Upgrade Domain Controllers: Microsoft Support Quick Start for Adding Windows Server 2008 or Windows Server 2008 R2 Domain Controllers to Existing Domains
Applies To: Windows Server 2008, Windows Server 2008 R2
This topic explains the process for upgrading domain controllers to Windows Server 2008 or Windows Server 2008 R2. This information is based on the experience of the Microsoft Customer Service and Support (CSS) team. This topic includes links to related information about the upgrade process.
To obtain a copy of this guide in a printable .doc file format, see Upgrading Active Directory Domains to Windows Server 2008 and Windows Server 2008 R2 AD DS Domains at the Microsoft Download Center (https://go.microsoft.com/fwlink/?LinkId=178585).
What’s new in AD DS in Windows Server 2008 and Windows Server 2008 R2
System requirements for installing Windows Server 2008 and Windows Server 2008 R2
Supported in-place upgrade paths
Functional level features and requirements and considerations for operations master roles
Client, server, and application interoperability
Read-only Domain Controllers
Networking and name resolution
Known issues for upgrades to Windows Server 2008 and Windows Server 2008 R2
Secure default settings in Windows Server 2008 and Windows Server 2008 R2
Virtualized domain controllers on Hyper-V™, VMware, and other virtualization software
Administration, remote administration, and cross-version administration
Configuring the Windows Time service for Windows Server 2008 and Windows Server 2008 R2
Verifications that you can make and recommended hotfixes that you can install before you begin
Run Adprep commands
Upgrade domain controllers
Troubleshooting errors
What’s new in AD DS in Windows Server 2008 and Windows Server 2008 R2
The following table has links to more information about new features and functionality in Windows Server 2008 and Windows Server 2008 R2.
Operating system | What’s new |
---|---|
Windows Server 2008 |
For information about each feature, special considerations, and how to prepare for deployment, see Changes in Functionality from Windows Server 2003 with Service Pack 1 (SP1) to Windows Server 2008 (https://go.microsoft.com/fwlink/?LinkId=164410). For information about specific features in Active Directory Domain Services (AD DS) in Windows Server 2008, see Active Directory Domain Services Role (https://go.microsoft.com/fwlink/?LinkId=164414). Some functionality that was available in previous versions of Windows Server is deprecated in Windows Server 2008. For example, SMTP Replication is removed by default. For more information, see article 947057 in the Microsoft Knowledge base (https://go.microsoft.com/fwlink/?LinkId=164416). The Browser Service is disabled by default in Windows Server 2008 and Windows Server 2008 R2 domain controllers. |
Windows Server 2008 R2 |
For information about each feature, special considerations, and how to prepare for deployment, see Changes in Functionality from Windows Server 2008 to Windows Server 2008 R2 (https://go.microsoft.com/fwlink/?LinkID=139049). For information about specific features in AD DS in Windows Server 2008 R2, see What's New in Active Directory Domain Services (https://go.microsoft.com/fwlink/?LinkID=139655). In Windows Server 2008 R2, Dcpromo.exe does not allow the creation of a domain that has a single-label Domain Name System (DNS) name. If you try to promote an additional domain controller in a domain that has a single-label DNS name (such as contoso, instead of contoso.com), the check box to install a DNS server is not available in Dcpromo.exe. Upgrading Windows Server 2003 domain controllers in Windows Server 2008 R2 and Windows Server 2008 R2 single-label domains is supported. Promoting additional Windows Server 2008 R2 and Windows Server 2008 R2 domain controllers into existing single-label DNS domains is supported. Windows Server 2008 R2 does not support MSMQ in domain mode for Windows NT 4 and Windows 2000 MSMQ clients running against Windows Server 2008 R2 domain controllers that have no Windows Server 2003 or Windows Server 2008 domain controllers in the same environment. For more information about other functionality in Windows Server 2003 that is deprecated in Windows 7 and Windows Server 2008 R2, see Deprecated Features for Windows 7 and Windows Server 2008 R2 (https://go.microsoft.com/fwlink/?LinkId=177815). |
For more information about other known issues for AD DS, see Known Issues for Installing and Removing AD DS (https://go.microsoft.com/fwlink/?LinkId=164418).
System requirements for installing Windows Server 2008 and Windows Server 2008 R2
For system requirements for Windows Server 2008, see “System Requirements” in Installing Windows Server 2008 (https://go.microsoft.com/fwlink/?LinkId=164421).
For disk-space requirements for AD DS in Windows Server 2008, see Disk space and component location issues in Known Issues for Installing and Removing AD DS (https://go.microsoft.com/fwlink/?LinkId=164423).
For system requirements for Windows Server 2008 R2, see Installing Windows Server 2008 R2 (https://go.microsoft.com/fwlink/?LinkID=160341).
For disk-space requirements for AD DS in Windows Server 2008 R2, see Disk space and component location issues in Known Issues for Installing and Removing AD DS (https://go.microsoft.com/fwlink/?LinkID=164423).
The AD DS database (Ntds.dit) on Windows Server 2008 R2 domain controllers can be larger than in previous versions of Windows, for the following reasons:
There are changes in the online defragmentation process on Windows Server 2008 R2 domain controllers.
Windows Server 2008 R2 Adprep /forestprep adds two new indices on the large link table.
