TechNet-Best Practice Active Directory Design For Managing Windows Networks
TechNet-Best Practice Active Directory Design For Managing Windows Networks
Networks
A structured approach to Active Directory design makes enterprise‐scale directory service deployment straightforward and easy to understand. This guide combines
business and technical guidance to minimize the time and effort required to implement the Active Directory directory service.
This guide provides a step‐by‐step methodology based on best practices learned from customers that have already deployed Active Directory in their organizations.
It provides all the tasks and decisions you need to develop an Active Directory design to manage Windows networks. The intended audience for this guide is the IT
professional responsible for testing, piloting, and rolling out an Active Directory design.
On This Page
Introduction
About this Guide
Active Directory Design: Key Concepts
Part I: Determining the Number of Forests in Your Organization
Determining the Number of Forests for Your Organization
Part II: Creating the Forest Design
Creating a Domain Design
Creating a DNS Design for Active Directory
Creating an Organizational Unit Design
Creating a Site Topology
Implementing Your Design
Part III: Worksheets
Number of Forests in Your Organization Worksheets
Active Directory Forest Design Worksheets
Introduction
With the Active Directory service of Windows® 2000, organizations can simplify user and resource management while creating a scalable, secure, and manageable
infrastructure for deploying additional important and emerging technologies.
To help shorten planning cycles and ensure successful deployments Microsoft is publishing a series of scenario‐based guides that provide prescriptive, task‐based,
and solution‐oriented guidance.
The Best Practice Active Directory Design for Managing Windows Networks and its companion guide, Best Practice Active Directory Deployment for Managing Windows
Networks, are part of this series. These guides provide a structured approach to designing and deploying Active Directory. Without this structured approach,
implementing Active Directory in your organization can take longer than expected.
These guides encapsulate planning and deployment expertise from Microsoft's product team with lessons learned from customers who have already designed and
deployed Active Directory in their organizations.
Unlike special‐purpose directories, Active Directory can play a variety of roles within an organization. These roles range from managing Windows networks to
supporting directory‐enabled e‐commerce applications. However, the way you intend to use Active Directory will affect the way that you make important design and
deployment decisions.
This guide focuses on providing best practice–based guidance for deploying Active Directory for the purpose of managing networks comprised of Windows clients,
Windows servers and Windows‐compatible applications and devices. This guide will refer to this as the network operating system ﴾NOS﴿ management role. Benefits
of deploying Active Directory in a NOS management role include:
Centralized management of very large Windows networks ﴾Active Directory is designed to support millions of objects﴿.
The ability to eliminate resource domains, including the hardware and administration they entail.
For additional information about the business value of deploying Active Directory visit http://www.microsoft.com/windows2000.
This guide only covers deploying Active Directory and DNS core services as part of managing a Windows network. Other services that are layered on Active
Directory can be added later and do not affect the initial design. For example, Group Policy can simplify management by providing policy‐based
administration for users, groups, workstations, and servers. Some services that can be layered on Active directory are:
Group Policy
Exchange 2000
Domain‐based DFS
Microsoft has identified a number of special considerations for deploying Active Directory in branch office environments. The characteristics of a branch office
environment include:
A large number of physical locations that need to contain replicas of Active Directory data.
A hub and spoke network topology where many branch offices rely on connectivity to a centralized hub site for communications to other parts of the
organization.
Slow network connectivity between the branch office locations and the hub site.
Because of the ramifications of these requirements, Microsoft has developed additional content focused on deploying Active Directory in branch office
environments. The Active Directory Branch Office Planning Guide is available on‐line at
http://www.microsoft.com/windows2000/techinfo/planning/activedirectory/branchoffice/default.asp. This content is designed to be used together with the Best
Practice Active Directory Design for Managing Windows Networks guide as needed.
This guide will help you to design an Active Directory deployment that could host Exchange 2000. However, the information needed to successfully deploy Exchange
2000 as part of your Active Directory is not presented here.
Top of page
The best practice approach is based on the experience gained by the Active Directory development team from organizations that have successfully implemented
Active Directory. This approach shortens planning cycles by:
Focusing on design choices that are proven to work well in the Windows NOS management role.
Clarifying task milestones and the order of tasks with flowcharts and worksheets.
While the guidelines presented in this document are appropriate for almost all NOS management deployments, they have been tested and validated specifically for
environments containing:
For deployments beyond these ranges, Microsoft suggests that you consider engaging the services of a consulting firm that has experience with deploying
Active Directory in more complex environments.
Each phase of the design process, such as creating a forest design, will include its own process flowchart and list of tasks that must be performed. Proceed through
your Active Directory design in this order. Note that each step in the process may involve new team members who will be responsible for making decisions. Each
member should record his or her design decisions in the worksheets provided. It may also be helpful to cut and paste from this guide into your design document so
that new project members can understand previous design decisions.
You should not proceed with the next step or task until you have completed the worksheets provided and had all responsible individuals approve the design
choices. Each worksheet builds on the information and decisions recorded in the previous worksheet. If you plan to use the best practices guide for Active Directory
deployment, these worksheets are referred to during the deployment phase.
Before you proceed with the design, ensure that you have:
Set and understand business goals for this Active Directory deployment.
Active Directory infrastructure deployment can span both technology and business areas. Therefore, your ability to progress on the design will depend on your
ability to articulate the value of Active Directory to IT and business decision makers.
This guide was written for IT professionals who are going to participate in an Active Directory planning and deployment project. This includes architects, project
managers, system integrators, and consultants.
Because Active Directory is best deployed as a corporate‐wide infrastructure, the design team will likely involve many people in your organization. This guide will
make it clear what types of representatives are needed at various stages of the project. Project teams must gain the buy‐in of these representatives for the design
decisions that affect their part of the organization. For example, deploying Active Directory in most companies requires integration with an existing DNS
infrastructure. The people who manage these systems will be critical to the success of the project. At the same time, it is important to keep teams as small as
possible to make decisions easier to reach.
It is very important to note that deploying Active Directory in a Windows network management role should be driven at the corporate level — not at the
departmental level. If you are a departmental administrator and want to deploy Active Directory, you should contact your corporate IT administrator for assistance.
Failure to do so may make it difficult to join your departmental deployment to a corporate‐level Active Directory deployment in the future.
Project Roles
While there will be many individuals involved in a typical Active Directory deployment, it is especially important to staff two roles early on: a project architect and a
project manager. In a large organization, several individuals might share these roles. Table 1 summarizes the Active Directory design roles.
Design
Responsibility Description
role
Project Technical Specialist or consultant responsible for technical decision‐making and for ensuring that the design fulfills the organization's
architect design business goals.
Project Process Acts as the single point of contact to drive progress on the design by involving the appropriate people and garnering consensus.
manager planning Responsible for all planning and scheduling to support the design.
Project Architect
Each forest requires an Active Directory architect to oversee the Active Directory design and migration process. An information technology ﴾IT﴿ architect or IT
systems planner who has prior directory management experience would be a likely candidate. Otherwise, consider hiring a consultant who has experience with
Active Directory design and deployment. Hiring a consultant brings important experience and perspective to the design team and may be particularly helpful in
working through cross‐organizational issues.
Suggesting other solutions that might better reflect business needs, if necessary.
The final Active Directory design must reflect a combination of business goals and technical decisions. Therefore the project architect will review design decisions,
compare them to business goals, and make sure that the two remain in alignment.
Project Manager
To promote an effective design process, management should nominate a person, or a small committee, to the role of project manager. The project manager
facilitates cooperation across business units as well as with groups that manage technologies such as DNS, networks, and Windows NT. A project manager's
responsibilities include:
Providing basic project planning, such as scheduling and budgeting.
Involving the right people during each part of the design process.
Top of page
Logical Models
Active Directory allows administrators to organize elements of a network ﴾such as users, computers, devices, and so on﴿ into a hierarchical, tree‐like structure based
on the concept of containership. The top level Active Directory container is called a forest. Within forests, there are domains. Within domains there are organizational
units ﴾OUs﴿. This is called the logical model because it is designed independently from most physical aspects of the deployment, such as the number of replicas
required within each domain and network topology.
To facilitate the management of large numbers of objects, Active Directory also supports the concept of administrative delegation at the container level. Through
delegation, owners can transfer authority over objects to other users or groups. Delegation is important because it helps to distribute the management of large
numbers of objects across a number of people trusted to perform management of specific groups and types of objects.
For example, Figure 1 illustrates the distribution of users in a fictitious North America–based organization. In this example, a single Active Directory forest contains
all of the users, computers, devices, and other entities within the organization. To support geographically based administration, the organization created five
domains ﴾West, Midwest, Northeast, Southeast, and Latin America﴿ as first‐level divisions of the forest. To support further delegation, the organization subdivided
the West division into OUs, represented by the dashed lines.
As you design your logical model ﴾following the step‐by‐step procedures later in the guide﴿ you will essentially be deciding where to place forest, domain, and OU
boundaries.
Physical Models
Once you have designed the logical model, the physical nature of the network will determine what additional tasks you need to perform. These tasks might include
deciding where to place replicas of domain and global catalog data. You will also need to describe your network topology at the subnet level to Active Directory so
that it can set up an optimized path for inter‐local area network ﴾LAN﴿ communications, such as replication traffic.
You will want to pay particular attention to replication decisions because they impact both network traffic and scope of data visibility. For example, domain
controllers do not replicate directory data between forests. Domain controllers hosting the global catalog contain a partial description of every object in the forest,
and share this information forest‐wide, but only with other domain controllers containing the global catalog. Within each domain, all data updates to objects within
the domain replicate automatically to each of the domain's domain controllers, but not to domain controllers in other domains.
Again, this guide provides step‐by‐step guidance on all physical model decisions and procedures.
Additional Reading
This guide provides only a limited amount of background information on the concepts, technology, and terminology behind Active Directory. If you are not familiar
with the Active Directory concepts presented in this guide, you should begin by reading and understanding the information contained in the following.
