services Restore
mode. If failure was caused by a hardware failure, you have resolved the hardware
problem (for example, by replacing the disk).
You have the following information about the failed domain controller:
Disk configuration. You need a record of the volumes and sizes of the disks and
partitions. You use this information to recreate the disk configuration in the case of a
complete disk failure. You must recreate all disk configurations prior to restoring
system state. Failure to recreate all disk configurations can cause the restore process to
fail and can prevent you from starting the domain controller following the restore.
Computer name. You need the computer name to restore a domain controller of the
same name and avoid changing client configuration settings.
Domain membership. You must know the domain name because even if the computer
name does not change, you might need to re-establish a new computer account.
28 Contents
Local Administrator password. You must know the local computer’s Administrator
password that was used when the backup was created. Without it, you will not be able
to log on to the computer to establish a domain account for the computer after you
restore it. If you are not part of the domain, you will not be able to log on by using a
domain account, even if you are a domain administrator. The local Administrator
password is also required to restore the system state on a domain controller.
The domain controller is running other server services such as Exchange, or contains
other data you must restore from a backup.
You have a good backup, made within the tombstone lifetime.
Considerations for restoring operations masters
To restore an operations master role holder, you must perform one of the following procedures:
Restore the failed operations master from backup.
Seize the role to another domain controller within the environment. Seize the
operations master role only if you do not intend to restore the original role holder
from backup. For more information about seizing operations master roles, see
“Managing Operations Masters” in this guide.
Restoring the RID Master can result in Active Directory data corruption, so it is not
recommended.
Restoring the Schema Master can result in orphaned objects, so it is not recommended.
Considerations for recovering global catalog servers
To recover the global catalog server you can either:
Restore the failed global catalog server from backup.
Assign a new global catalog to compensate for the loss of the original.
Restoring from backup is the only way that a domain controller that was functioning as a global
catalog at the time of backup can automatically be restored to the role of global catalog.
Restoring a domain controller by reinstallation does not automatically reinstate the global catalog
role. In a multi-domain environment, be aware that restoring a global catalog server from backup
requires more time than restoring a domain controller that does not host the global catalog.
As there are no real disadvantages in configuring multiple global catalogs, you might want to
create a new global catalog in your environment if you anticipate an extended downtime for the
failed global catalog server. Creating a new global catalog server is particularly relevant if users
associated with the original global catalog server can no longer access a global catalog server, or
if the requirement for the global catalog service is significant in your environment, such as when
you are running Exchange 2000.
For more information about creating a new global catalog server, see “Managing Global Catalogs
Servers” in this guide.
Contents 29
Impact on group membership
Note
Configuring multiple global catalogs servers in a forest increases the availability
of the system, but also increases replication traffic and database size. If you do
restore the failed domain controller and maintain its role as a global catalog
server, you might want to remove any additional global catalogs servers that you
configured during its absence.
Bandwidth Considerations
The primary consideration when recovering a domain controller through replication is
bandwidth. The bandwidth required is directly proportional to the size of the Active Directory
database and the time in which the domain controller is required to be at a functioning state.
Ideally, the existing functional domain controller is located in the same Active Directory site as
the replicating domain controller (new domain controller) in order to reduce network impact and
restore duration.
1. Install Windows 2000 Server on the same drive letter and partition as before the
failure. (This procedure is not covered in this guide.)
2. Restore from backup media.
3. Verify Active Directory restore.
Note
Creating or removing a domain or forest is beyond the scope of this guide. This
guide does not cover deploying DNS into an environment that has not
previously hosted a DNS infrastructure.
For information about these options, see the Active Directory link on the
Web Resources page at
http://www.microsoft.com/windows/reskits/webresources and the Microsoft®
Windows® 2000 Server Deployment Planning Guide.
Note
For better performance, store the log files and the Ntds.dit file on separate hard
disks.
Before you install DNS server on a domain controller that you want to host Active Directory–
integrated zones, ensure that you already have other domain controllers functioning in the
domain with at least one configured as a DNS server that uses Active Directory–integrated zones.
For more information about DNS configuration and operations master role placement, see Best
Practice Active Directory Design for Managing Windows Networks and Best Practice Active
Directory Deployment for Managing Windows Networks. To download these guides, see the
Active Directory link on the Web Resources page at
http://www.microsoft.com/windows/reskits/webresources.
Site Placement
During installation, the Active Directory Installation Wizard attempts to place the new domain
controller in the appropriate site. The appropriate site is determined by the domain controller's IP
address and subnet mask. The wizard uses the IP information to calculate the subnet address of
the domain controller and checks to see if a subnet object exists in the directory for that subnet
address. If the subnet object exists, the wizard uses it to place the new server object in the
appropriate site. If not, the wizard places the new server object in the same site as the domain
controller that is being used as a source to replicate the directory database to the new domain
controller. Make sure the subnet object has been created for the desired site prior to running the
wizard.
Domain Connectivity
During the installation process, the Active Directory Installation Wizard needs to communicate
with other domain controllers in order to join the new domain controller to the domain. The
wizard needs to communicate with a member of the domain to receive the initial copy of the
directory database for the new domain controller. It needs to communicate with the domain
naming master so that the new domain controller can be added to the domain. The wizard also
needs to contact the RID master so that the new domain controller can receive its RID pool, and
it needs to communicate with another domain controller in order to populate the SYSVOL shared
folder on the new domain controller. All of this communication depends on proper DNS
installation and configuration. By using Netdiag.exe and Dcdiag.exe, you can test all of these
connections prior to starting the Active Directory Installation Wizard.
Note
If any of the verification tests fail, do not continue until you determine and fix
the problems. If these tests fail, the installation is also likely to fail.
The wizard asks for a user name, password, and domain name of the account it uses
to add this domain controller to the directory.
The wizard then asks for the name of the domain that you want this new domain
controller to host. Enter the fully qualified domain name of the appropriate domain.
Next, the wizard asks where you want to store the Active Directory database and the
database log files. For better performance, store these files on separate hard disks.
The wizard then asks for the location where you want to store the shared System
Volume (SYSVOL). Ensure that the location has adequate disk space. For more
information about ensuring adequate disk space for SYSVOL, see “Managing
Sysvol” later in this guide.
The wizard then asks for the password that is assigned to the Directory Services
Restore Mode administrator account. This account is not the domain administrator
account or the local administrator account on the server, but a special account that
can only be used when the domain controller starts in Directory Services Restore
Mode.