The Windows Server 2008 R2 Active Directory Recycle Bin feature, when it is enabled, preserves attributes on deleted objects for the recycled object lifetime.
The Active Directory database on a Windows Server 2008 domain controller that is promoted into a Windows 2000 domain should be a size that is similar to the size of the Active Directory databases on the Windows 2000 domain controllers. While Windows Server 2008 R2 additions increase the database size, the addition of a single-instance store that is supported by domain controllers that run Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, or Windows Server 2008 R2 offsets that increase. Windows Server 2008 R2 domain controllers are estimated to be 10 percent larger than Windows Server 2008 domain controllers, not counting the Active Directory Recycle Bin.
In a production Windows Server 2008 R2 domain at Microsoft, the Active Directory Recycle Bin feature increased the database size by an additional 15 to 20 percent of the original AD DS database size, using the default deletedObjectLifetime and recycledObjectLifetime values of 180 days. Additional space requirements depend on the size and count of the objects that can be recycled.
If an in-place upgrade to Windows Server 2008 or Windows Server 2008 R2 rolls back silently to the previous operating system version, check for sufficient free disk space on the partitions that host the AD DS database and log files.
Supported in-place upgrade paths
For upgrades to Windows Server 2008, see “Supported upgrade paths” in Guide for Upgrading to Windows Server 2008 (https://go.microsoft.com/fwlink/?LinkID=146616).
For upgrades to Windows Server 2008 R2, see “Supported upgrade paths” in Installing Windows Server 2008 R2 (https://go.microsoft.com/fwlink/?LinkID=160341) and Windows Server 2008 R2 Upgrade Paths (https://go.microsoft.com/fwlink/?LinkID=154894).
When you upgrade existing domain controllers or promote new domain controllers into existing domains, consider the following:
Computers running Windows NT 4 or Windows 2000 Server cannot be in-place upgraded to Windows Server 2008 or Windows Server 2008 R2.
In-place upgrades from Windows Server 2003 or Windows Server 2003 R2 to Windows Server 2008 or Windows Server 2008 R2 are supported (subject to supported Windows Server 2008 R2 Upgrade Paths), with the following exception: x86-based operating systems cannot be in-place upgraded to x64-based versions of Windows Server 2008 or Windows Server 2008 R2 (which only runs on x64-based computers).
An x64-based version of Windows Server 2008 can be in-place upgraded to Windows Server 2008 R2.
A writeable domain controller cannot be upgraded to be an RODC. The reverse is also true.
A server that runs the full installation of Windows Server 2008 R2 cannot be upgraded to be a server that runs a Server Core installation of Windows Server 2008 R2. The reverse is also true.
The best practice for adding new operating systems hosting the domain controller role is to promote replica domain controllers (as opposed to in-place upgrading existing DCs). Transfer FSMO roles and install additional server roles as required.
Windows Server 2008 and Windows Server 2008 R2 both auto-install Internet Protocol version 6 (IPv6). Do not arbitrarily disable or remove IPv6.
Windows Server 2008 R2 does not allow outbound trusts to be created between domains that have domain controllers that run Windows Server 2008 R2 and Windows NT 4 domains. Windows Server 2008 R2 inbound trusts with Windows NT 4.0 domains can be made to work but are not tested or supported. This can have an impact on the sequence in which you choose to upgrade domains and domain controllers.
For example, suppose a domain with Windows Server 2003 domain controllers has a trust with a domain that has Windows NT 4 domain controllers. In this situation, you need to replace the domain controllers in the Windows NT 4 domain with domain controllers that run Windows 2000 or later before you upgrade or replace domain controllers in the Windows Server 2003 domain. If the domain controllers in the Windows Server 2003 domain are replaced or upgraded first in this situation, the trust between the domains will no longer function.
first
If you replace domain controllers, use the metadata cleanup method in Windows Server 2008 and Windows Server 2008 R2. Manually remove DNS and Windows Internet Name Service (WINS) records for the original role holder. For more information, see Clean Up Server Metadata (https://go.microsoft.com/fwlink/?LinkId=148150).
If you want to migrate the AD DS server role, DNS server roles, IP address, computer name, and supporting configuration state, from an existing server to a new Windows Server 2008 or Windows Server 2008 R2 destination server, see AD DS and DNS Server Migration: Migrating the AD DS and DNS Server Roles (https://go.microsoft.com/fwlink/?LinkId=177812). For example, refer to this article if you want to ensure that the new server has the same IP address or server name as the legacy server, or if you have made configuration changes, such as registry changes or file-based DNS zones, on the legacy DNS server and you want them retained on the new DNS server.
Functional level features and requirements and considerations for operations master roles
Features that are enabled for Windows Server 2008 and Windows Server 2008 R2 domain and forest functional levels are documented in Understanding Domain and Forest Functionality (https://go.microsoft.com/fwlink/?LinkId=164555). Domain and forest functional level requirements for the deployment of Windows Server 2008 and Windows Server 2008 R2 domain controllers are as follows:
- Adprep /forestprep does not have any domain or forest functional level requirements.