Active Directory Overview, available on‐line at:
http://www.microsoft.com/windows2000/server/evaluation/features/dirlist.asp
http://www.microsoft.com/windows
http://www.microsoft.com/windows2000/techinfo/howitworks/activedirectory/glossary.asp
http://www.microsoft.com/technet/prodtechnol/windows2000serv/technologies/activedirectory/maintain/adusers.mspx
The Directory Services section of the Windows 2000 Technical Library, is available on‐line at:
http://www.microsoft.com/windows2000/technologies/directory/default.asp
Chapter 1, "Active Directory Logical Structure" in the Distributed Systems Guide of the Windows 2000 Server Resource Kit
Chapter 9, "Designing the Active Directory Structure" in the Deployment Planning Guide of the Windows 2000 Server Resource Kit, is available on‐line at:
﴾http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/deploy/dgbd_ads_heqs.asp﴿
Top of page
For example, individuals who currently manage the IT infrastructure for autonomous divisions within the organization may wish to assume the role of forest owner
and proceed with their own forest design. However, in other situations, potential forest owners may choose to merge their autonomous divisions into a single forest
to reduce the cost of designing and operating their own Active Directory or to facilitate resource sharing.
Part I will guide you through the issues and tradeoffs of deciding how many forests your deployment will need.
Schema.
The Active Directory schema contains information about every object class and all the attributes of every object class that can be stored in the forest. For
example, every user account is an instantiation of the user class as defined in the schema. The schema description is stored in a portion of the directory
database that replicates to every domain controller in the forest.
Configuration data.
An Active Directory deployment is described by a set of configuration objects that contain data defining infrastructure and topology elements such as
domains, sites, and site links. The configuration data is also stored in a portion of the directory database that replicates to every domain controller in the
forest.
Administrators can designate domain controllers to hold, in addition to replicas of domain data, a partial copy of each object in the forest. The data is kept in
a portion of the directory database called the global catalog. The global catalog concept allows fast, efficient object searches that span the entire forest. Every
global catalog domain controller in the forest, regardless of the domain to which it belongs, will hold an identical copy of the global catalog.
Active Directory automatically creates transitive, two‐way trust relationships between all domains in a forest. Any member computer can recognize and
authorize access to any user or group from any domain in the forest.
Because forests can contain millions of objects, there are few technical reasons why the majority of organizations cannot deploy a single forest to meet their needs.
However, depending on your organization's administrative model, you may need to deploy more than one forest. During the first phase of Active Directory design,
the Active Directory architect will determine the number of forests your organization requires to satisfy the business goals of the organization and designate an
owner for each new forest.
The Active Directory architect and project manager are responsible for completing a forest plan for their organization. The plan should contain a list of forests to be
designed for the organization with:
The biggest advantage to the split administrative style is that individual business units do not need to staff and train personnel to support the directory service.
Instead, individual business units can concentrate on their core business and only concern themselves with managing the data in the directory.
To manage the objects in the directory, data administrators must perform similar functions and have similar rights and permissions as your current Windows NT
administrators. In Windows 2000, data administrators support the users and computers in the forest by performing functions such as:
Service administrators do not closely correspond to any distinct administrative role holder in the Windows NT domain model. Service administrators deliver the
directory service, administer domains, own the domain controllers, and manage the configuration of the directory. For Windows 2000 Active Directory, service
administrators support the forest infrastructure by performing functions such as:
By separating data administration from service administration, an administrator can retain complete autonomy over all user and computers with a division while
delegating service administration to another group. This distinction allows larger organizations to gain the benefits of a single central directory while retaining
current business practices.
Throughout the remainder of the document, this guide distinguishes between service owners and data owners.
Table 2 lists these and other roles assigned the forest owner and the responsibilities associated with each. The forest owner controls the forest through three
security groups:
Enterprise Admins
Schema Admins
Service owner for domain Controls domain controller configuration throughout the forest to manage replication issues.
controllers in the forest root
domain
Administrative owner for data in Controls membership of Domains Admins, Enterprise Admins, and Schema Admins security groups in the forest root
the forest root domain domain.
Administrative oversight of all Through the Enterprise Admins group, the forest owner can correct errors anywhere in the directory. Although you can
domain data block Enterprise Admins administrative access to non‐root domains, this is not the best practice.
Note: The forest owner should always be a highly trusted individual. Therefore no valid reason exists for blocking the forest owner's access to data in non‐root
domains. Should a serious error occur in a domain's data, due to malicious or benign actions, the forest owner will need access to the domain to fix the problem.
The forest owner delegates the management of individual domains to a group of domain owners, of site topology to a site topology owner, and of DNS service to a
DNS owner. In turn, each domain owner delegates management of each OU to a group of OU owners and the DNS service to the DNS owner.
Figure 2: Hierarchy of directory service administrative roles for a single forest with four domains
Table 3 separates the major Active Directory Administrative roles into service ownership and data ownership roles.
In a large forest, each owner role may be shared by a group of administrators, each with the necessary administrative authority to perform the requisite duties. In a
smaller organization, one individual may perform several roles.
Note: The forest owner alone determines who becomes a domain owner. Domain owners have administrative control over the domain controllers in the forest and
therefore must be highly trusted.
In the single forest model an organization chooses to contain and manage all of the directory objects within the organization in a single forest. A single forest is
ideal when possible, because it represents the least possible administrative overhead. Figure 3 represents a single forest design for an organization with three
divisions. In this Active Directory design, all three divisions become parts of a single forest.
In a subscription forest model there are some autonomous, division‐level forests but most divisions are consolidated within a larger forest operated by a centralized
IT organization. Subscription forests have the advantage of providing rapid deployment for divisions that are early adopters of Active Directory while allowing other
business units that are concerned about security or sharing responsibilities to design and manage their own forests.
Figure 4 represents a subscription forest design for an organization with three business units. In this example, two business units chose to participate in a single
forest while a third division created a second forest.
In a multiple forest model the majority of business units within an organization chose to deploy their own Active Directory forest. The multiple forest model works
best for organizations with business units that want to ﴾or need to﴿ retain administrative autonomy. This model also has the highest possible administrative
overhead.
Figure 5 represents a multiple forest design for an organization with three divisions. Each business unit historically and presently manages its own IT infrastructure.
As a result, each business unit chose to design and deploy an independent Active Directory forest.
Figure 6: Task flow for determining the number of forests in your organization
Identifying Candidate Directory Service Providers
Determine the highest level of IT administrators within your organization that have a mandate to deliver directory services for a Windows network. You may discover
you have more than one entity in your organization capable of delivering directory services.
Your organization might have a centralized IT model with a chief information officer ﴾CIO﴿ who delegates IT administration to divisional administrators as needed.
This situation indicates a single candidate directory service provider and therefore a single candidate forest.
In contrast, your organization might have a decentralized IT model, where division‐level IT administrators perform network administration and delegation within
their autonomous organizations. Peer CIOs commonly occur in organizations with distributed authority. This situation suggests a multiple candidate directory service
providers and therefore multiple candidate forests.
Your organization may have already deployed Active Directory for a different purpose. Consider any current forest owners as candidate directory service providers.
The existing directory may support messaging, Windows network services for limited number of business units, or some other purpose. Whether your existing Active
Directory might become the foundation for expanded directory services depends upon its purpose and how it was deployed.
Assigning Forests
Determine the minimum number of forests that your organization requires to satisfy its business needs. To assign the correct number of forests to your
organization:
1. If you have identified only one candidate directory service provider, then this individual, who will become your forest owner, should proceed to Part II:
Creating a Forest Design.
2. If you identified multiple candidate directory service providers, then determine if you can designate one candidate as the forest owner with all other
candidates as forest participants. The following section, "Participating in a Single or Subscription Forest, will help you make these decisions.
3. If not all candidate directory service providers can agree on a single forest, determine if a subscription forest will work for most of your candidate directory
service providers.
Note: Set a time by which you, the candidate directory service provider, will make your decision whether to join a forest. If creating a single forest requires
that you change your current business practices and it is taking far longer than you had anticipated, you should probably create your own forest.
4. If your attempt to implement a subscription forest failed, then each candidate directory service provider should create a new, separate forest.
The ramifications of making such a decision are detailed in the following section, "Creating Your Own Forest."
One candidate directory service provider may lack the interest, budget, or mandate to proceed with the deployment. In this case, this candidate directory service
provider can opt out of deploying Active Directory at this time and can revisit deployment at a later date without blocking the remaining candidate directory service
providers from proceeding with their designs.
A forest might already exist or a group within your organization may have offered to manage the directory for other divisions. Candidate directory service providers
should become a forest participant if possible.
Choosing forest ownership or forest participation gives rise to different set of responsibilities for the candidate. The forest participant, as data owner, is responsible
for managing the data, whereas the forest owner, as service owner, is responsible for maintaining the directory as a service. For example, the data owner ensures
that a user's password is properly set, whereas the service owner ensures that the password replicates to all domain controllers. Table 4 provides a comparison of
the responsibilities incurred when owning and participating in a forest.
When subscribing to directory services provided by another group, you reduce your administrative costs by:
A shared forest works in many situations and greatly simplifies Active Directory management. Sharing a single, consistent configuration across all domains in the
forest has specific advantages that include the following:
Your current business practices determine the value and feasibility of sharing a forest.
Some candidate directory service providers may opt to remove themselves from a shared forest design because they have distinct security requirements or have
network and administrative constraints that are not addressed in the shared forest. Table 5 summarizes the characteristics present in most shared forests.
Required
Security · You can trust the forest owner and all domain owners in the forest.
· All domain controllers will be in secure locations or you can accept the risks involved in having domain controllers in unsecure
locations.
Administration · You can abide by common schema and configuration policies set out by the forest owner.
Name resolution · DNS service can resolve names throughout the forest.