Before installation begins, the wizard displays a dialog box that summarizes the
information that you supplied. Verify that the information is correct before the
installation process begins.
Note
This process can take 15 minutes or longer to complete, depending on the
connection speed between the domain controller and its replication partners.
Domain Connectivity
After the Active Directory Installation Wizard finishes, the domain controller restarts and
performs a few tasks before it is ready to assume its role as a domain controller. It registers itself
with its DNS server so that other members of the domain know that it is a domain controller and
can locate it.
When a new domain controller first joins the network, it receives SYSVOL information from its
replication partners. Until it finishes the initial replication of the SYSVOL, it does not create the
NETLOGON and SYSVOL shared folders and does not start the Net Logon service, both of
which are necessary for it to assume the role of a domain controller. An event number 13516 in
the File Replication Service event log indicates that replication is complete and is working
properly. At this point, the domain controller starts the Net Logon service and the domain
controller becomes available to the domain.
Domain controllers make changes to the directory and replicate these changes among
themselves through a series of connections that are established when the domain controller joins
the network. The connections can be generated automatically or an administrator might manually
create the connections objects. If these connections are not functioning properly, the domain
controller cannot replicate changes to the other domain controllers and cannot receive changes
from other domain controllers.
To function properly, domain controllers must periodically communicate with various operations
masters. The domain controllers send password changes to the PDC emulator. They receive a
RID pool from the RID master. As their pools are depleted, the domain controller periodically
replenishes their allocations by sending requests to the RID master.
All of these features depend upon communication between the new domain controller and other
domain controllers in the domain and forest. When a new domain controller joins the network,
perform tests that verify the communication channels used by these features.
3. Move a server object to a different site if the domain controller is located in the
wrong site.
4. Configure DNS server recursive name resolution.
5. Perform final DNS configuration for a new domain controller that is located in the
forest root domain:
a. Create a delegation for the new domain controller in the parent domain of the
DNS infrastructure if a parent domain exists and a Microsoft DNS server hosts
it. If a Microsoft DNS server does not host the parent domain, follow the
procedures outlined in the vendor documentation to add the delegation for the
new domain controller.
b. Configure the DNS client settings.
– or –
Perform final DNS configuration for a new domain controller that is located in a child
domain:
c. Create a delegation for the new domain controller in the forest root domain.
d. Create a secondary zone.
e. Configure the DNS client settings.
6. Check the status of the shared system volume.
7. Verify DNS registration and functionality.
8. Verify domain membership for the new domain controller.
9. Verify communication with other domain controllers.
10. Verify replication is functioning.
11. Verify the existence of the operations masters.
domain from the forest. For more information about removing domains, see “Removing Active
Directory” in the Windows 2000 Server Distributed Systems Guide.
Domain Connectivity
During the removal of Active Directory, the Active Directory Installation Wizard must
communicate with various domain controllers. Any unreplicated changes to the directory must be
replicated to another domain controller. The wizard attempts to connect to another domain
controller to replicate these changes. The wizard must contact another domain controller so that
Active Directory can remove the domain controller from the directory database. If the domain
controller hosts any operations master roles that you chose not to transfer, the wizard must
contact another domain controller in order to transfer the operations master roles.
If the domain controller cannot contact the other domain controllers during Active Directory
removal, the decommissioning operation fails. As with the installation process, test the
communication infrastructure prior to running the installation wizard. When you remove Active
Directory, use the same connectivity tests that you use during Active Directory installation.
Note
If any of the verification tests fail, do not continue until you determine and fix
the problems. If these tests fail, the installation is also likely to fail.
The wizard asks whether or not this is the last domain controller in the domain and requests the
password that is assigned to the local administrator account on the server after Active Directory
is removed. Note that the procedures in this guide do not pertain to removing Active Directory
from the last domain controller in the domain, because that action also deletes the domain from
the forest.
Caution
The registry editor bypasses standard safeguards, allowing settings that can
damage your system, or even require you to reinstall Windows. If you must edit
the registry, back up system state first. For information about backing up
system state, see "Active Directory Backup and Restore" in this guide.
Before you rename a domain controller, you must remove Active Directory to return the domain
controller to member server status. Prior to performing this procedure, be sure that you have
transferred any operations master roles that are held by the domain controller.
54 Contents
Caution
The registry editor bypasses standard safeguards, allowing settings that can
damage your system, or even require you to reinstall Windows. If you must edit
the registry, back up system state first. For information about backing up
system state, see "Active Directory Backup and Restore" in this guide.
After you remove Active Directory, rename the member server and then reinstall Active
Directory on the member server to restore it to domain controller status.
Caution
The registry editor bypasses standard safeguards, allowing settings that can
damage your system, or even require you to reinstall Windows. If you must edit
the registry, back up system state first. For information about backing up
system state, see "Active Directory Backup and Restore" in this guide.
Windows 2000 Server Family. If your deployment uses a different DNS design, you might not
use the delegations and secondary zones described below.
If the domain controller is located in a child domain anywhere in the forest, then you must:
Create a delegation for the domain controller in the forest root domain.
Create a secondary zone.
If the domain controller is located in the forest root domain and the forest root domain has a
parent domain, then you must:
Create a delegation for the new domain controller in the parent domain.
For information about how to configure DNS servers after installing Active Directory, see
“Completing Active Directory Installation” in this guide.
For example, Microsoft Exchange 2000 servers use the global catalog exclusively when looking
up addresses. A domain controller that advertises as a global catalog server before it contains all
partial directory partitions can cause Address Book lookup and mail delivery problems for
Exchange clients. To avoid this problem, ensure that the domain controller does not advertise as
global catalog server before it contains all partial domain directory partitions.
Premature advertisement of the global catalog is an issue only for global catalog servers that are
running Windows 2000 Server SP2, and only when you add the first global catalog server in a
site that does not include all domains. If all domains are represented in the site, or if a global
catalog server already exists in the site, then the new global catalog server always has all
domains prior to advertising as a global catalog server.
Add the global Windows 2000 Server SP2: Net stop As needed.
catalog to a domain Stop the Net Logon service Active
controller and verify (first global catalog server Directory
global catalog in the site only). Sites and
readiness. Services
Configure the domain
controller as a global Dcdiag.exe
catalog server. Repadmin.e
Monitor global catalog xe
replication progress (first Ldp.exe
global catalog server in the
DNS
site only).