Note
The import of PAS.LDF, which is normally completed by running Adprep /forestprep, requires a forest functional level higher than Windows 2000. If PAS.LDF is not imported because Adprep /forestprep was run when the forest functional level was Windows 2000, then a search using Active Directory Users and Computers for BitLocker Recovery Password can unexpectedly return 0 results. For more information, see Troubleshooting: Active Directory Users and Computers unexpectedly returns 0 results when searching for BitLocker Recovery Password.
Adprep /domainprep requires a Windows 2000 native or higher domain functional level in each target domain.
Adprep /rodcprep does not have any functional-level requirements.
You can install Windows 2000, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 domain controllers in the same domain or forest without any functional-level requirement.
The promotion of read-only domain controllers (RODCs) requires Windows Server 2003 forest functional level or higher.
There are new well-known and built-in groups that area created after you upgrade or transfer the domain controller that holds the role of the primary domain controller (PDC) emulator master in each domain in the forest to Windows Server 2008 or Windows Server 2008 R2, or after you add a read-only domain controller (RODC) to your domain. For more information, see Appendix A: Background Information for Upgrading Active Directory Domains.
There are no changes in Windows Server 2008 or Windows Server 2008 R2 to recommendations for placing operations master roles (also known as flexible single master operations or FSMO). For more information about current recommendations, see Planning Operations Master Role Placement (https://go.microsoft.com/fwlink/?LinkId=185222).
Client, server, and application interoperability
Client Operating Systems | Domain Controller Operating Systems | ||||||
---|---|---|---|---|---|---|---|
Windows NT 4 |
Windows 2000 Server |
Windows Server 2003 |
Windows Server 2003 R2 |
Windows Server 2008 |
Windows Server 2008 R2 |
Comments |
|
Windows NT 4 |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Not tested by Windows product groups and therefore not supported. CSS can provide best-effort support, but escalation support or hotfixes will not be provided. Improved default security settings block domain join and maintaining a secure channel. Although not recommended, those operations can work after default security settings are relaxed. For more information, see article 942564 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=164558). |
Secure channels between computers running Windows NT 4.0 and Windows 7 or Windows Server 2008 R2 are not tested by Windows product groups and are therefore not supported. Affected operations include validation of trusts, creation of outbound trusts, domain joins, and authentications over secure channels. CSS can provide best-effort support, but escalation support or hotfixes will not be provided. Improved default security settings block establishing and maintaining domain join and a secure channel but those operations can work after default security settings are changed. For more information about outbound trusts between Windows Server 2008 R2 and Windows NT 4 domains, see article 2021766 (https://go.microsoft.com/fwlink/?LinkID=205835). |
AllowNT4Crypto policy is set to 0 by default on domain controllers that run Windows Server 2008 or Windows Server 2008 R2. For more information, see Secure default settings in Windows Server 2008 and Windows Server 2008 R2. |
Windows 2000 |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Not tested by Windows product groups and therefore not supported, but there are no known issues. CSS can provide best-effort support, but escalation support or hotfixes will not be provided. |
Not tested by Windows product groups and therefore not supported, but there are no known issues. CSS can provide best-effort support, but escalation support or hotfixes will not be provided. |
|
Windows XP |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
See article 944043 if you are deploying RODCs. |
Windows Server 2003 |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
See article 944043 if you are deploying RODCs. |
Windows Server 2003 R2 |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
|
Windows Vista |
Not tested by Windows product groups and therefore not supported. CSS can provide best-effort support, but escalation support or hotfixes are not provided. The domain controller operating system is beyond its supported lifecycle. |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Unable to Join Windows Server 2008 R2 or Windows 7 Computer to Active Directory Domain (https://go.microsoft.com/fwlink/?LinkId=192570) |
Windows Server 2008 |
Not tested by Windows product groups and therefore not supported. CSS can provide best-effort support, but escalation support or hotfixes are not provided. The domain controller operating system is beyond its supported lifecycle. |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Unable to Join Windows Server 2008 R2 or Windows 7 Computer to Active Directory Domain (https://go.microsoft.com/fwlink/?LinkId=192570) |
Windows 7 |
Hard-block and cannot be made to work The domain controller operating system is beyond its supported lifecycle. |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Windows 7 and Samba 3 Interoperability (https://go.microsoft.com/fwlink/?LinkId=192568) Unable to Join Windows Server 2008 R2 or Windows 7 Computer to Active Directory Domain (https://go.microsoft.com/fwlink/?LinkId=192570) |
Windows Server 2008 R2 |
Not tested by Windows product groups and therefore not supported. CSS can provide best-effort support, but escalation support or hotfixes are not provided. The domain controller operating system is beyond its supported lifecycle. For more information about outbound trusts between Windows Server 2008 R2 and Windows NT 4 domains, see article 2021766 (https://go.microsoft.com/fwlink/?LinkID=205835). |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Fully tested and supported |
Windows 7 and Samba 3 Interoperability (https://go.microsoft.com/fwlink/?LinkId=192568) Unable to Join Windows Server 2008 R2 or Windows 7 Computer to Active Directory Domain (https://go.microsoft.com/fwlink/?LinkId=192570) |
The following table lists supportability information for client operating systems that interact with domain controllers.
Windows XP, Windows Server 2003, Windows Vista, and Windows 7 client computers are fully compatible with writable Windows Server 2008 and Windows Server 2008 R2 domain controllers. For member-computer interoperability with RODCs, see Known Issues for Deploying RODCs (https://go.microsoft.com/fwlink/?LinkID=164418).