Recommended
Important: Every domain controller in the forest contains a writable copy of the schema and configuration containers. If an individual can install software on or gain
physical access to a domain controller the individual may be able to circumvent security features built into Windows 2000 and make changes to these containers.
This represents a security risk to the forest. Best practice guidelines recommend that:
All administrators such as domain administrators, who can install software on a domain controller, should be highly trusted.
Lacking any of the required characteristics prohibits forest sharing. A potential forest participant can deviate from the recommended characteristics and still share a
forest. However, if a potential forest participant lacks too many of these characteristics, then forest participation becomes technically difficult and less beneficial.
Deviating from the recommended characteristics in Table 5 is not a best practice. If your design deviates, you should seek expert assistance for your design and
deployment.
If you choose to join a forest, verify that the forest has a clear ownership. Sharing the ownership of a forest with another IT group or splitting the management
across multiple outsourcers might present organizational challenges that you may wish to avoid.
Although sharing a forest has a number of benefits, these benefits are proportional to the level of cooperation and collaboration between its divisions. You probably
should not plan a single forest for your organization if:
You must have full control over service delivery or you cannot accept the terms offered by another forest owner.
You do not collaborate with other divisions as a rule.
If collaboration occurs, try to determine the nature of the collaboration. Collaboration can mean exchanging emails or something closer, such as accessing
each other's intranet, accessing shares, and sharing applications. If divisions collaborate closely, then they should reside in the same forest.
If collaboration is the exception rather than the rule, you can configure trusts on a case‐by‐case basis with domains in other forests. For example, you may
currently restrict the level of collaboration between divisions with firewalls.
Your previous infrastructure deployments have failed due to the diverse cultures or missions within your greater organization.
When putting together your forest design remember that administrative autonomy has a cost associated with it. The trade‐off between autonomy and management
efficiency should be carefully considered.
Note: Divestitures can create uncertainty about how to proceed with forest planning. Should you include the division that you plan to spin off in your forest or put
the division in its own forest? The recommendation is that you create a separate forest for a division if you are absolutely sure that you are spinning off that division.
Otherwise, include the division. Migrating the division to a new forest should the divestiture succeed requires the same level of effort as merging the division into
the forest should the divestiture fail.
Because each forest is administered separately, adding additional forests to your design increases your organization's management overhead. When debating
whether to create your own forest, weigh the ramifications listed in Table 6 against any benefits. If your division rarely collaborates with other business units, these
factors may be relatively unimportant to you in making your decision.
No automatic transitive To access resources in another forest, you must establish explicit trusts between the two domains involved.
trusts
No Kerberos authentication Authentication between forests lacks delegation of authentication and mutual authentication.
No single global catalog of In order to create a single view across multiple forests, you will need to set up directory synchronization software, such as
objects Microsoft Metadirectory Services.Having multiple global catalogs may impact certain applications such as Exchange 2000.
Cannot log on with email‐ If the machine account and user account are in different forests, must use old‐style names to identify users.
style user principal name
﴾UPN﴿
Figure 7 illustrates the tasks required to create a forest design. Each forest owner designated for the organization creates a separate Active Directory design.
Figure 7: Task flow performed by each forest owner to design the forest
Top of page
For Active Directory, the domain continues to function as the administrative boundary for managing objects, such as users, groups, and computers. In addition, the
domain supports a number of core functions related to administration. In the context of a network operating system, a domain's important functions include:
Authentication.
Each domain contains security principal objects, such as users, groups, and computers that can be granted or denied access to resources on the network. A
user can only be authenticated by a domain controller in the domain that hosts the user's account.
Policy‐based Administration.
Active Directory addresses the problem of standardizing the management of potentially hundreds of thousands of objects in a domain with policy‐based
administration. For example, you can use Group Policy to standardize user and computer configurations. Group Policy can be created and applied as part of a
Windows 2000 migration or at any time after deploying Active Directory.
A small set of security policies that apply to unique domain user accounts can only be set on a per‐domain basis. These include:
Password policy
Active Directory provides a place for services to publish connection information about shared resources. For example, printer resources might be published in
a domain to facilitate searches by users.
A typical organization running Windows NT has multiple domains. These domains exist to accommodate different business practices, geographical divisions, and
Windows NT limitations. Three Windows NT product limitations have resulted in a large number of domains:
Reliance on the primary domain controller ﴾PDC﴿ alone for database updates.
To avoid these limitations, larger organizations typically deployed Windows NT as several master user domains ﴾MUDs﴿ for accounts and a large number of resource
domains ﴾RDs﴿. Administrators within these domains created trusts to link users and resources throughout the organization. Figure 8 shows a typical organization's
Windows NT master domain model structure.
The forest owner is responsible for completing a domain design for their organization. The design should contain the following:
Configuring domain‐wide settings · Creating domain and domain user account policies such as password, Kerberos, and account lockout.
Managing External trusts · Creating trust links with domains outside of the forest.
Caution: The level of trust required of domain owners demands that these individuals be carefully screened. In turn, the domain owner should tightly control the
membership of all built‐in and well‐known administrative users and groups.
A single domain or multiple geographically based domains as children of the root domain managed by domain owners designated by the forest owner.
Note: During a domain's in‐place upgrade from Windows NT to Windows 2000, some domain controllers will still be running Windows NT. To accommodate both
Windows 2000 and Windows NT domain controllers on the same Windows network, Active Directory can function in mixed mode. In mixed mode certain features of
Active Directory are disabled to allow interoperability with Windows NT backup domain controllers ﴾BDCs﴿. When all BDCs have been removed from the domain,
then the domain can be switched to native mode, enabling the following Windows 2000 features:
Universal groups
Group nesting
SID History
Of these features, domain local groups and SID History are necessary to support user and computer migrations from Windows NT domains.
To reap the maximum benefits from Active Directory, try to minimize the number of domains in the finished forest. For most organizations an ideal design is a forest
root domain and one global domain.
The components of a best practice domain design are discussed in the following section.
The first domain created in a forest is automatically assigned the role of forest root domain. All other domains build upon the forest root domain to define the
directory hierarchy. The forest root hosts the two special administrative groups tasked with supporting the Active Directory infrastructure: the Enterprise Admins and
the Schema Admins.
The best practices approach to domain design dictates that the forest root domain be dedicated exclusively to administering the forest infrastructure. A dedicated
forest root is recommended for the reasons explained in Table 8.
Table 8 Reasons for Including a Dedicated Forest Root in Your Design
Reason Explanation
Fewer administrators can make Limiting the forest root domain administrative membership reduces the likelihood that an administrative error will impact
forest‐wide changes the entire forest.
Easily replicated for forest backup A small root domain can be easily replicated anywhere on your network to provide protection against geographically
centered catastrophes.
Never becomes obsolete You can never retire the root domain, even if your organization changes. A dedicated root domain never becomes
obsolete because it functions solely as the forest root.
Ownership easily transferred Transferring ownership of the root domain to transfer forest ownership does not involve migrating production data or
resources.
The role of the forest root domain centers on defining and managing the infrastructure. Managing the directory infrastructure requires new administrative roles and
responsibilities. Plan to reserve the dedicated root domain for forest administration exclusively. Avoid including any users or resources not dedicated to forest
administration in the forest root domain.
A single global child domain of the forest root domain has all users, computers, and group accounts in a single child domain, except those of directory
administrators residing in the forest root. Figure 9 illustrates a forest with a single global child domain.
Figure 9: Forest with a root domain and a single global child domain
Geographically Based Domains
All object data corresponding to a domain is fully replicated to all domain controllers within the domain. For this reason, forests containing a large number of users
distributed among widely‐spaced locations with poor wide‐area network ﴾WAN﴿ connections may require a geographically based set of child domains. If your
organization cannot support a single, global child domain design, then geographically based domains are a best practice because they:
Note: In some organizations divisions developed as autonomous units that currently provide their own IT infrastructure and do not coordinate services with any
other divisions.
A forest owner, who is ultimately responsible for delivering services to the forest, is generally not willing to delegate responsibility for directory services to an IT
administrator from an autonomous division. Furthermore, security considerations demand that all domain owners in a shared forest trust one another. The IT
administrator from an autonomous division probably wants an independent domain to achieve some level of autonomy. Maintaining this level of autonomy can only
be accomplished by creating a separate forest. For these reasons, organizationally based domains are not a best practice.
4. Whether each Active Directory domain is created or upgraded from Windows NT.
The domain design process, which should help you to achieve one of the best practice domain models, includes the following steps:
3. If a single, global domain is insufficient, divide the global organization into regional domains.
4. For each domain, specify whether you will upgrade an existing Windows NT domain or create a new domain.
5. Map all remaining domains to one of the regional domains for consolidation.
To design the forest root domain you need to assign it a domain name. Active Directory domains have two types of names:
The forest root domain name is also the name of the forest. To name the forest root domain:
1. Identify your organization's DNS owner and determine what registered DNS names you have available on the network that will host Active Directory.
Keep in mind that the names available on this network may be distinct from the names that your company exposes on the Internet. For example, the name
your organization uses on the Internet might be contosopharma.com and the name used on your internal corporate network might be contoso.com. In this
case the name that you select is contoso.com
If you do not have a registered domain name, you should register a name with an Internet DNS registration authority.
Note: As a best practice use DNS names registered with an Internet authority in the Active Directory namespace. Only registered names are guaranteed to be
globally unique. If another organization later registers the same DNS domain name, or if your organization merges with, acquires, or is acquired by other
company that uses the same DNS names then the two infrastructures can never interact with one another.
Add a prefix that is not currently in use to the registered DNS name to create a new subordinate name. For example, if your DNS root name were
contoso.com then you should create an Active Directory forest root domain name such as concorp.contoso.com, where the namespace concorp.contoso.com
is not already in use on the network. This new branch of the namespace will be dedicated to Active Directory and Windows 2000 and can easily be integrated
with the existing DNS implementation. The rules for selecting a prefix are listed in Table 9.