ADSI Edit
Verify successful replication
to a domain controller.
Verify global catalog
readiness.
Restart the Net Logon
service, if needed.
Restart the global catalog
server and verify global
catalog DNS registrations.
Windows 2000 Server SP3:
Configure the domain
controller as a global
catalog server.
Verify global catalog
readiness.
Restart the global catalog
server and verify global
catalog DNS registrations.
Remove the global Clear the global catalog Active As needed.
catalog from a setting. Directory
domain controller. Monitor global catalog Sites and
removal. Services
Event
Viewer
When configuring a global catalog server, be sure the machine has adequate hard disk space. Use
the information in Table 13 to determine how much storage to provide for the Active Directory
database.
Table 13 Global Catalog Storage Requirements for the Active Directory Database
Server Active Directory database storage requirements
Domain controller 0.4 GB of storage for each 1,000 users.
Global catalog server
DC storage requiremen t
DC storage requiement s for other domains
2
For example, in a forest with two 10,000-user domains, all domain controllers need 4 GB of
storage. All global catalog servers require 6 GB of storage.
These requirements represent conservative estimates. For a more accurate determination of
storage requirements, download and run the Active Directory Sizer Tool (ADSizer.exe). You can
download the ADSizer.exe tool from the Active Directory Sizer Tool link on the Web Resources
page at http://www.microsoft.com/windows/reskits/webresources.
Exchange 2000 servers use the global catalog exclusively when looking up addresses. Therefore,
in addition to causing Active Directory client search problems, the condition of a global catalog
server being advertised before it receives all partial replicas can cause Address Book lookup and
mail delivery problems for Exchange clients.
The Name Service Provider Interface (NSPI) must be running on a global catalog server to
enable MAPI access to Active Directory. To enable NSPI, you must restart the global catalog
server after replication of the partial directory partitions is complete.
Procedures for Adding the Global Catalog to a Domain Controller and Verifying
Global Catalog Readiness
Use the following procedures to add a global catalog server to a domain controller. The
procedures are explained in detail in the linked topics. Some procedures are performed only
when you are configuring the first global catalog server in the site or only when Windows 2000
Server SP2 is running on the domain controller that you are configuring.
1. Stop the Net Logon service on the domain controller (SP2 only, first global catalog
server in the site only).
2. Configure the domain controller as a global catalog server. Setting the Global
Catalog check box initiates the process of replicating all domains to the server.
3. Monitor global catalog replication progress (first global catalog server in the site
only).
4. Verify successful replication to a domain controller on the global catalog server.
Check for inbound replication of all partial domain directory partitions in the forest,
to ensure that all domain directory partitions have replicated to the global catalog
server.
5. Verify global catalog readiness. This procedure indicates that the replication
requirements have been met.
6. Restart the Net Logon service, if needed. If you are adding the first global catalog
server in a site to a domain controller that is running Windows 2000 Server SP2 and
you stopped the Net Logon service prior to adding the global catalog, then restart the
service now.
7. Restart the global catalog server and verify global catalog DNS registrationss by
checking DNS for global catalog SRV resource records.
When you remove the global catalog from a domain controller, the KCC begins removing the
read-only replicas one at a time by means of an asynchronous process that removes objects
gradually over time. Each time the KCC runs (every 15 minutes by default), it attempts the
removal of the read-only replica until there are no remaining objects. At an estimated rate of
2000 objects per hour, complete removal of the global catalog from the domain controller can
take from several hours to days, depending on the size of the directory.
Seize a role only as a last resort to assign a role to a different domain controller. Use this process
only when the previous operations master fails and remains out of service for an extended
amount of time. During a role seizure, the domain controller does not verify that replication is
updated, so recent changes can be lost. Because the previous role holder is unavailable during the
role seizure, it cannot know that a new role holder exists. If the previous role holder comes back
online it might still assume that it is the operations master. This can result in duplicate operations
master roles on the network, which can lead to corruption of data in the directory and ultimately
to the failure of the domain or forest.
To transfer a role to a new domain controller, ensure that the destination domain controller is a
direct replication partner of the previous role holder and that replication between them is up to
date and functioning properly. This minimizes the time required to complete the role transfer. If
replication is sufficiently out of date, the transfer can take a while, but it eventually finishes.
Ensure that the standby operations master is a direct replication partner of the actual operations
master. If the standby operations master domain controller is a direct replication partner of the
original operations master, it most likely contains the most recent changes to the domain. This
reduces the time required to transfer the role to the standby operations master and, in the case of
a failure, reduces the chances of losing information. Even if replication is not totally complete,
only few outstanding updates exist. Those outstanding updates can be replicated by a normal
replication cycle rather than requiring a full synchronization, which replicates all of the account
information in the partition. To guarantee that the two domain controllers are replication partners,
you must manually create a connection object between them. Although creating manual
connection objects is not generally recommended, in this one case it is necessary because it is so
important that these two domain controllers be replication partners.
If you must reassign the domain-level operations master roles to the standby operations master,
do not place the infrastructure master role on a global catalog server.
Active Directory continues to function when the operations master roles are not available. If the
role holder is only offline for a short period, you might not need to seize the role to a new
domain controller. Remember that returning an operation master to service after the role is seized
can have dire consequences if it is not done properly.
Table 14 Operations Master Role Functionality Risk Assessment
Consequences if Recommendation for
Operations
Role is Risk of Improper Restoration Returning to Service
Master Role
Unavailable After Seizure
Schema You cannot make Conflicting changes can be Not recommended.
master changes to the introduced to the schema if both Can lead to a
schema. schema masters attempt to modify corrupted forest and
the schema at the same time. This require rebuilding
can result in a fragmented the entire forest.
schema.
Domain You cannot add You cannot add or remove Not recommended.
naming master or remove domains or clean-up metadata. Can require
domains from the Domains might appear as though rebuilding domains.
forest. they are still in the forest even
though they are not.
PDC emulator You cannot Password validation can randomly Allowed. User
change pass or fail. Password changes authentication can be
passwords on take much longer to replicate erratic for a time, but
pre-Active throughout the domain. no permanent
Directory clients. damage occurs.
No replication to
Windows NT 4.0
backup domain
controllers.
Infrastructure Delays displaying Displays incorrect user names in Allowed. May
master updated group group membership lists in the user impact the
membership lists interface after you move users performance of the
in the user from one group to another. domain controller
interface when hosting the role, but
you move users no damage occurs to
from one group the directory.
to another.