For more information about which versions of Microsoft Exchange Server can interoperate with different versions of Windows, see Exchange Server Supportability Matrix (https://go.microsoft.com/fwlink/?LinkID=165034).
The Group Chat feature in Office Communications Server 2007 R2 does not work in Windows Server 2008 R2 domains. For more information, see article 982020 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=190459), For more information about using Office Communications Server 2007 R2 with domain controllers that have different versions of Windows Server and different domain and forest functional levels, see Supported Active Directory Environments by Office Communications Server Version (https://go.microsoft.com/fwlink/?LinkId=190457).
For a list of applications that are compatible or incompatible with Windows Server 2008, see article 948680 (https://go.microsoft.com/fwlink/?LinkId=184903) in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=184903).
For a list of applications that are compatible or incompatible with Windows Server 2008 R2, see Microsoft Server Applications Supported on Windows Server 2008 R2 (https://go.microsoft.com/fwlink/?LinkId=184918).
For a list of applications that are compatible with RODCs, see Applications That Are Known to Work with RODCs (https://go.microsoft.com/fwlink/?LinkID=133779). Exchange Server requires a writable domain controller; therefore, it does not work with RODCs.
It is not required to upgrade a certification authority (CA) that runs Windows Server 2003 when you upgrade domain controllers that run Windows Server 2003. But Windows Server 2008 and Windows Server 2008 R2 provide many new features and improvements related to CAs. For more information about what is new in Windows Server 2008, see Active Directory Certificate Services Role (https://technet.microsoft.com/en-us/library/cc753254(WS.10).aspx). For more information about what is new in Windows Server 2008 R2, see What's New in Active Directory Certificate Services(https://technet.microsoft.com/en-us/library/dd448537(WS.10).aspx).
For information about how to move a CA from an older server to a new server, see AD CS Migration: Migrating the Certification Authority. For information about how to move a Certificate Server database and log files, see article 238193 (https://go.microsoft.com/fwlink/?LinkId=185023) in the Microsoft Knowledge Base.
VM guests fail to start with error "insufficient system resources" when the AD DS server role is added to a RemoteFX-enabled Windows Server 2008 R2 SP1 Hyper-V host computer. The best practice is to not install the AD DS (domain controller) role on a computer that also hosts the Hyper-V server role. If you must have the Hyper-V and the AD DS roles installed on the same physical computer, do not install RemoteFX, a subcomponent of the Remote Desktop Virtual host.
Windows Vista and Windows Server 2008 and later operating systems use a higher range of ports for outgoing connections than previous versions of Windows. The new default start port is 49152, and the default end port is 65535. If you receive errors indicating that “the endpoint mapper is out of endpoints,” especially after retiring domain controllers that run Windows 2000 or Windows Server 2003, you might need to reconfigure firewalls and routers to use the new default port range. For more information, see article 929851 (https://go.microsoft.com/fwlink/?LinkID=153117).
Read-only Domain Controllers
This section covers hotfixes and known issues that are related to read-only domain controllers (RODCs).
KB 944043: Windows Server 2008 RODC compatibility pack. This set of hotfixes addresses several known issues that affect RODCs. It is also applicable to RODCs that run Windows Server 2008 R2.
KB 2641192: The badPwdCount attribute is not reset to 0 on a Windows Server 2008 R2-based or Windows Server 2008-based PDC when the reset request is sent from an RODC.
KB 983531: You experience a significant delay when you try to log on to an Active Directory site from a computer that is running Windows 7 or Windows Server 2008 R2
Networking and name resolution
This section covers considerations for using IPv6 and hotfixes and known issues for DNS servers that run Windows Server 2008 or Windows Server 2008 R2.
DNS server hotfixes and known issues
The following table lists known issues for DNS servers and how to resolve them, including applicable hotfixes.
Known Issue | How to resolve |
---|---|
Domain controllers that host Active Directory–integrated DNS zones and point to themselves as Preferred DNS servers experience lengthy startup times of 20 minutes or longer and see Event ID 4013 in the DNS log. When you open the DNS snap-in, you might see the following error message: “The Server Win2k8DC could not be contacted. The error was: The server is unavailable. Would you like to add it anyway?” When you open Active Directory Users and Computers, you might see this error message: “Naming information could not be located.” This error occurs when the DNS Server service is waiting for initial synchronization of AD DS to complete, but AD DS initial synchronization cannot complete because DNS records that must be resolved are stored in Active Directory–integrated zones cannot be accessed by the local DNS server. |
Try the following configuration changes to prevent the condition that logs Event ID 4013:
|
Windows Server 2008 DNS servers that are configured to use root hints for name resolution of Internet names can fail to resolve top-level domain names. |
Article 968372 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=190467). |
DNS servers that run Windows Server 2008 R2 have Extension Mechanisms for DNS (EDNS) enabled by default. |
If you notice queries that used to work on DNS servers that run Windows 2000, Windows Server 2003, or Windows Server 2008 fail after those DNS servers are upgraded or replaced with DNS servers that run Windows Server 2008 R2 or you notice that queries that the old DNS servers can resolve cannot be resolved by Windows Server 2008 R2 DNS servers, disable EDNS by using the following command: dnscmd /Config /EnableEDnsProbes 0 If you leave EDNS enabled and a DNS server running Windows Server 2008 R2 receives a “Name Error 3” message from another DNS server running Windows Server 2008 R2, install hotfix 2550719 (https://support.microsoft.com/kb/2550719). |
There are also hotfixes available to resolve other DNS-related problems. For more information, see Verifications that you can make and recommended hotfixes that you can install before you begin. |
Interoperability for IPv6 and AAAA records
This section describes interoperability issues for IPv6 and AAAA resource records for DNS servers that run different versions of Windows Server. For more information about using DNS with IPV4 and IPv6, see Configuring DNS for IPv6/IPv4 Coexistence (https://go.microsoft.com/fwlink/?LinkId=186688).