Not likely to become Domains cannot be renamed, so avoid names such as a business line or operating system that could become
outdated obsolete. Geographical names are recommended.
Internet standard A‐Z, a‐z, 0‐9, and ﴾‐﴿, but not entirely numeric.
characters only
15 characters or less If you choose a prefix length of 15 characters or less, then the NetBIOS name used by down‐level clients remains
the same as the prefix.
2. Arrange with the DNS owner to delegate ownership of that name to you.
The DNS design section of this document discusses DNS names and DNS deployment planning in greater detail.
Determine if your design will be a single, global domain or multiple, geographically based model. A single, global domain model is preferred for the following
reasons:
Duplicate Group Policy settings that span domains are not necessary.
For some large organizations, the slowest network link connecting a domain controller may not be capable of handling the replication traffic of a single, global
domain. In such a case, select the regional domain model. Refer to Table 10 to determine the maximum number of users that a single, global domain can
accommodate. Consider growth in your organization when using these guidelines.
Slowest link connecting a domain controller ﴾kbps﴿ Create a single, global domain no larger than ﴾users﴿
9.6 20,000
14.4 30,000
19.2 40,000
28.8 50,000
38.4 75,000
Note: These estimates are for forests with up to 100,000 users. Larger forests are possible but not covered under these best practice guidelines. These values
provide conservative estimates. Assumptions are:
Use this list only as an approximation. Confirm that your network can handle your replication traffic by performing lab testing before implementing your domain
plan. For additional information about domain sizing see Building Enterprise Active Directory Services: Notes From the Field by Microsoft Consulting Services, 2000,
Redmond: Microsoft Press.
If you have already deployed multiple Windows NT domains, you will migrate those domains into the new global Active Directory domain. However, if you have
already consolidated your Windows NT MUDs into less than ten geographically based domains, and then you may wish to upgrade those domains in‐place rather
than migrating your users to a single, global domain. Moving accounts between domains can impact end users. Before making your decision, evaluate the long‐term
administrative benefits of a single, global domain against the cost of migrating those users. This tradeoff is described in the next section, "Dividing the Global
Organization into Regional Domains."
If size constraints require that you create regional domains for your forest, then you must:
1. Divide your organization into regions based on a regional feature that makes sense to your organization, such as:
Continent
Network connectivity
Administrative region
An Active Directory domain will be created for each region. Your goal is to minimize the number of domains that you create. As a best practice, plan for no
more than ten domains. When you consider adding domains in your forest design, remember that increasing the number of domains is a tradeoff between
optimizing your replication bandwidth and minimizing your administrative costs. Table 11 lists these costs.
Management of Because domain administrators have full control over a domain, the membership of the domain administrators
multiple Domain group for a domain must be carefully controlled. Each added domain in a forest incurs this management overhead.
Admins groups
Additional domain A domain controller can host only a single domain. Each new domain that you create will require at least two
controller hardware computers to meet reliability and availability requirements. Because all domain controllers can accept and originate
changes, you must physically guard them.
Trusts For a user in one domain to access a resource in a different domain, domain controllers in both domains must be
contacted. This communication represents an added possible point of failure. The fewer domains, the less your users
will rely on communications with multiple domain controllers to maintain service.
Group Policy and Group Policy and access control applied within a domain do not flow automatically into other domains. If you have
access control Group Policy settings or delegated administration through access control that is uniform across many domains, they
management that is must be applied separately to each domain.
common to multiple
domains
Increased likelihood The ease of restructuring within a domain favors a minimum number of large, stable domains in your domain design.
of having to move As you add domains to the design, the likelihood increases that you will need to move an object, such as a user, or a
objects between group of objects from one domain to another. Moving a user within a domain is trivial. Moving a user between
domains domains can impact the user.
2. For each region, use Table 12 to determine if the region meets the sizing guidelines then:
a. Find the slowest network link connecting domain controllers, including links that connect this region with other regions.
b. Finding the row on the chart corresponding to the slowest link ﴾rounding down﴿.
c. If the number of users in the region exceeds the guideline, split the region into smaller regions
Minimum bandwidth ﴾kbps﴿ Create a forest no larger than ﴾users﴿ Create a regional domain no larger than ﴾users﴿
3. Note: These estimates are for forests with up to 100,000 users. Larger forests are possible but are not covered under theses best practice guidelines. These
values provide conservative estimates. Assumptions are:
Use this chart only as an approximation. Confirm that your network can handle your replication traffic by performing lab testing before implementing
your domain plan. For additional information about domain sizing see: Building Enterprise Active Directory Services: Notes From the Field by Microsoft
Consulting Services, 2000, Redmond: Microsoft Press.
4. If you have a domain with more than 50,000 users, specify a dedicated PDC.
You will configure the dedicated PDC to handle PDC operations only. Best Practices Active Directory Deployment for Managing Windows Networks discusses
configuring a dedicated PDC in further detail.
Figure 12 illustrates a regional domain design. In this example, there are a total of 60,000 users in the forest. With a minimum bandwidth of 32 kbps, these
guidelines recommend no more than 50,000 users in one domain. This organization would like to implement a three‐domain design reflecting geographic divisions.
This design would create 40,000, 15,000, and 5,000 user domains, all of which fall within the domain replication guidelines.
Figure 12: An organization's regional mapping of its users and computers
Specifying a New or Upgraded Domain for Each Region
Each region that you specified represents an Active Directory domain. These domains can arise from the creation of a new empty domain into which users and
computers will migrate or by upgrading an existing Windows NT domain. If you are upgrading from Windows NT, several master user domains ﴾MUDs﴿ will likely
already exist.
Use the following steps to specify a new or upgraded domain for each region
1. If you are migrating from Windows NT, evaluate each MUD in the region and determine if any of the MUDs are upgrade candidates to become the regional
domain.
More information about this topic is provided in the following section, "Evaluating Current Master User Domains in a Region.
2. If you are migrating from an operating system other than Windows NT or if no Windows NT MUD upgrade candidates exist, plan to create a new domain for
the region.
More information about this topic is provided in the section, "Designing New Regional Domains" later in this part.
Important: This topic was created for organizations migrating from Windows NT. If your organization uses another operating system, you can skip this topic.
If your organization is migrating from Windows NT, your users and resources currently reside in the Windows NT domains. In this phase of the design the forest
owner will determine how best to migrate and consolidate these Windows NT domains into a finished Active Directory design.
Before beginning, create a master list of MUDs in this region that will join the forest. For each of these MUDs, complete a master user domain worksheet. For each
MUD, you will ultimately decide if you want to:
Upgrade the MUD in‐place, meaning upgrading all of its domain controllers to Windows 2000 Active Directory.
Retire the MUD and migrate its user accounts to a new or upgraded domain.
Table 13 will help you to determine whether to upgrade a MUD or migrate its contents.
· Current domain is a good fit for the regional model. · Domain spans regions and its contents need to be split among other regional domains.
· Faster than migrating users to a new domain. · It will take too long to upgrade the domain to native mode ﴾all DCs upgraded﴿.
Important: Keep in mind that if you choose to upgrade a Windows NT domain as your regional domain, this domain cannot act as a target domain for domain
consolidation until it is in native mode. Getting to Active Directory native mode might take longer than expected if there are many BDCs in remote locations or
needing hardware upgrades. In this case you might wish to choose another Windows NT domain to upgrade or build a new domain as the consolidation target.
Ideally, you will choose one MUD from each region to upgrade to Windows 2000. However, you may not have a good upgrade candidate in a region or may identify
more than one upgrade candidate. If you do not have a good upgrade candidate, you can create a new domain. This is covered in the next section.
If you identified more than one MUD that is an upgrade candidate, you can either:
Upgrade the largest MUD and consolidate the remaining MUDs into it.
If you decide to define additional regions, remember to consider the additional management effort associated with adding domains to the forest.
For each domain that the forest owner chooses to in‐place upgrade as part of the Active Directory design:
Assign <domain_prefix>.<forest name> as the domain name. As a default, Windows 2000 will use the current NetBIOS name as the domain prefix. You can
change the domain prefix during the upgrade, but as a best practice keep the default name. This ensures that when you are viewing the domain name in
either Windows 2000 or earlier tools, you will see the same name.
The forest owner will need to create new domains as part of the domain design if:
Once new regional domains have been specified, distribute accounts and resources among these domains.
For each new domain that the forest owner chooses to add to the Windows 2000 design:
Use <new name>.<forest name> as the domain name. Review the rules for creating a naming prefix listed in Table 9.
In Figure 13, the domain design calls for a MUD from both the North American and South American regions to be in‐place upgraded to the position of Windows
2000 regional domain. In Europe, both MUDs have numerous domain controllers in remote locations. The forest owner determined that in either case an in‐place
upgrade would take too long to reach native mode. Therefore, a new domain was specified in the domain design. The three remaining MUDs will be consolidated
into the regional domain in their areas.
Figure 13: Creating Active Directory domains by either upgrading Windows NT MUDS ﴾triangle with a circle﴿ or by creating a new domain ﴾triangle only﴿
Consolidating Remaining Windows NT Account Domains
You should consolidate all remaining MUDs with their respective regional domains. Keep in mind that when you consolidate a MUD into another domain that:
You can configure OUs to preserve the original domains organization and administration.
The consolidation process has a one‐time impact on those users being migrated.
The user migration process is covered in detail in the companion guide, Best Practice Active Directory Deployment for Managing Windows Networks.
Note: If you plan to split the contents of a Windows NT domain across multiple regional domains, as a best practice you should migrate the contents into other
target domains and not upgrade this domain in‐place.
Create a mapping of all remaining MUDs to regional domains. Figure 14 illustrates how all the remaining Windows NT MUDs are consolidated into the Active
Directory regional domains for concorp.contoso.com.