RID master Eventually, Duplicate RID pools can be Not recommended.
domain allocated to domain controllers, Can lead to data
controllers cannot resulting in data corruption in the corruption that can
create new directory. This can lead to require rebuilding
directory objects security risks and unauthorized the domain.
as each of their access.
individual RID
pools is depleted.
70 Contents
impact on the domain controller hosting that role. You might need to take steps to keep that
domain controller from becoming overloaded.
To receive information from the domain, a client uses DNS to locate a domain controller and
then sends the request to that domain controller. By default, DNS performs rudimentary load
balancing and randomizes the distribution of client requests so they are not always sent to the
same domain controller. If too many client requests are sent to a domain controller while it
attempts to perform other duties, such as those of the PDC emulator, it can become overloaded,
which has a negative impact on performance. To reduce the number of client requests that are
processed by the PDC emulator, you can adjust its weight in the DNS environment or you can
adjust its priority in the DNS environment.
Procedures for Reducing the Number of Client Requests Processed by the PDC
Emulator
Procedures are explained in detail in the linked topics.
1. Change the weight for DNS SRV records in the registry.
2. Change the priority for DNS SRV records in the registry.
hosts any operations master roles. If it detects any operations master roles, it queries the directory
for other eligible domain controllers and transfers the roles to a new domain controller. A domain
controller is eligible to host the domain-level roles if it is a member of the same domain. A
domain controller is eligible to host a forest-level role if it is a member of the same forest.
You cannot control which domain controller the wizard chooses and the wizard does not indicate
which domain controller receives the roles. Because of this behavior, it is best to transfer the
roles prior to running the wizard. That way you can control role placement and can transfer the
roles according to the recommendations discussed earlier in this guide.
additional changes to the directory then you can assume that all changes have been
replicated and the domain controller is up to date.
2. Verify successful replication to a domain controller (the domain controller that will
be seizing the role).
3. Seize the operations master role.
4. View the current operations master role holders.
Note If you also set an alert threshold, divide the above warning thresholds in half.
Manually create a connection object between the operations master and the designated standby
operations master to ensure that replication occurs between the two domain controllers.
Hardware maintenance: If the physical disk on which the database or log files are
stored requires upgrading or maintenance, the database files must be moved, either
temporarily or permanently.
Low disk space: When free disk space is low on the logical drive that stores the
database file (Ntds.dit), the log files, or both, first verify that no other files are
causing the problem. If the database file or log files are the cause of the growth, then
provide more disk space by taking one of the following actions:
Expand the partition on the disk that currently stores the database file, the log files, or
both. This procedure does not change the path to the files and does not require updating
the registry.
Use Ntdsutil.exe to move the database file, the log files, or both to a larger existing
partition. Moving files to a different partition changes the path to the files and therefore
requires updating the registry. Ntdsutil.exe automatically updates the registry when you
use it to move database files.
Path Considerations
If the path to the database file or log files changes as a result of moving the files, be sure that
you:
Use Ntdsutil.exe to move the files (rather than copying them) so that the registry is
updated with the new path. Even if you are moving the files only temporarily, use
Ntdsutil.exe to move files locally so that the registry is always current.
Perform a system state backup as soon as the move is complete so that the restore
procedure uses the correct path.
Verify that the correct permissions are applied on the destination folder following the
move. Revise permissions to those that are required to protect the database files, if
needed.
SYSVOL Considerations
If you replace or reconfigure a drive that stores the SYSVOL folder, you must first move the
SYSVOL folder manually. For information about moving SYSVOL manually, see “Managing
SYSVOL” later in this guide.
Determine the database size and location offline. This size is reported in megabytes
(MB). Use this method if the domain controller is already started in Directory Services
Restore Mode.
2. Compare the size of the directory database files to the volume size. Before moving
any files in response to low disk space, verify that no other files on the volume are
responsible for the condition of low disk space.
3. Back up system state. System state includes the database file and log files as well as
SYSVOL and NETLOGON shared folders, among other things. Always ensure that
you have a current backup prior to moving database files.
4. Restart the domain controller in Directory Services Restore Mode, as follows:
If you are logged on to the domain controller console, locally restart the domain
controller in Directory Services Restore Mode.
If you are using Terminal Services for remote administration, modify the Boot.ini file
on the remote server so that you can remotely restart the domain controller in Directory
Services Restore Mode.
5. Move the database file, the log files, or both. Move the files to a temporary
destination if you need to reformat the original location, or to a permanent location if
you have additional disk space. Moving the files can be performed locally by using
Ntdsutil.exe or remotely (temporarily) by using a file copy, as follows:
Move the directory database files to a local drive.
Copy the directory database files to a remote share and back. When copying any
database files off the local computer, always copy both the database file and the log
files.
6. If the path to the database or log files has changed, back up system state so that the
restore procedure has the correct information.
Caution
Setting the value of entries in the Diagnostics subkey to greater than 3 can
degrade server performance and is not recommended.
from the default value of 0 to a value of 1 results in event ID 1646 being logged in the Directory
Service log. This event describes the total amount of disk space used by the database file as well
as the amount of free disk space that is recoverable from the Ntds.dit file through offline
defragmentation.
At Garbage Collection logging level 0, only critical events and error events are logged in the
Directory Service log. At level 1, high-level events are logged as well. Events can include one
message for each major task that is performed by the service. At level 1, the following events are
logged for garbage collection:
700 and 701: report when online defragmentation begins and ends, respectively.
1646: reports the amount of free space available in the database out of the amount of
allocated space.
Following offline defragmentation, perform a database integrity check. The integrity
command in Ntdsutil.exe detects binary-level database corruption by reading every byte in the
database file. The process ensures that the correct headers exist in the database itself and that all
of the tables are functioning and consistent. Therefore, depending upon the size of your Ntds.dit
file and the domain controller hardware, the process might take considerable time. In testing
environments, the speed of 2 GB per hour is considered to be typical. When you run the
command, an online graph displays the percentage completed.
Note
Tombstones cannot be removed prior to expiration of the tombstone lifetime.
Although tombstones use less space than the full object, they can affect the size of the database
temporarily following large bulk deletions. A maximum of 5,000 expired tombstones can be
deleted at one time. If the number of expired tombstones exceeds 5,000, more than one garbage
collection interval is required to clear the backlog. During the backlog, tombstones that are no
longer needed are retained, consuming database space.