Operation | Windows Server 2008 R2 | Windows Server 2008 | Windows Server 2003 |
---|---|---|---|
Registers AAAA records |
Yes |
Yes |
Yes |
Replicates AAAA records |
Yes |
Yes |
Yes |
Supports AAAA record type |
Yes |
Yes |
Yes |
Listens on IPv6 network interface |
Yes |
Requires Windows Server 2008 SP2 |
No |
Provides Dnscmd.exe IPv6 support |
Yes |
Yes |
No |
Known issues for upgrades to Windows Server 2008 and Windows Server 2008 R2
Read the following release notes for more information about specific issues that can affect these versions of Windows Server:
Release notes for Windows Server 2008 (https://go.microsoft.com/fwlink/?LinkID=99299)
Release notes for Windows Server 2008 R2 (https://go.microsoft.com/fwlink/?LinkID=139330)
Logoff takes several minutes if there is no LDAP connectivity to the forest root domain
When you log on or log off from a domain with a newly built client computer, you experience delays of about 5 to 10 minutes. This problem appears after you join the computer to an Active Directory domain. This affects computers that run Windows Vista, Windows 7, Windows Server 2008, or Windows Server 2008 R2. The problem is caused by lack of connectivity between the client computer and the forest root domain controllers. For more information about the cause of this problem and the steps to take to resolve it, see article 971198 (https://go.microsoft.com/fwlink/?LinkId=184883) in the Microsoft Knowledge Base.
Windows Server 2008 R2 domain controllers fail to authenticate DES-enabled clients
If you deploy a domain controller that runs Windows Server 2008 R2 into an existing domain that contains Windows Server 2003 and Windows Server 2008 domain controllers and you run a service account that has the Use DES encryption types for this account check box selected, you might see Event ID 16 in the System log of the domain controller that runs Windows Server 2008 R2, even after you enable Data Encryption Standard (DES) encryption for Windows Server 2008 R2 (which is disabled by default). Windows Server 2003 and Windows Server 2008 domain controllers service authentication requests without error.
This problem occurs because Windows Server 2008 R2 domain controllers fail to use a second data structure BLOB that contains DES encryption settings, even though that structure was successfully inbound-replicated by the authenticating Windows Server 2008 R2 domain controller. This problem is fixed on domain controllers that run Windows Server 2008 R2 with SP1.
To resolve this problem on a domain controller that runs Windows Server 2008 R2 without SP1:
Link or modify a Group Policy object (GPO) on the domain controller’s organizational unit (OU) that enables the DES encryption.
For more information, see article 977321 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=177717). Make sure that the policy is configured to enable all encryption types.
Select the Use DES encryption types for this account check box on the SAP Service account in the Active Directory Users and Computers snap-in.
Install the hotfix from article 978055 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=185219) on all domain controllers that run Windows Server 2008 R2 without SP1. You can install the hotfix without removing and reinstalling AD DS on existing domain controllers.
Secure default settings in Windows Server 2008 and Windows Server 2008 R2
Windows Server 2008 and Windows Server 2008 R2 domain controllers have the following secure default settings, compared to Windows 2000 and Windows Server 2003 domain controllers.
Encryption type or policy |
Windows Server 2008 default |
Windows Server 2008 R2 default |
Comment |
AllowNT4Crypto |
Disabled |
Disabled |
Third-party Server Message Block (SMB) clients may be incompatible with the secure default settings on Windows Server 2008 and Windows Server 2008 R2 domain controllers. In all cases, these settings can be relaxed to allow interoperability at the expense of security. For more information, see article 942564 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=164558). |
DES |
Enabled |
Disabled |
Article 977321 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=177717) |
CBT/Extended Protection for Integrated Authentication |
N/A |
Enabled |
See Microsoft Security Advisory (937811) (https://go.microsoft.com/fwlink/?LinkId=164559) and article 976918 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=178251). Review and install the hotfix in article 977073 (https://go.microsoft.com/fwlink/?LinkId=186394) in the Microsoft Knowledge Base as required. |
LMv2 |
Enabled |
Disabled |
Article 976918 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=178251) |
Virtualized domain controllers on Hyper-V™, VMware, and other virtualization software
Regardless of the virtual host software product that you are using, read Running Domain Controllers in Hyper-V (https://go.microsoft.com/fwlink/?LinkID=139651) for special requirements related to running virtualized domain controllers. Specific requirements include the following:
Avoid single points of failure such as having all domain controllers in a domain or forest on the same VM host, or the same SAN or datacenter, and so on.