Figure 14: Consolidating Windows NT MUDs into Active Directory domains
Consolidating Windows NT Resource Domains
As a best practice you should plan to consolidate all Windows NT resource domains into the Active Directory domain in its region.
Determining to which domain the contents of the resource domain will move is often straightforward. Because users want their data in close proximity, most
resource domains are geographically organized to correspond to users in a particular location. This means that most resource domains can readily be consolidated
into the Active Directory domains that contain user accounts from that location. In cases where the contents of the Windows NT resource domain span geographies,
specify which resources should be migrated to which target domains. Keep in mind that when you consolidate this MUD into a target Windows 2000 domain that
you can configure OUs to preserve the original domain's organization and administration.
In other cases, you might preserve the domain as a Windows NT resource domain until a later date when you consolidate the domain or eventually eliminate it
through attrition. This can occur if there are applications running on domain controllers in the domain that cannot run on Windows 2000.
Note: If you have a resource domain dedicated to hosting Exchange 5.5, leave that domain running Windows NT for the time being. To plan your Exchange
migration, seethe Microsoft Exchange 2000 Server Upgrade Series, available on‐line at
http://www.microsoft.com/technet/prodtechnol/exchange/exchange2000/deploy/upgrdmigrate/ex2kupgr/default.asp.
Figure 15 illustrates how the forest owner might choose to consolidate existing resource domains into Active Directory domains in the same region.
Figure 15: Consolidating Windows NT resource domains into Windows 2000 domains
In this scenario, all resource domains were organized regionally. This made it easy to determine where in the regional domain hierarchy to consolidate each resource
domain.
Figure 16 illustrates the final Active Directory forest structure for concorp.contoso.com. The final design consists of a forest root domain plus three regional domains.
Figure 16: Final Active Directory domain design for concorp.contoso.com
Taking the Next Step
During the domain design process, each forest owner specified a forest root domain name and the logical structure for Active Directory. Since Active Directory relies
on DNS for its name resolution, the forest owner appoints a DNS owner for Active Directory and specifies the DNS design as the next step.
If the organization has already implemented a DNS service, the forest owner and DNS owner for Active Directory work with the current DNS owner to delegate the
forest root DNS name to Active Directory. If no DNS service has been implemented, the forest owner and the DNS owner for Active Directory must plan to
implement one.
Top of page
For Windows 2000, DNS represents a better‐scaling, long‐term replacement for NetBIOS name resolution, which is performed by the Windows Internet Name
Service ﴾WINS﴿ in Windows NT–based networks. However, you still need to run WINS to support clients running versions of Windows earlier than Windows 2000,
because such clients do not understand how to use DNS for domain location.
This design document explains how to create a design based on the choices you made in the "Domain Planning" section earlier in this document. This guide shows
best practices for designing a DNS service for Active Directory on a network with:
DNS is a distributed database that contains all the information needed for any client to look up any name. The database is a hierarchical structure represented as an
inverted tree. This tree is also known as a namespace. The Internet represents one kind of namespace. Any client in the Internet namespace can look up any name in
the Internet namespace. Some companies also have a private or internal namespace.
DNS is designed so that any DNS server can answer queries about any name within its namespace. A DNS server has three options for answering queries:
If the answer is in its cache, it answers the query from the cache.
If the answer is in a zone hosted by the DNS server, it answers the query from its zone.
A zone is a portion of the DNS tree containing all the records needed to answer queries for names within a zone. When a DNS server hosts a zone, it is
authoritative for that zone and can answer queries for any name in the zone. For example, a server hosting the zone contoso.com can answer queries for any
name in that zone.
If the server cannot answer the query from its cache or zones, it queries other servers.
For a DNS root server to be able to successfully answer queries about any name, it must have a direct or indirect path to every server and zone in the namespace.
Figure 17 shows how the DNS root server knows how to contact other servers in the namespace.
Figure 17: Delegation example.
The DNS root server hosts the root zone, represented as a dot ﴾ . ﴿. The root zone contains a delegation to a zone in the next level of the hierarchy, the com zone. A
delegation is a record in the parent zone that lists the name server authoritative for the delegated zone. In this example, the authoritative name server is Server.com.
The delegation in the root zone tells the DNS root server that, to find the com zone, it must contact Server.com. Likewise, the delegation in the com zone tells
Server.com that to find the contoso.com zone, it must contact Server.contoso.com.
Note: A delegation uses two types of records. The name server ﴾NS﴿ resource record gives the name of an authoritative server. The host ﴾A﴿ resource record gives
the IP address of an authoritative server.
In this manner, the DNS root server can find any name in the namespace. The root zone has delegations that lead directly or indirectly to all other zones. Any server
that can query the DNS root server can use the information in the delegations to find any name in the namespace. DNS servers have root hints, a list of names and IP
addresses, which tell them how to query the DNS root servers.
In some configurations, some servers do not have root hints. Instead, they forward all queries they cannot answer to another server.
Clients depend on DNS servers to answer all name resolution queries. In a process called recursive name resolution, clients use a recursive query to ask servers to
resolve names and to specify that the server must give a definitive answer, whether or not the name exists. When a server cannot answer authoritatively, it sends the
query to another DNS server. The DNS server determines to which server the query goes in one of two ways: using root hints or by forwarding.
Forwarding enables you to route name resolution through certain servers instead of using root hints. It is an administrative choice and not necessary for support of
Active Directory. If you have an existing DNS service, someone has already made this choice. Figure 19 shows an example of a forwarded query.
Figure 19: Forwarding example.
This example is the same as the previous example, except that the client queries a server that is configured to forward queries. When ﴾1﴿ the client queries for the
name client.contoso.com, ﴾2﴿ the forwarding server forwards that query to another server, known as a forwarder. The remaining steps are the same as in the previous
figure.
If a client asks a server to give it an IP address that corresponds to a given name, it is asking the server to perform a forward lookup. The answer is located in a
forward lookup zone.
On the other hand, if a client asks a server to give it a name that corresponds to a given IP address, it is asking the server to perform a reverse lookup. The answer is
located in a reverse lookup zone. Computer IP addresses are stored in records called pointer ﴾PTR﴿ records.
Reverse lookup capability is not required for the proper operation of Active Directory. If you have an existing DNS namespace with existing reverse lookup zones,
the existing DNS administrator can continue maintaining those zones. If you do not have an existing DNS namespace, you do not need to create reverse lookup
zones in order to deploy Active Directory.
Clients communicate with domain controllers for such operations as processing logon requests and searching the directory for published resources, like printers.
Figure 20 shows how clients use DNS to locate Active Directory domain controllers. In this example, ﴾1﴿ the domain controller registers in DNS. ﴾2﴿ The client queries
a DNS server for the names of the domain controllers in the domain. The DNS server performs recursive name resolution to find the names of domain controllers,
and then returns the names and IP addresses to the client. ﴾3﴿ The client uses the IP address to contact the domain controller.
The Windows 2000 DNS server can store its zones in Active Directory. Active Directory integration has the following advantages:
Secure dynamic update allows an administrator to precisely control which computers update which names, and prevents unauthorized computers from
overwriting existing names from DNS.
For more information about DNS, consult one of the sources listed in Table 14.
"Introduction to DNS" in the TCP/IP Core Networking Guide of the Windows 2000 Server
Resource Kit
"Windows 2000 DNS" in the Networking Guide of the Windows 2000 Server Resource Kit
DNS and BIND, 3d ed., by Paul Albitz and Cricket Liu, 1998, Sebastopol, CA: O'Reilly &
Associates
RFCs 1034 and 1035.
For more information about RFCs 1034 and 1035, see the Request for Comments link on the Web Resources page at
http://www.microsoft.com/windows/reskits/webresources/default.asp.
Computer Naming
Windows 2000 introduces the concept of a primary DNS suffix to a computer name. When a Windows 2000 computer joins a domain, the computer by default
registers itself with a name comprised of the host name of the computer and the DNS name of the domain the computer has joined ﴾<computer_name>.
<primary_suffix>﴿. This fully qualified DNS name for the computer is known as the primary name.
A computer may already have a DNS name that was statically entered into a DNS server or registered by an integrated DNS/DHCP service. The primary name of the
computer is distinct from these previously registered names.
The forest owner and DNS owner are responsible for completing a DNS design for their organization. The plan should contain:
Resolver configuration.
If your organization is migrating from Windows NT, then you currently have an individual who supports WINS name resolution. The DNS owner supports DNS in a
manner analogous to your current WINS support.
The DNS owner is responsible for maintaining contact with the organization's DHCP and DNS groups. Involve these groups in the Active Directory DNS design
process so that each group is aware of what your team is planning and can input early in your design.
The companion guide, Best Practice Active Directory Deployment for Managing Windows Networks, includes detailed instructions for deploying DNS. The information
provided here is for reference only.
Server Configuration
Create DNS domains that correspond to the Active Directory domains you have already specified. Figure 21 illustrates one possible DNS design for an organization
that has not previously implemented DNS.
Table 15 provides an overview of the best practice DNS configuration for a network with no existing DNS service.
Table 15 Best Practice DNS Design for an Organization with No DNS Service
Design element Configuration
Recursive name resolution Root hints on all servers except forest root domain controllers.
Note: Active Directory uses a special set of locator records, the forest‐wide locator records, to help replication partners find each other and to help clients find
global catalog servers. Active Directory stores all the forest‐wide locator records in the zone _msdcs.<forest_name>. Because the information in the zone must be
widely available, this zone is replicated to all DNS servers in the forest.
Design zone configuration for the DNS root zone as specified in Table 16.
Scavenging Disabled
Delegations from the root zone to other A delegation is created for the forest root zone. The delegation includes an NS record for each forest root domain
zones controller.
Design zone configuration for the forest root zone as specified in Table 17.
Delegations from the forest root zone · A delegation is created for the zone _msdcs.<forest‐root>. The delegation will include an NS record for each forest
to other zones root domain controller.