1. Change the garbage collection period to a lower interval. Decreasing the interval
between garbage collections helps the system eliminate the tombstone backlog more
quickly.
2. Change the garbage collection logging level to 3. Increasing the logging level to 3
causes an event that reports the number of tombstones removed each time garbage
collection occurs.
3. Verify removal of tombstones in the event log. Check the Directory Service event log
for NTDS event ID 1006, which reports the number of expired tombstones removed.
When this event indicates that the number of tombstones removed is less than 5,000,
the backlog has been cleared.
4. Change the garbage collection period. When the event ID 1006 reports a number of
removed tombstones less than 5,000, you can return the interval between garbage
collections to the normal level.
5. Change the garbage collection logging level, if needed. If you no longer want
informational events logged for garbage collection, return the logging level to 0.
6. Compact the directory database file (offline defragmentation) , if needed. Clearing the
backlog does not remove the white space created by the tombstones. Only offline
defragmentation returns unused disk space to the file system.
Managing SYSVOL
The Windows 2000 Server System Volume (SYSVOL) is a collection of folders and reparse
points in the file systems that exist on each domain controller in a domain. SYSVOL provides a
standard location to store Group Policy objects (GPOs) and scripts so that the File Replication
service (FRS) can distribute them to other domain controllers and member computers in a
domain.
FRS monitors SYSVOL and if a change occurs to any file stored on SYSVOL, then FRS
automatically replicates the changed file to the SYSVOL folders on the other domain controllers
in the domain.
Computers that run Windows 2000 Server obtain GPOs, logon, logoff, startup, and shutdown
scripts from the SYSVOL shared folder. Windows NT 4.0–based domain controllers and
Windows-based clients that do not run Active Directory client software obtain GPOs and scripts
from the NETLOGON shared folder.
During the installation of Active Directory, the folders and reparse points are automatically
created in the %SystemRoot%/SYSVOL folder. FRS automatically replicates any files or GPOs
that are written to these folders to the other domain controllers in the domain, to ensure that they
are available and ready to be used when a user logs on to the domain.
The day-to-day operation of SYSVOL is an automated process that does not require any human
intervention other than watching for alerts from the monitoring system. Occasionally, you might
perform some system maintenance as you change your network. The procedures you might
perform include:
84 Contents
Capacity
Hardware
Performance
Data Organization
Maintenance
Note
If you receive indications that disk space is low, determine if the cause is
inadequate physical space on the disk, or a registry setting that allocates
inadequate disk space to SYSVOL. By modifying a setting in the registry, you
can allocate more disk space to SYSVOL rather than relocating SYSVOL or the
Staging Area. Increasing the space allocation in the registry is much faster and
easier than relocation. For more information about managing disk space, see
"Maintaining Sufficient Disk Space" later in this section.
Relocating SYSVOL
Relocating the Staging Area
Changing the size of the Staging Area
These procedures involve moving SYSVOL or portions of SYSVOL to alternate locations. You
might perform these procedures to maintain capacity and performance of SYSVOL, for hardware
maintenance, or for data organization.
Depending upon the configuration of your network, SYSVOL can require much disk space to
function properly. During the initial deployment, SYSVOL might be allocated adequate disk
space to function. However, as your network grows, the required capacity can exceed the
available disk space.
Any changes made to SYSVOL are automatically replicated to the other domain controllers in
the domain. If the files stored in SYSVOL change frequently, the replication increases the input
and output for the volume where SYSVOL is located. If the volume is also host to other system
files, such as the directory database or the pagefile, then the increased input and output for the
volume can impact the performance of the server.
System maintenance, such as removal of a disk drive, can require you to relocate SYSVOL. Even
if the maintenance occurs on a different disk drive, verify that that maintenance does not affect
the system volume. Logical drive letters can change after you add and remove disks. FRS locates
SYSVOL by using pointers stored in the directory and the registry. If drive letters change after
you add or remove disk drives, be aware that these pointers are not automatically updated.
Some organizations prefer to control where specific data is stored for organizational purposes
and established backup and restore policies.
Contents 85
The default size of the Staging Area folder is 675 megabytes(MB). The minimum size is 10 MB
and the maximum size is 2 terabytes. You can adjust the size limit of the Staging Area folder by
setting the value in kilobytes (KB) of the Staging Space Limit registry entry in
HKEY_Local_Machine\System\CurrentControlSet\Services\NtFrs\Parameters. For more
information about setting the Staging Space Limit in the registry, see KB article Q221111 in the
Microsoft Knowledge Base. To view the Microsoft Knowledge Base, see the Microsoft
Knowledge Base link on the Web Resources page at
http://www.microsoft.com/windows/reskits/webresources.
When the Staging Area folder runs out of disk space, FRS behaves differently depending on the
version of Windows 2000 Server that is running. If Windows 2000 Server Service Pack 2 (SP2)
or earlier is running, then FRS fills the Staging Area to the limit defined in the registry and then
suspends inbound and outbound replication until disk space is made available. In this situation,
you can avoid suspension of replication by generously estimating the amount of disk space that
SYSVOL requires.
If Windows 2000 Server Service Pack 3 (SP3) is running, then FRS fills the Staging Area to
90 percent of the limit specified in the registry and then starts removing the least recently used
files to make more space available. While this prevents FRS from suspending replication, it can
affect the performance of the domain controller. If a large number of files are constantly being
updated, then FRS constantly stages, removes, and restages files to maintain available disk space
in the Staging Area. In this case, making more space available reduces the amount of work that
the domain controller performs in order to keep FRS functioning.
FRS stages all replication traffic and waits for the connection to become available. When the
connection is available, it begins replication and continues until it replicates all outstanding files,
or the connection becomes unavailable. If many files are awaiting replication and the network is
busy handling other traffic, then FRS might not get a chance to replicate all outstanding files
before the schedule makes the connection unavailable. If this happens, FRS holds the remaining
files until the schedule permits replication to continue. While FRS is waiting for the schedule to
permit replication, it continues to stage new files for replication. The Staging Area folder needs
enough space to store the staged files as well as to handle any backlog of files that might not get
replicated due to limited availability of the connection.
2. On the replication partners, check the status of the shared system volume. You do not
need to perform the test on every partner, but you need to perform enough tests to be
confident that the shared system volumes on the partners are healthy.