Do not stop or pause domain controllers.
Do not restore snapshots of domain controller role computers. This action causes an update sequence number (USN) rollback that can result in permanent inconsistencies between domain controller databases.
All physical-to-virtual (P2V) conversions for domain controller role computers should be done in offline mode. System Center Virtual Machine Manager enforces this for Hyper-V. For information about other virtualization software, see the vendor documentation.
Configure virtualized domain controllers to synchronize with a time source in accordance with the recommendations for your hosting software.
For more considerations about running domain controllers in virtual machines, see article 888794 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=141292).
Administration, remote administration, and cross-version administration
The following changes have been made to local and remote administration tools for the Windows Server 2008 and Windows Server 2008 R2 operating systems.
The installation of a server role, such as Active Directory Domain Services, by Server Manager also locally installs all GUI and command-line tools that you can use to administer that role. To install tools locally to manage other server roles, click Add Features in Server Manager.
The GUI and command-line tools that were formerly in the Administrative Tools Pack (ADMINPACK.MSI), Support Tools (SUPPTOOLS.MSI), and Resource Kit tools have been consolidated into a single collection called Remote Server Administration Tools (RSAT), which you can obtain from the Microsoft Download Center and install on client operating systems such as Windows Vista or Windows 7.
As 64-bit hardware and operating systems became more popular, x86-based (32-bit) and x64-based (64-bit) versions of administration tools were released.
Additional steps are required to make the administration tools that RSAT installs appear in the Start menu of Windows Vista computers. For these additional steps, see the following procedure.
To display the administration tools on the Start menu
Right-click Start, and then click Properties.
On the Start Menu tab, click Customize.
In the Customize Start Menu dialog box, scroll down to System administrative tools, and then click Display on the All Programs menu and the Start menu.
Click OK.
As a general rule, the administrative tools only install and run correctly on the operating system versions with which they were released. For example, the Windows Server 2008 administration tools install and run only on Windows Vista client computers and Windows Server 2008 server computers. As another example, if you try to administer Windows Server 2008 R2 DNS servers using The DNS snap-in or Dnscmd.exe from Windows Server 2003, you receive “access is denied” errors.
Administration tools whose files are copied from the server operating system disk will generally not execute on the corresponding client operating system and are not supported. For example, tools that are copied from the Windows Server 2008 operating system disk to Windows Vista will not work. Instead of copying the tools, download the correct version of RSAT for the client computers that you use to administer servers.
For more information, see How to Administer Microsoft Windows Client and Server Computers Locally and Remotely (https://go.microsoft.com/fwlink/?LinkId=177813).
For more information, see Installing Remote Server Administration Tools (https://go.microsoft.com/fwlink/?LinkID=153624).
Configuring the Windows Time service for Windows Server 2008 and Windows Server 2008 R2
Make sure that you have the following domain controller roles configured properly to synchronize the Windows Time service (W32time).
The forest-root primary domain controller (PDC) on a physical computer should synchronize time from a reliable external time source. For more information, see Configure the Windows Time service on the PDC emulator (https://go.microsoft.com/fwlink/?LinkId=91969).
All other domain controllers that are installed on physical hardware or Hyper-V should use the default domain hierarchy (no configuration change required).
For domain controllers running on non-Microsoft virtualization software, consult the vendor.
Windows Server 2008 and Windows Server 2008 R2 domain controllers added time-rollback protection to help prevent domain controllers from adopting bad time. We recommend that you add time-rollback protection on Windows Server 2003 domain controllers and Windows Server 2008 and Windows Server 2008 R2 Hyper-V hosts by using Group Policy, making sure that you have the policy detail fixes in place before you do. For more information, see article 884776 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=178255).
Finally, time on workgroup virtual host and domain-joined virtual host computers should be configured as follows:
For workgroup host computers:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\W32Time\Parameters\TYPE (REG_SZ) = NTP
HKLM\system\CurrentControlSet\Services\W32Time\Parameters\NtpServer (REG_DWORD) = <fully qualified host name of time server, such as time.windows.com>,0x08
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient\SpecialPollInterval (REG_DWORD) = 900 (decimal)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config\MaxPosPhaseCorrection (REG_DWORD): 2a300 (hexadecimal) or 172800 (decimal)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config\MaxNegPhaseCorrection (REG_DWORD): 2a300 (hexadecimal) or 172800 (decimal)
For domain-joined host computers:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32time\Config\MinPollInterval (REG_DWORD): 6 (decimal)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32time\Config\MaxPollInterval (REG_DWORD): 10 (decimal)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config\MaxPosPhaseCorrection (REG_DWORD): 2a300 (hexadecimal) or 172800 (decimal)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config\MaxNegPhaseCorrection (REG_DWORD): 2a300 (hexadecimal) or 172800 (decimal)
Verifications that you can make and recommended hotfixes that you can install before you begin
All domain controllers in the forest should meet the following conditions:
Be online.
Be healthy (Run dcdiag /v to see if there are any problems.)
Have successfully inbound-replicated and outbound-replicated all locally held Active Directory partitions (repadmin /showrepl * /csv viewed in Excel). For more information, see “CSV Format” in Repadmin Requirements, Syntax, and Parameter Descriptions (https://go.microsoft.com/fwlink/?LinkID=147380).