· A delegation is created for the appropriate regional domains. Each delegation includes an NS record for all regional
domain DCs in the appropriate regional domain.
Design zone configuration for the _msdcs.<forest‐root> zone as specified in Table 18.
The zone for the regional domain is configured as specified in Tables 19 and 20.
Scavenging Enabled
Other configuration The zone transfer source is a DNS server on a nearby forest root DC
Client Configuration
To configure the DNS client, the DNS owner for Active Directory must specify the computer naming scheme and how the client will locate DNS servers. Table 21
summarizes these specifications.
Table 21 Client Configuration for DNS When There is No Existing DNS Service
Computer naming Use default naming. When a Windows 2000 computer joins a domain, the computer assigns itself a primary DNS name comprised of the
host name of the computer and the name of the domain.
Client Resolver Configure clients with the addresses of at least two DNS servers running on Active Directory domain controllers.
Configuration
Figure 22 shows the client configuration model. This model assumes you are already running a DHCP server, but not a DNS server or an integrated DNS/DHCP
solution.
Figure 22: Computer naming without DNS but with an existing DHCP service
In this example, a DHCP server assigns the computer Server.noam.corp.contoso.com an IP address. The computer registers its DNS name in your new DNS
infrastructure. When a client queries DNS for the name of the computer, the DNS server finds the name and resolves the query.
With this model, you do not need to make any changes to the DHCP service you already have.
Best Practice DNS Design with Existing DNS Service
The best practice model for DNS depends on whether DNS has already been implemented on the network. When a DNS service has been implemented, the forest
owner and DNS owner for Active Directory should work with the existing DNS owner to delegate the forest root domain DNS name to Active Directory and
configure an Active Directory–integrated DNS service as specified.
The companion guide, Best Practice Active Directory Deployment for Managing Windows Networks, includes detailed instructions for deploying DNS. The information
provided here is for reference only.
Server Configuration
Create DNS domains corresponding to the Active Directory domains you have already specified. Table 22 provides an overview of the best practice DNS
configuration for a network with an existing DNS service.
Table 22 Best Practice DNS Design for an Organization with Existing DNS Service
Recursive name resolution Determine whether your existing DNS service uses forwarding or root hints. Configure DNS running on domain controllers to match.
Note: Active Directory uses a special set of locator records, the forest‐wide locator records, to help replication partners find each other and to help clients find
global catalog servers. Active Directory stores all the forest‐wide locator records in the zone _msdcs.<forest_name>. Because the information in the zone must be
widely available, this zone is replicated to all DNS servers in the forest.
This design has the advantage that the existing DNS structure remains intact. You do not need to migrate any servers or zones. You are simply adding domains to an
existing DNS hierarchy in exactly the same way that the DNS designers intended when they wrote the RFCs.
Note: Although there are other DNS server implementations that can support Active Directory, using Windows 2000 Active Directory‐integrated DNS is a best
practice because it supports secure dynamic update.
The server configuration will vary depending on whether your DNS service uses root hints or forwarding for recursive name resolution.
Root hints
Figure 23 illustrates the server configuration model for a network that uses root hints. A DNS server somewhere hosts a root zone. This zone could either be the
Internet root or a private root. For your configuration, this distinction is irrelevant.
Forwarding
Figure 24 illustrates the server configuration model for a network that uses forwarding.
Figure 24: Integration with existing service using forwarding
In this configuration, child DNS servers forward queries to the nearest forest root DNS server, which in turn forwards queries to the same forwarder used by existing
DNS servers today.
Design zone configuration for the DNS forest root zone as specified in Table 23.
Design zone configuration for the DNS _msdcs.<forest‐root> zone as specified in Table 24.
Scavenging Enabled.
Delegations from the root zone to · A delegation is created for the zone _msdcs.<forest‐root>. The delegation includes NS records for all forest root domain
other zones controllers.
· Delegations are created for the appropriate regional domains. Each delegation includes an NS record for all regional
domain DCs in the appropriate regional domain.
Other configuration The parent zone is updated to include a delegation for this zone.
Scavenging Enabled
The zone for each regional domain is configured as specified in Tables 25 and 26.
Scavenging Enabled
Other configuration The zone transfer source is a DNS server on a nearby forest root DC
Client Configuration
To configure the DNS client, the DNS owner for Active Directory must specify the computer naming scheme and how the client will locate DNS servers. Table 27
summarizes these specifications.
Table 27 Client Configuration for DNS When There is an Existing DNS Service
Computer naming Use defaults naming. When a Windows 2000 computer joins a domain, the computer assigns itself a primary DNS name comprised of the
host name of the computer and the name of the domain.
Client Resolver For existing clients, do not change the resolver configuration. Windows 2000 clients do not need to point directly to a Windows 2000 DNS
Configuration server and can use any DNS server on the network.
If your clients already have a name registered in DNS, your clients now have two names: the existing name and the new primary name. Clients can still be located by
either name. The primary names are automatically created and updated through dynamic update and automatically cleaned up through scavenging.
A computer may have an existing DNS name if the organization has previously implemented:
A DNS service.
Note: Using default naming for your Windows 2000 clients does not affect any authentication mechanism you use in the existing network
If you want to take advantage of Kerberos authentication when connecting to a server running Windows 2000, you must make sure that the client connects to the
server using the primary name.
Each of these designs leaves any existing DNS, DHCP, or integrated DNS/DHCP solution intact. You could use an arbitrary DNS suffix instead of the Active Directory
domain name if the DNS and Active Directory names were different. However, due to the additional management overhead of such a configuration, this is not a best
practice.
Note: If you already have reverse lookup zones configured, leave the reverse lookup zones and all the PTR records in place. All existing clients can continue to be
registered by using their existing names.
In this model, your existing network already has a DNS server for which your administrator manually enters names. Figure 25 shows an example of this configuration.
This model does not affect any DNS naming system you might already have in place. If, before your deployment, your DNS server hosts a zone containing names for
your computers, it can continue doing so after your deployment.
In this model, the existing network uses an integrated DHCP/DNS solution such as Lucent QIP. Figure 26 shows an example of this configuration.
Any client can find the server by either DNS name. When a client queries any DNS server, the DNS server performs name resolution to find the IP address for the
name. Depending on how DNS is configured, the DNS server might forward the query, or it might use recursive name resolution. Either way, it queries the
appropriate server for the appropriate name, and then responds to the client with the appropriate answer.
This model does not affect any integrated DHCP/DNS solution you might already have in place. If, before your deployment, your DHCP server registers DNS names
for your computers, it can continue doing so after your deployment.
Figure 27: The task flow for the DNS design for Active Directory
The decisions involved in DNS planning are simple and mechanical. If you have an existing DNS structure, your existing structure will dictate many of your choices.
As you design each component, fill in the blanks of the corresponding DNS worksheet. After you have finished, review the design with your external DNS and DHCP
groups.
Best practices for creating an OU design introduces the role of "OU owner." The Active Directory OU owner is comparable to most Windows NT domain
administrators. This means that domain administrators who manage users and resources in a Windows NT domain will manage the same resources in an Active
Directory domain, but will be owners of OUs.
Expect to make periodic changes to your OU structure to reflect changes in your administrative structure and to support policy‐based administration. OUs are
designed to be easily changed.
Note: There are no practical limitations on how many levels OUs can be nested. When designing sub‐tiers of OUs, you should compare the value of additional
granularity of control with the added complexity of managing the structure. As a best practice, create OU structures no more than ten levels deep.
When designing an OU structure, keep in mind that the OU hierarchy does not need to mirror your organization's departmental hierarchy. Every OU you create
should have a defined purpose ﴾such as delegation or policy﴿ and should add value to your system; otherwise, you will spend additional time maintaining the
structure without gaining a corresponding benefit.
The initial goal in designing an OU structure is delegation of administration. After this structure is in place, you can further refine it by creating any sub‐tiers of OUs
you require for other purposes, such as applying Group Policy or placing objects in separate OUs to restrict their visibility.
Delegation of Administration
Delegation of administration allows you to designate groups of users who have control over the users, computers, or other objects in an OU. To accomplish this,
place the user who has control into a group, place the set of objects to be controlled into an OU, and then delegate administration of the OU to that group. In
Windows 2000, you have very fine control over the administrative tasks that can be delegated; for example, you could create one group that has full control of all
objects in an OU, another group that can only create, delete, and manage user accounts in the OU, and another that can only reset the passwords of user accounts.
These permissions can be made inheritable so that they cover not only a single container, but also sub‐containers.
OUs replace Windows NT domains as the target for delegation of administration to:
Minimize the number of administrators who must have high levels of access.
Group Policy
Although you will first design your OU structure for delegation of administration, some organizations will later create additional tiers of OUs for Group Policy
purposes.
Group Policy can use security groups to filter its scope, that is, to apply a Group Policy setting to a subset of the objects in an OU without creating a sub‐OU. For
example, you could create a Group Policy setting to apply only to managers, even if your OU contains all users. To accomplish this, you apply the Group Policy
setting to the OU, then create a group of managers and change permissions on the policy to apply only to that group. In contrast, to delegate administration for a
subset of an OU you must create a sub‐OU. Because you can achieve precise control of Group Policy scope with security groups, delegation of administration takes
priority in the OU design process.
Note: You cannot apply Group Policy settings to the default Users and Computers containers. These are not OUs, and you cannot place OUs in them, so they cannot
be used for Group Policy.
It is recommended that you accept the defaults that are set within the Default Domain Policy and the Default Domain Controllers Policy, with the exception of the
nodes listed below. These nodes contain settings that you should customize to meet your security requirements.