3. Verify that replication is functioning.
4. Gather the SYSVOL path information.
5. Stop the File Replication service.
6. Create the new Staging Area folder.
7. Set the Staging Area path.
8. Prepare a domain controller for non-authoritative SYSVOL restore.
9. Start the File Replication service.
WARNING
Note
If any
Do notofmove
the verification
SYSVOL with teststhefail,
Active
do notDirectory
continueInstallation
until you identify
Wizardandunless
fix the
you
completelyIfunderstand
problems. these tests the
fail,risks
the decommissioning
and consequencesoperation
of decommissioning
is also likelythe
to fail.
domain controller in question.
Procedures for Moving SYSVOL with the Active Directory Installation Wizard
Use the following procedures to remove and reinstall Active Directory in order to move
SYSVOL. For more information about installing and removing Active Directory, see “Managing
Installation and Removal of Active Directory” in this guide. Procedures are explained in detail in
the linked topics.
1. View the current operations master role holders to see if any roles are assigned to this
domain controller.
2. If this domain controller is listed as hosting either the schema master or domain
naming master roles, then transfer the forest-level roles to another domain controller
in the forest root domain. Any domain controller in the forest is capable of hosting
these roles but it is recommended that they remain in the forest root domain. Ensure
that you place the domain naming master role on a global catalog server.
3. If this domain controller is listed as hosting the primary domain controller (PDC)
emulator, infrastructure master or relative identifier (RID) master roles, transfer the
domain-level roles to another domain controller in the same domain. Do not place the
infrastructure master role on a global catalog server unless all of the domain
controllers host the global catalog or unless only one domain exists in the forest.
4. Determine whether a domain controller is a global catalog server and ensure that
other domain controllers are configured as global catalog servers before continuing.
5. Verify DNS registration and functionality.
6. Verify communication with other domain controllers.
7. Verify the existence of the operations masters on the network.
8. Remove Active Directory.
9. Delete the server object from a site.
96 Contents
Note
If the verification test fails, do not continue until you identify and fix the
problems. If the test fails, then installation is also likely to fail.
Important
WARNING
This procedure
Remember, if the
cansystem
alter security
volumessettings.
on yourAfter
domain
youcontrollers
complete theare procedure,
becoming the
unsynchronized
security settings to
onthe
thepoint
new system
that youvolume
need toare
relocate
reset to
thethe
system
default
volumes,
settings be
that
sure to
were established
troubleshoot whentheyou
FRSinstalled
problemsActive
and resolve
Directory.
the You
issuesmust
thatreapply
cause the
any
system volumes
changes to the security
to become
settings
unsynchronized
on the systembefore
volume
youthat
attempt
you made
to relocate
since the
you
system volumes.
installed Active Directory. Failure to do so can result in unauthorized access to
Group Policy objects and logon and logoff scripts.
If none of these options are acceptable in your organization, you can synchronize with an
external reliable time source. However, this option is not recommended, as it synchronizes time
in an unauthenticated manner, potentially making time packets vulnerable to an attacker.
Note
Caution
The registry
Setting a computer
editor bypasses
that is already
standard
synchronizing
safeguards,from
allowing
the domain
settingshierarchy
that can as a
reliable time
damage your source
system,canor create
even require
loops in
you
thetosynchronization
reinstall Windows.
tree If
andyou
cause
must edit
unpredictable
the registry, back up system state first. For information about backing up
results.
system state, see "Active Directory Backup and Restore" in this guide.
If you plan to move the PDC Operations Master role, you can configure a reliable
time source on a different computer prior to the move(s) to avoid resets or disruption
of the time service. The role of PDC emulator can move between computers, which
means that every time the role of PDC emulator moves, the new PDC emulator must
be manually configured to point to the external source, and the manual configuration
must be removed from the original PDC emulator. To avoid this process, you can set
one of the domain controllers in the parent domain as reliable and manually configure
just that computer to point to an external source. Then, no matter which computer is
the PDC emulator, the root of the time service stays the same and thus remains
properly configured.
If you have security reasons for wanting to segregate the authoritative time computer.
When domain controllers look for a time source to synchronize with, they choose a reliable
source if one is available. It is important to note that the automatic discovery mechanism in the
time service client never chooses a computer that is not a domain controller. Clients must be
manually configured to use any server that is not a domain controller.
Note
Manually specified time sources are not authenticated, and therefore can enable
an attacker to manipulate the time source and then start Kerberos V5 replay
attacks. Also, a computer that does not synchronize with its domain controller
can have an unsynchronized time. This causes Kerberos V5 authentication to
fail, which in turn causes other actions requiring network authentication, such as
printing or file sharing, to fail. When only one computer in the forest root
domain is getting time from an external source, all computers within the forest
remain synchronized to each other, making replay attacks difficult.
Caution
The registry editor bypasses standard safeguards, allowing settings that can
damage your system, or even require you to reinstall Windows. If you must edit
the registry, back up system state first. For information about backing up
system state, see "Active Directory Backup and Restore" in this guide.
Caution
The registry editor bypasses standard safeguards, allowing settings that can
damage your system, or even require you to reinstall Windows. If you must edit
the registry, back up system state first. For information about backing up system
state, see "Active Directory Backup and Restore" in this guide.
the latency estimate in the design documentation for your deployment, or request the
information from a member of the design or deployment team.
If the anticipated time of disconnection exceeds the maximum safe disconnection
period, do not disconnect the domain controller. Contact a supervisor.
If the estimated time of disconnection does not exceed the maximum safe disconnection
time, proceed with disconnection.
4. View the current operations master role holders to determine whether the domain
controller is an operations master role holder.
5. Transfer a domain-level operations master role, if appropriate.
6. Transfer a forest-level operations master role, if appropriate.
7. Prepare the domain controller for non-authoritative SYSVOL restore on the domain
controller that you are disconnecting. This process ensures an up-to-date SYSVOL
when the domain controller is restarted.
8. Synchronize replication from all inbound (source) replication partners. Each
connection object below the NTDS Settings object for the server you are
disconnecting represents an inbound replication partner.
9. Verify successful replication to the domain controller that you are disconnecting.
10. Label the domain controller with the date and time of disconnection and the
maximum safe disconnection period.