Have successfully inbound-replicated and outbound-replicated SYSVOL.
Metadata for stale or nonexistent domain controllers, or domain controllers that cannot be made to replicate, should be removed from their respective domains. For more information, see Clean Up Server Metadata (https://go.microsoft.com/fwlink/?LinkId=148150).
All domains must be at the Windows 2000 native functional level or higher to run adprep /domainprep. Windows NT 4.0 domain controllers are not permitted in this functional level.
Have sufficient free disk space to accommodate the upgrade.
For more information about disk-space requirements for Windows Server 2008 and Windows Server 2008 R2, see System requirements for installing Windows Server 2008 and Windows Server 2008 R2. The task for administrators is to accurately forecast the immediate and long-term growth for Ntds.dit files on Windows Server 2008 and Windows Server 2008 R2 domain controllers so that hard drives and partitions that host Active Directory files can be sized properly on physical and virtual domain controllers.
Check for incompatibilities with secure defaults in Windows Server 2008 and Windows Server 2008 R2. For more information, see Secure default settings in Windows Server 2008 and Windows Server 2008 R2.
Download the latest service pack and relevant hotfixes that apply to your Active Directory forest before you deploy Windows Server 2008 or Windows Server 2008 R2 domain controllers.
For upgrades to either Windows Server 2008 or Windows Server 2008 R2, create integrated installation media (“slipstream”) by adding the latest service pack and hotfixes for your operating system. As of September 2009, the latest service pack for Windows Server 2008 is Service Pack 2 (SP2). For information about obtaining the latest service pack, see article 968849 in the Microsoft Knowledge base (https://go.microsoft.com/fwlink/?LinkId=164585) and see Installing Windows Server 2008 with Service Pack 2 (https://go.microsoft.com/fwlink/?LinkId=164586). Windows Server 2008 R2 includes updates from Windows Server 2008 SP2. To make sure that you have all of the latest updates, see Windows Update (https://go.microsoft.com/fwlink/?LinkID=47290) or see article 968849 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=164585) for download information.
If you are deploying RODCs, review article 944043 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=122974). Download and install the hotfixes on the Windows computers and scenarios that apply to your computing environment.
For Windows Server 2008 R2: If Active Directory Management Tool (ADMT) 3.1 is installed on Windows Server 2008 computers that are being upgraded in-place to Windows Server 2008 R2, remove ADMT 3.1 before the upgrade; otherwise, it cannot be uninstalled. In addition, ADMT 3.1 cannot be installed on Windows Server 2008 R2 computers.
The following table lists hotfixes for Windows Server 2008. You can install a hotfix individually, or you can install the service pack that includes it.
Description
Microsoft Knowledge Base article
Service pack
Unexpected behavior occurs in the Windows Time service when you enable the Windows Time Service Group Policy setting in Windows Server 2008 or in Windows Vista SP1
961027 (https://go.microsoft.com/fwlink/?LinkId=182336)
Windows Server 2008 SP2
Domain controllers that are configured to use the Japanese language locale
949189 (https://go.microsoft.com/fwlink/?LinkId=164588)
Windows Server 2008 SP2
EFS file access encrypted on a Windows Server 2003 file server upgraded to Windows Server 2008
948690 (https://go.microsoft.com/fwlink/?LinkID=106115)
Not included in any Windows Server 2008 Service Pack
Records on Windows Server 2008 secondary DNS server are deleted after zone transfer
953317 (https://go.microsoft.com/fwlink/?LinkId=164590)
Windows Server 2008 SP2
Use root hints if no forwarders are available
2001154 (https://go.microsoft.com/fwlink/?LinkId=165959)
Setting Locale information in Group Policy Preferences causes Event Log and dependent services to fail. If you change “Regional Option – User Locale – enabled,” the Windows Event Log Service, DNS Server Service, and task Scheduler Service fail to start.
For prevention and resolution, see 951430 (https://go.microsoft.com/fwlink/?LinkId=165960).
To be included in Windows Server 2008 SP3
GPMC Filter fix
949360 (https://go.microsoft.com/fwlink/?LinkID=184908)
Windows Server 2008 SP2
If you use devolution to resolve DNS names (instead of suffix search list), apply the DNS devolution hotfix.
957579 (https://go.microsoft.com/fwlink/?LinkId=178224)
Windows Server 2008 SP2
Group Policy Preferences rerelease
943729 (https://go.microsoft.com/fwlink/?LinkId=164591)
974266 (https://go.microsoft.com/fwlink/?LinkID=165035)
Windows Server 2008 SP2
Synchronize the Directory Services Restore Mode (DSRM) Administrator password with a domain user account
961320 (https://go.microsoft.com/fwlink/?LinkId=177814)
An application that uses Crypt32.dll crashes on a computer that is running Windows Vista or Windows Server 2008
982416 (https://go.microsoft.com/fwlink/?LinkID=196889)
Windows Server 2008 SP3
If you have Windows Server 2008 servers that are running IIS, hosting SSL certs, then you may need to install the hotfix in article 2379016
2379016 (https://go.microsoft.com/fwlink/?LinkId=199533)
Windows Server 2008 SP3
AAAA record of a Windows Server 2008 domain controller is deleted automatically if the domain controller uses an Active Directory–integrated zone and has a Microsoft 6to4 adapter
2408181 (https://go.microsoft.com/fwlink/?LinkId=204910)
Windows Server 2008 SP3
Add Printer Wizard lists published printers in AD DS slowly in Windows Vista or in Windows Server 2008
Windows Vista SP3 or Windows Server 2008 SP3
Note
If you are operating a domain with domain controllers that run Windows Server 2003 and Windows Server 2008, install hotfix 939820 (https://support.microsoft.com/kb/939820).