Password Policy
Kerberos Policy
Other Group Policy settings ﴾those not related to security﴿ should not be set within these default Group Policy settings; instead you should create new Group Policy
objects ﴾GPOs﴿. For more information about planning and implementing Group Policy, read the following topics:
Group Policy planning, see the Windows 2000 Change and Configuration Management Deployment Guide, available at:
http://www.microsoft.com/windows2000/techinfo/reskit/deploy/CCM/default.asp
Template GPOs for building six different managed scenarios, see Implementing Common Desktop Management Scenarios, available at:
http://www.microsoft.com/downloads/details.aspx?familyid=354B9F45‐8AA6‐4775‐9208‐C681A7043292&displaylang=en
Group Policy:
http://www.microsoft.com/windows2000/techinfo/howitworks/management/grouppolwp.asp
Elements of an OU Plan
The domain owner is responsible for completing an OU design for the domain. The design should contain:
Its purpose.
A list of users or groups that have control over the OU or the objects in it.
The type of control they have over the class of objects in the OU.
Record your answers in the OU design worksheets provided later in this guide.
Note: Even though the OU owner is delegated control over a sub‐tree of objects, the domain owner retains full control over all sub‐trees. This should not be
changed so that the domain owner can correct mistakes such as an improper access control list ﴾ACL﴿ or recovery of lost sub‐trees when administrators are
terminated.
Within their scope of management, OU owners can control how administration is delegated, and how policy is applied to objects. They may also create new sub‐
trees and delegate administration of OUs.
Figure 28 shows the elements of the model. Note that this may not be identical to the OU hierarchy you design because it shows both possible locations for
Resource OUs — under the domain root and under an Account OU. Your design may have both types, or it may have one or the other. See "Resource OUs" later in
this section for more information.
Domain Controllers OU
These containers should remain under the control of the domain owner.
Users and Computers Containers
When you perform an in‐place upgrade, existing users and computers are automatically placed into the Users and Computers containers. However, these containers
are not used. Instead, you will move users and computers into OUs under the control of individual data‐level owners.
Note: If you manage your Windows NT domain with earlier tools, such as User Manager, or third‐party tools, then new users and groups are created in the Users
container in the Active Directory domain. Until you upgrade your tools, you will need to manually move these users to their correct OUs.
When a computer joins an Active Directory domain, if no account exists for that computer, one will be created in the Computers container. To prevent this, pre‐
create the computer account in the appropriate OU.
By default, several well‐known and built‐in users and groups are created in a new domain. These objects should remain in the default containers and under the
control of the domain owner. Table 28 lists these users and groups.
Administrator Administrator
Guest Guest
KRBTGT Internet Guest Account
Domain Admins Launch IIS Process Account
Domain Users
Domain Guests
Domain Computers
Cert Publishers
Schema Admins ﴾root domain only﴿
Enterprise Admins ﴾root domain only﴿.
Domain Controller OU
Objects created in the domain and domain controllers OUs have default Group Policy settings applied. A best practices recommendation is that the contents of
these containers and their Group Policy settings be left untouched. The domain owner can create new Group Policy settings where necessary.
Account OUs
Account OUs manage identity, that is, they define the set of users and groups that can potentially be granted access to resources. They are analogous to Windows
NT Master User Domains ﴾MUDs﴿. The Account OU model is shown in Figure 29.
Table 29 OUs Created by Users and Computer Migrated from Windows NT MUDs
OU Purpose
Service Some services that require access to network resources are run under user accounts. This OU is created to separate and distinguish service user
Accounts accounts from the human user accounts contained in the Users OU. Also, by placing the different types of user accounts in separate OUs, you can
manage them according to their different administrative requirements.
Computers Computer accounts other than Domain Controllers.
Groups Groups of all types, except administrative groups, which are managed separately.
Admins User and group accounts for administrative personnel, to allow them to be managed separately from regular users. Auditing should be enabled for
this OU so you can track changes to administrative users and groups.
Account OU Administration
Figure 30 defines the administrative group design for an account OU. These groups are all local groups. Create an owner for the Account OU. In this example the
group is named <acct_ou>_OU_admins. This group has full control of the OU, and will create the standard set of sub‐OUs and the groups to manage them.
Groups that manage the sub‐OUs are granted full control only over the specific class of objects they are to manage. For example, <acct_ou>_group_admins has
control only over group objects.
Note that there is no separate administrative group to manage the Admins OU; rather, it inherits ownership from its parent OU, so it is managed by
<acct_ou>_OU_admins.
Resource OUs
Resource OUs are used to manage access to resources. They are analogous to Windows NT resource domains. The OU owner creates computer accounts so they can
attach servers with resources such as file shares, databases, and printers to the domain. The owner also creates groups to control access to the resources. Figure 31
illustrates two possible locations for the Resource OU.
If you have Windows NT resource domains that are independently managed by separate IT groups, you can place the new OUs on the top tier, under the
domain root. If a Windows NT MUD owner owned and managed the contents of the former resource domain, then the resource OU can be created as a sub‐
OU of the corresponding Account OU.
Note: Resource domain owners may prefer to be subordinate to the Windows NT MUD owner rather than the domain owner, to gain better access to
support. For example, if an administrative error causes objects in the Resource OU to be inaccessible, the resource administrator needs help from an upper‐
tier administrator. In large organizations, the Windows NT MUD owner may be nearby and have a relatively smaller scope of management. In contrast, the
domain owner could be in a different region or country, and be responsible for a large number of OUs.
Single OU design.
Resource OUs have no standard sub‐OUs. Computers and groups are placed directly in the OU.
The Resource OU owner owns only the objects within the OU.
The resource OU owner does not own the OU container itself. Resource OU owners manage only computer and group objects; they cannot create other
classes of objects within the OU. This is done to explicitly limit Resource OU owners to managing computer and group objects, and to prohibit them from
creating sub‐OUs.
Note: The creator or owner of an object has the ability to set the ACL on the object no matter what permissions are inherited from the parent container. If a
Resource OU owner can reset the ACL on an OU, they can essentially create any class of object in the OU, such as users. For this reason, resource OU owners are not
permitted to create OUs.
Figure 32 defines the administrative group design for a Resource OU. For each Resource OU, create a group to be the resource owner. This group has full control
over the group and computer objects in the OU, but not over the OU container itself. The <res_ou>_OU_admin group manages its own membership and resides in
the Resource OU.
OU Design Process
The domain owner designs the domain's OU structure by creating Account OUs and Resource OUs. Figure 33 illustrates this process.
Consult your domain design to determine if this domain is in‐place upgraded or newly created, and to determine if this domain is the target of MUD consolidation.
Use the following steps to create account OUs:
1. If the domain will be upgraded in‐place, create an OU for the upgraded accounts.
During deployment, you distinguish users and groups who belong to the domain owner from regular users and groups. Domain owner users and groups will
stay in the default Users container. Regular users and groups will be moved to the appropriate Account OU.
2. If the domain is the target of MUD consolidation, create an OU for each independently managed source MUD.
If multiple MUDs managed by the same IT group are being consolidated into the domain, you can migrate accounts from those domains into a single
Account OU instead of using multiple Account OUs.
3. If the domain is newly created and is not the target of MUD consolidation, create an Account OU for the domain itself.
This Account OU is necessary to separate the OU ﴾data﴿ owner from the domain ﴾service﴿ owner.
Consult your domain design to determine if this domain is the target of resource domain consolidation.
If multiple resource domains managed by the same IT group are being consolidated into the domain, you can migrate objects from those domains into a
single Resource OU instead of using multiple Resource OUs.
For resource domains managed by Windows NT MUD owners, you can migrate objects into the corresponding Account OU sub‐tree ﴾into the Computers and
Groups sub‐OUs﴿ instead of using a separate Resource OU under the Account OU.
2. Place the OU under the domain root or under an Account OU. The resource domain owner becomes the OU owner.
If the domain is not the target of a resource domain consolidation, create Resource OUs as necessary based on your administrative requirements.
Top of page
Locate the closest domain controller for client logon and directory searches.
Control Replication
Site topology controls Active Directory replication to achieve the best balance between replication speed and replication cost by distinguishing between replication
that occurs within a site and replication that must span sites.
Within sites, replication is optimized for speed — data updates trigger replication and the data is sent without the overhead required by data compression.
Conversely, replication between sites is compressed to minimize the cost of transmission over WAN links.
Route Replication
Active Directory uses a multimaster, store‐and‐forward method of replication. A domain controller communicates directory changes to a second domain controller,
which then communicates to a third, and so on, until all domain controllers have received the change. When replication occurs between sites, a single domain
controller per domain at each site collects directory changes, stores these change, and communicates them at a scheduled time to a domain controller in another
site.
Client Affinity
Active Directory clients locate domain controllers according to their site affiliation. A client locates a domain controller within the same site whenever possible. By
finding a domain controller in the same site, the client avoids communications over WAN links.
Network Topologies
An organization's network topology should reflect its business needs. In some organizations, business needs result in users being situated in a few large locations
that are well connected to one another. Alternatively, in other organizations users are situated in many small satellite locations connected to one of a few, well‐
connected hub sites. Such network topologies fall into one of three general types: ring, hub and spoke, and complex. These are illustrated in Figure 34.
The forest owner and site topology owner are responsible for completing a site topology design for the forest. The plan should contain:
For each domain, the number of domain controllers and its specified hardware.
Role Responsibility
Control changes to site When network connectivity changes, the owner makes the respective changes to the site topology.
topology
Move domain controllers If a domain controller's IP address changes, which puts it on a subnet in a different site, or if the subnet moves to a different site,
between sites you must move the domain controller to the new site manually.
Liaison with network The owner obtains and maintains information about connections and routers that affect site topology.
group · To effectively set costs on site links, the owner understands the issues of network speed and capacity that affect site topology.
· Maintains a list of subnet addresses, subnet masks, and the location to which each belongs.
Delegate authority for site topology management to the site topology owner.
Use the default configuration for intersite replication where possible. These include:
For advanced topics about replication, see The Active Directory Branch Office Planning Guide, available on‐line at
http://www.microsoft.com/windows2000/techinfo/planning/activedirectory/branchoffice/default.asp.