Assuming that the domain controller has not been disconnected for longer than the maximum
safe period of disconnection (tombstone lifetime minus end-to-end replication latency),
reconnecting it to the replication topology requires no special procedures. By default, the
Contents 115
Knowledge Consistency Checker (KCC) on a domain controller runs 5 minutes after the domain
controller starts, automatically incorporating the reconnected domain controller into the
replication topology.
If you plan appropriately for disconnecting and reconnecting domain controllers, no domain
controller will be disconnected from the replication topology for longer than a tombstone
lifetime. However, if unexpected events result in a domain controller becoming outdated, do not
reconnect the domain controller. Do not attempt to remove Active Directory because this process
requires replication. To ensure directory consistency, reinstall Windows 2000 Server on the
outdated domain controller. For information about how to reinstall a domain controller that has
not replicated for longer than a tombstone lifetime, see “Recovering a Domain Controller
Through Reinstallation.”
By monitoring replication, you avoid unexpected lengthy disconnections of domain controllers.
For information about monitoring replication, see “Monitoring Active Directory” in this guide.
Important
Do not use file copy utilities such as xcopy or robocopy to update an outdated
SYSVOL.
a. If the domain controller has been disconnected for a period that exceeds the
maximum safe disconnection period, do not reconnect the domain controller.
Contact a supervisor about reinstalling the domain controller.
b. If the maximum safe time has not been exceeded, proceed with reconnecting.
3. If the site in which you are reconnecting the domain controller has one or more other
domain controllers that are authoritative for the domain, start the domain controller at
any time.
4. If the site in which you are reconnecting the domain controller has no other domain
controllers that are authoritative for the domain, proceed as follows:
a. Determine when the next intersite replication cycle is scheduled to begin by
viewing the replication properties on the site link that connects this site to the
next closest site that includes domain controllers for this domain.
b. As soon as possible after the next replication cycle begins, start the domain controller.
5. After replication is complete, verify successful replication to the domain controller (the
reconnected domain controller) of the domain, configuration, and schema directory
partitions. If the domain controller is a global catalog server, check for successful replication
of all domain directory partitions.
In the event that a domain controller has been disconnected for a tombstone lifetime or longer but
has already replicated, follow the instructions for detecting and removing lingering objects in
“Removing Lingering Objects from an Outdated Writable Domain Controller.”
being modified, the destination requests the full object and the object is revived in the directory.
If the object is being deleted, the destination replicates the tombstone. In either case, the NTDS
Replication event ID 1388 is logged in the Directory Service log by the destination. The error
reports that the object being updated does not exist and the domain controller does not have
enough information to create it, and so it will request a complete copy. This error alerts you to
the fact that you have at least one lingering object and gives you the information that you need in
order to locate that object and delete it if it has been revived. Deleting the revived object on a
writable domain controller removes it from the directory
Domain controllers on which strict replication consistency is enabled (configurable behavior with
Windows 2000 Server SP3) refuse replication from the outdated replication source. This action
stops replication from the outdated source and logs NTDS Replication event ID 1084 in the
Directory Service log. The error reports that the object cannot be updated and replication will not
be accepted from the source until the issue is resolved. The information in the error includes the
name, GUID, and source of the lingering object so that you can delete the object and determine
whether additional lingering objects exist on the source. For this error to be logged, however, you
must have modified the registry to implement strict replication consistency.
In both cases, you can delete the identified lingering object and then take steps to identify and
remove all additional lingering objects from the outdated domain controller.
The errors on domain controllers that do not have the object can be ignored; they will cease after
the second replication cycle.
If you have domain controllers that are running Windows 2000 Server with SP3, you can set the
registry to enforce strict replication consistency, which ensures that lingering objects do not
replicate. For this reason, attempted replication of the deletions will not be accepted. You must
delete lingering objects from only the outdated domain controller. For information about setting
strict replication consistency for domain controllers that are running Windows 2000 Server with
SP3, see “Managing Active Directory Installation and Removal” in this guide.
Note
The results of this procedure identify only objects where the numbers of objects
did not agree between domain controllers. If numbers match but an object of a
class was added on one domain controller and a different object of the same
class was deleted on the other, and these changes did not replicate, this test
cannot identify these inconsistent objects.
3. On the outdated domain controller, view the replication metadata of objects that
you identified in the previous procedure to determine whether they were created prior
to the time the domain controller was disconnected or were created during the time
that the domain controller was offline. If the newest date in the Org.Time/Date
column is older than the date on which the domain controller was disconnected, the
object is a lingering object.
4. On the outdated domain controller, delete the objects that were created prior to the
date and time that the domain controller was disconnected.
5. Restart disabled outbound replication on the outdated domain controller (SP2 only).
6. Synchronize replication from the outdated domain controller to the partner domain
controller to replicate the deletions. Use the connection object on the replication
partner that shows the name of the outdated domain controller in the From Server
column. This procedure results in error messages on domain controllers that do not
have the objects, but these messages can be ignored and will cease by the second
replication cycle.
read-only replicas can remain in the queue indefinitely. These conditions can result in lingering
objects on a global catalog server.
If replication of a read-only replica is stalled or the domain controller is disconnected for longer
than a tombstone lifetime, the deletion of an object from the corresponding writable directory
partition can potentially expire without ever reaching the global catalog server. In this case, the
only location of this object is in the read-only replica on the global catalog server.
As with writable domain controllers, a global catalog server that is not monitored for replication
can potentially become outdated. When appropriate monitoring is in place and sensible intersite
replication schedules are configured, global catalog servers are not susceptible to becoming
outdated. For information about monitoring replication, see “Monitoring Active Directory” in
this document. For information about scheduling replication, see “Managing Sites” in this
document.
When deleting an object that has child objects, you must delete the child object first, then delete
the parent. You can tell from the distinguished name whether the object has parent objects.
Managing Trusts
Trusts require little management. Trust relationships between domains establish a trusted
communication path through which a computer in one domain can communicate with a computer
in the other domain. Trust relationships allow users in the trusted domain to access resources in
the trusting domain.
For example, where a one-way trust exists:
A user who is logged on to the trusted domain can be authenticated to connect to a
resource server in the trusting domain.
A user can use an account in the trusted domain to log on to the trusted domain from
a computer in the trusting domain.
A user in the trusting domain can list trusted domain security principals and add them
to groups and access control lists (ACLs) on resources in the trusting domain.
Managing Sites
An Active Directory site object represents a collection of Internet Protocol (IP) subnets, usually
constituting a physical Local Area Network (LAN). Multiple sites are connected for replication
by site link objects.