The following are best practice guidelines for designing site links:
This condition can occur in large hub‐and‐spoke deployments where most sites are branch sites that communicate with a centralized hub site. If this
condition exists and there are more than 20 site links from the hub site to branch sites, the hub site can be divided into multiple sites to provide additional
bridgehead servers to handle the replication volume. In a site, a single bridgehead server is active per domain. If the site has more than 20 site links, the
bridgehead servers can become overloaded.
Figure 35: Task flow for the site topology design process
Creating a Location Map
A location map determines where users are located and which locations are best suited for replication with which other locations. As a best practice, Active Directory
sites should map to the locations of LAN segments of your network. To create a location map:
1. Create a location map covering all physical locations in your forest connected by LAN‐speed or better links.
Consider a physical location to be a group of users with internal connectivity of 10 Mbps or better.
Figure 36 shows a sample location map. Each location includes the number of users, the number of workstations, and the IP addresses of network subnets present.
Each network connection includes its WAN speed and percentage or bandwidth used.
Figure 36: A location map with LAN segments and WAN links
Placing Domain Controllers in Locations
In conjunction with domain owners, the site topology owner determines the location of the domain controllers for the forest root domain and regional domains.
Place domain controllers in locations so, should the WAN link fail, there is local authentication for users.
Begin evaluating locations by considering the placement of domain controllers in your hub sites. Once you have completed added domain controllers to all hub
sites, consider all satellite locations. You may choose not to add domain controllers to your smallest locations if:
The location contains too few users and workstations to warrant a domain controller.
Figure 37 illustrates a map of all sites showing domains that are relevant to each site.
For each of your hub sites, place one domain controller from the forest root domain. For each satellite location, evaluate the need for a forest root domain
controller. Keep in mind that for a client to access a resource in a domain other than its own, communication must occur with a forest root domain controller. For
this reason, any location that has domain controllers from two or more regional domains should also have a forest root domain controller.
Place a domain controller for regional domains into a location if the users in that location require the ability to log on when the WAN link is down. If the local
domain controller fails, the users at that location will log on over the WAN. To improve logon performance in the case of a single domain controller failure, consider
adding a second domain controller.
Each domain will have a PDC emulator operations master. Place the PDC in a location that is:
The site where you place the PDC is designated the primary site for that domain.
A global catalog server is required for logon to native‐mode Active Directory domains. To eliminate the need to contact a global catalog server in a distant site for
logons and for forest‐wide searches, designate at least one domain controller per site as a global catalog.
Best practice design dictates that half of all domain controllers in the site be global catalogs, with at least two global catalogs if your site has multiple domain
controllers. If you use the single, global domain model, plan for all domain controllers for the global domain to also be global catalog servers. Because the forest
root domain is very small, making all domain controllers global catalogs requires very little additional resources.
Each location that contains a domain controller constitutes a site. To create a site:
Do not specify sites for locations that do not contain domain controllers. Instead, associate the subnets for these locations with the sites where you would like
for these users to be authenticated.
Intersite replication occurs according to the settings on site link objects that site administrators create in Active Directory. Each site link object represents the WAN
connection between two or more sites.
Use the following steps to control how replication occurs between sites:
1. Connect sites with site links to model the way that your locations are connected.
Cost
Schedule
Interval
Note: If multiple sites have the same connectivity and availability to each other, you can connect them with the same site link.
Figure 38 illustrates a site map with site links and WAN speeds indicated.
2. Create a table containing the connection speed for each site link.
To get a relative cost factor for site links that correlates to the available bandwidth, use the following formula:
9.6 1042
19.2 798
38.4 644
56 586
64 567
128 486
256 425
512 378
1024 340
2048 309
4096 283
These costs do not reflect differences in reliability between network links. If some of your links are less reliable than others, then you should not rely on these links
for replication. Set higher costs on any failure‐prone network links.
When a site link goes down, replication failover can be predicted and controlled by setting site link costs. Figure 38 illustrates how site link costs can be used to
show the relative cost of linking any two sites in the topology.
The site topology owner determines when site links are available for replication by setting a scheduled replication window. However, a replication cycle that starts
before the end of the schedule will run until completion even if the scheduled replication window closes.
Control site link availability by setting a schedule on site links. You might use the default ﴾100 percent available﴿ schedule on most links, but block replication traffic
during peak business hours on links to certain remote locations. By blocking replication, you give priority to other traffic, but you also increase replication latency.
When replication between two sites traverses multiple site links, the intersection of the replication schedules on all relevant links determines the connection
schedule between the two sites. In addition, when schedules on each link never overlap, replication can never occur.
Within the scheduled replication window, interval determines how often domain controllers poll replication partners for changes.
During each window of the schedule that is open for replication, decide the interval of time that determines how often replication occurs within the schedule
window. Consider the following criteria:
A small interval decreases latency but increases the amount of WAN traffic.
1. Create a table of all the hub sites on your network. Your table should resemble the one shown in Table 32.
Seattle 0.25
Boston 0.25
Vancouver 0.25
Milan 0.25
3. From the replication schedule, determine the maximum replication latency possible on any site link connecting two hub sites.
For example, if replication occurs between Seattle and Boston for one hour a day, then the maximum delay for replication between these sites is 23 hours. If
the replication delay between Boston and Seattle is the longest scheduled delay among all hub sites, then the maximum latency between all hubs is 23 hours.
4. For each hub site, create a table of the maximum latencies between the hub site and any of its satellite sites.
For example, if replication occurs between Boston and Bar Harbor every four hours and this is the largest replication delay between Boston and any of its
sites, then the maximum latency between the Boston hub and its satellites is four hours.
5. Combine these maximum latencies to determine the maximum latency for the entire network.
For example, if the maximum latency between Milan and its satellite site in Seville is one day, then the maximum replication latency for this set of links is 52
hours ﴾4+24+24﴿.
Review your maximum replication latency and revise your replication schedule if necessary.
Replication
Operations masters
User and workstation logons followed by directory lookups most impact domain controller performance.
The size of the domain is not usually an indication of the performance of its domain controllers. Instead, the usage patterns and the number of users logging on to a
domain controller in a specific site most closely determine a domain controller's performance. Table 33 shows how services affect domain controller performance.
User logon Interactive user logon,User network logon, User batch logon High
RID pool operations master Distribute RID pools to domain controllers in this domain Low
KCC with less than 200 sites Compute replication topology Low ‐ Medium
KCC with more than 200 sites Compute replication topology High
Global catalog service Universal group membership lookups,Forest‐wide searches Low ‐ High ﴾with Exchange 2000﴿
Processor Requirements
Table 34 shows the size of domain controllers and services that can be loaded:
< 100 One uniprocessor PIII 500, 512 MB Domain controller is a global catalog. No Server
101 – 500 One uniprocessor PIII 500, 512 MB Domain controller is a global catalog. Yes Server
500 – One Dual PIII 500, 1 GB. Domain controller is a global catalog. Yes Server
1,000
1,000 – Two Quad PIII XEON, 2 GB. Both domain controllers are global catalogs. Yes Advanced Server
10,000
> 10,000 One Quad PIII XEON, 2 GB for every One global catalog for every two domain controllers with a minimum Yes Advanced Server
users 5,000 users. of two global catalogs.
Note: The best practice guidelines for domain controller hardware are:
For domains with > 50,000 users, use a Quad PIII XEON with 2 GB of memory for the dedicated PDC.
This table provides a starting point for domain controller sizing. Your actual hardware needs will depend on your usage pattern. If you require more accurate
hardware size determinations or if you will be using Exchange 2000 in your deployment:
Domain controllers and global catalogs can use large amounts of data storage for the Active Directory database. Determine how much storage to provide for the
Active Directory database from the information provided in Table 35.
For example, in a forest with two 10,000‐user domains, all domain controllers need 4 GB of storage. All global catalogs require 6 GB of storage.
A domain controller requires space on storage devices for its operating system, log files, database, and SYSVOL. For domain controllers in sites with less than 10, 000
users, all four components can reside on a single RAID 1 array. A RAID 1 array provides protection against single disk failures.
Over time if you find that a domain controller becomes I/O bound, you can enhance the performance of the computer by adding additional memory ﴾up to 2 GB﴿.
This alleviates the need to move the operating system, database, or logs files to separate RAID 1 systems.
For domain controllers in sites with more than 10,000 users, use separate RAID arrays as specified in Table 36.
Top of page
Top of page
The following worksheets correspond to the headings in this guide. The worksheets are designed to help you gather and organize the information you'll need to
customize your organization's Active Directory deployment.
As you read this document and conduct planning sessions, you should complete the corresponding worksheets. Collectively, the worksheets become the core of
your organization's Active Directory deployment project plan.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Top of page
Complete the table by identifying the technology owners and team members for the Active Directory design of your forest. Add or remove rows from the table to
customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
For each existing MUD in your forest copy and complete the "Quick Reference" worksheet. Add or remove rows from the table to customize the form for your
organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Add or remove rows from the table to customize the form for your organization.
Acknowledgements
We would like to thank the following people for reviewing the guides and providing valuable feedback. ﴾Acknowledged individuals are employees of Microsoft
Corporation unless otherwise noted.﴿
Micky Balladelli ﴾Avanade Inc.﴿, Dung Hoang Khac ﴾Compaq Global Services﴿, Vic Gupta, Shaun Hayes, Michael Kostersitz, Doug Lindsey, Alain Lissoir ﴾Compaq Global
Services﴿, Tony Mosunmade, Tony Redmond ﴾Compaq Global Services﴿, Matthijs ten Seldam, Paul Thompson ﴾NetIQ Corporation﴿, Ruud van Velsen, Eddie Hanif,
Frank Plawetzki, Connie Shih, Steve Towle, Christopher Westpoint.
Top of page
© 2016 Microsoft