Sites are used in Active Directory to:
Enable clients to discover network resources (printers, published shares, domain
controllers) that are close to the physical location of the client, reducing network
traffic over Wide Area Network (WAN) links.
Optimize replication between domain controllers.
Managing sites in Active Directory involves adding new subnet, site, and site link objects when
the network grows, as well as configuring a schedule and cost for site links. You can modify the
site link schedule, cost, or both, to optimize intersite replication. When conditions no longer
require replication to a site, you can remove the site and associated objects from Active
Directory.
Large hub-and-spoke topology management is beyond the scope of this documentation. For
information about managing Active Directory branch office deployments that include more than
200 sites, see the "Active Directory Branch Office Guide Series" at
http://www.microsoft.com/technet/win2000/win2ksrv/adguide/default.asp.
Using the SMTP intersite replication transport is beyond the scope of this documentation. For
information about SMTP replication, see "Active Directory Replication" in the Distributed
Systems Guide of the Microsoft Windows 2000 Server Resource Kit and see the "Step-by-Step
Guide to Setting up ISM-SMTP Replication." To download this guide, see the Active Directory
link on the Web Resources page at http://www.microsoft.com/windows/reskits/webresources.
Automatic site coverage is a default condition for Windows 2000 domain controllers. Operations
and guidelines documented in this guide are consistent with the enabling of automatic site
coverage.
The KCC and Replication Topology
The Knowledge Consistency Checker (KCC) uses site link configuration information to enable
and optimize replication traffic by generating a least-cost replication topology. Within a site, for
each directory partition, the KCC builds a ring topology that minimizes the number of hops
between domain controllers. Between sites, the KCC creates a spanning tree of all intersite
connections. Therefore, adding sites and domains increases the processing that is required by the
KCC. Before adding to the site topology, be sure to consider the guidelines discussed in “Adding
a New Site” later in this document.
Significant changes to site topology can affect domain controller hardware requirements. For
more information about domain controller hardware requirements, see “Domain Controller
Capacity Planning” in “Best Practice Active Directory Design for Managing Windows
Networks.” To download this guide, see the Active Directory link on the Web Resources page at
http://www.microsoft.com/windows/reskits/webresources.
Contents 129
TCP/IP Settings
When you move a domain controller to a different site, if an IP address of the domain controller
is statically configured, then you must change the TCP/IP settings accordingly. The IP address of
the domain controller must map to a subnet object that is associated with the site to which you
are moving the domain controller. If the IP address of a domain controller does not match the site
134 Contents
in which the server object appears, the domain controller must communicate over a potentially
slow WAN link to locate resources rather than locating resources in its own site.
Prior to moving the domain controller, ensure that the following TCP/IP client values are
appropriate for the new location:
IP address, including the subnet mask and default gateway.
DNS server addresses.
WINS server addresses (if appropriate).
If the domain controller that you are moving is a DNS server, you must also:
Change the TCP/IP settings on any clients that have static references to the domain
controller as the preferred or alternate DNS server.
Determine whether the parent DNS zone of any zone that is hosted by this DNS
server contains a delegation to this DNS server. If yes, update the IP address in all
such delegations. For information about creating DNS delegations, see "Performing
Active Directory Post-Installation Tasks."
Note
If you select preferred bridgehead servers and all selected preferred bridgehead
servers for a domain are unavailable in the site, the ISTG does not select a new
bridgehead server. In this case, replication of this domain to and from other sites
does not occur. However, if no preferred bridgehead server is selected for a
domain or transport (through administrator error or as the result of moving the
only preferred bridgehead server to a different site), the ISTG automatically
selects a preferred bridgehead server for the domain and replication proceeds as
scheduled.
Removing a Site
If domain controllers are no longer needed in a network location, you can remove them from the
site and then delete the site object. Before deleting the site, you must remove domain controllers
from the site either by removing it entirely or by moving it to a new location.
To remove the domain controller, remove Active Directory from the server and
then delete the server object from the site in Active Directory. For information about
removing a domain controller, see “Decommissioning a Domain Controller.”
To retain the domain controller in a different location, move the domain
controller to a different site and then move the server object to the respective site in
Active Directory. For information about moving a domain controller, see “Moving a
Domain Controller to a Different Site.”
136 Contents
Domain controllers can host other applications that depend on site topology and publish objects
as child objects of the respective server object. For example, when MOM or Message Queuing
are running on a domain controller, these applications create child objects beneath the server
object. In addition, a Message Queuing server that is not a domain controller and is configured to
be a Message Queuing Routing Server creates a server object in the Sites container. Removing
the application from the server automatically removes the child object below the respective
server object. However, the server object is not removed automatically.
When all applications have been removed from the server (no child objects appear beneath the
server object), you can remove the server object. After the application is removed from the
server, a replication cycle might be required before child objects are no longer visible below the
server object.
After you delete or move the server objects but before you delete the site object, reconcile the
following objects:
Subnet object or objects for the site IP addresses:
If the addresses are being reassigned to a different site, associate the subnet object or
objects with that site. Any clients using the addresses for the decommissioned site will
thereafter be assigned automatically to the other site.
If the IP addresses will no longer be used on the network, delete the corresponding
subnet object or objects.
Site link object or objects. You might need to delete a site link object, as follows:
If the site you are removing is added to a site link containing only two sites, delete the
site link object.
If the site you are removing is added to a site link that contains more than two sites, do
not delete this site link object.
Before deleting a site, obtain instructions from the design team for reconnecting any other sites
that might be disconnected from the topology by removing this site. If the site you are removing
is added to more than one site link, it might be an interim site between other sites that are added
to this site link. Deleting the site might disconnect the outer sites from each other. In this case,
the site links must be reconciled according to the instructions of the design team.
3. Delete the site link object, if appropriate. Obtain this information from the design
team.
4. Associate the subnet or subnets with the appropriate site, if appropriate. If you no
longer want to use the IP addresses associated with the subnet object or objects,
delete the subnet objects. Obtain this information from the design team.
5. Delete the site object.
6. Generate the intersite replication topology, if appropriate. By default, the KCC runs
every 15 minutes to generate the replication topology. To initiate intersite replication
topology generation immediately, use the following procedures to refresh the
topology:
a. Determine the ISTG role owner in the site.
b. Generate the replication topology on the ISTG.
138 Contents