The following table lists hotfixes for Windows Server 2008 R2.
<table>
<colgroup>
<col style="width: 33%" />
<col style="width: 33%" />
<col style="width: 33%" />
</colgroup>
<tbody>
<tr class="odd">
<td><p>Description</p></td>
<td><p>Microsoft Knowledge Base article</p></td>
<td><p>Comment</p></td>
</tr>
<tr class="even">
<td><p>Windows Server 2008 R2 Dynamic DNS updates to BIND servers log NETLOGON event 5774 with error status 9502</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=178225">977158</a> (https://go.microsoft.com/fwlink/?LinkId=178225)</p></td>
<td><p>Windows Server 2008 R2 SP1</p></td>
</tr>
<tr class="odd">
<td><p>Event ID 1202 logged with status 0x534 if security policy modified</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=165961">974639</a> (https://go.microsoft.com/fwlink/?LinkId=165961)</p></td>
<td><p>Windows Server 2008 R2 SP1</p></td>
</tr>
<tr class="even">
<td><p><strong>TimeZoneKeyName</strong> registry entry name is corrupt on 64-bit upgrades</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=178226">2001086</a> (https://go.microsoft.com/fwlink/?LinkId=178226)</p></td>
<td><p>Occurs only on x64-based server upgrades in Dynamic DST time zones. To see if your servers are affected, click the taskbar clock. If the clock fly-out indicates a time zone problem, click the link to open the date and time control panel.</p></td>
</tr>
<tr class="odd">
<td><p>Event ID 1988 Logged in Directory Service Log after Schema Update</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=185205">2005074</a> (https://go.microsoft.com/fwlink/?LinkId=185205)</p></td>
<td><p>Some deleted objects that are nearing the tombstone lifetime may still exist on the source of a replication agreement and have an attribute added to the partial attribute set of the object that should be replicated out. If the same object was garbage-collected on the target domain controller when it was replicated, the destination domain controller logs Event ID 1988 and possibly Event ID 1388.</p></td>
</tr>
<tr class="even">
<td><p>Windows Server 2008 R2 DNS servers that use root hints are unable to resolve some DNS queries.</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=186576">832223</a> (https://go.microsoft.com/fwlink/?LinkId=186576)</p></td>
<td><p>The KB article describes a workaround. A hotfix is also included in Windows Server 2008 R2 SP1.</p></td>
</tr>
<tr class="odd">
<td><p>Windows Server 2008 R2 domain controllers fail to authenticate DES-enabled clients.</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=185219">article 978055</a> (https://go.microsoft.com/fwlink/?LinkId=185219)</p></td>
<td><p>Windows Server 2008 R2 SP1</p></td>
</tr>
<tr class="even">
<td><p>Digest authentication fails on a Windows XP or Windows Server 2003 member server when authenticating against a Windows Server 2008 R2 domain controller</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=186934">977073</a> (https://go.microsoft.com/fwlink/?LinkId=186934)</p></td>
<td><p>Windows Server 2008 R2 SP1</p></td>
</tr>
<tr class="odd">
<td><p>In Windows Server 2008 R2, the DNS Server service might crash when it handles many concurrent queries that are submitted through the DNS server plug-in interface</p></td>
<td><p><a href="https://go.microsoft.com/fwlink/?linkid=204908">2411958</a> (https://go.microsoft.com/fwlink/?LinkID=204908)</p></td>
<td><p>Windows Server 2008 R2 SP1</p></td>
</tr>
<tr class="even">
<td><p>Slow performance occurs when many user authentication requests are handled in Windows Server 2008 R2</p></td>
<td><p><a href="https://support.microsoft.com/kb/2545833">2545833</a> (https://support.microsoft.com/kb/2545833)</p></td>
<td><p>Windows Server 2008 R2 SP2</p></td>
</tr>
<tr class="odd">
<td><p>Scalability of the I/O performance decreases in Windows Server 2008 R2 if more than 256 GB of physical memory is used</p></td>
<td><p><a href="https://support.microsoft.com/kb/2566205">2566205</a> (https://support.microsoft.com/kb/2566205)</p></td>
<td><p>Windows Server 2008 R2 SP2</p></td>
</tr>
<tr class="even">
<td><p>Tuple index is corrupted in a Windows Server 2008 R2 domain</p></td>
<td><p><a href="https://support.microsoft.com/kb/2566592">2566592</a> (https://support.microsoft.com/kb/2566592)</p></td>
<td><p>Windows Server 2008 R2 SP2</p></td>
</tr>
<tr class="odd">
<td><p>ILM Management Agents and Windows 2008 Active Directory</p></td>
<td><p><a href="https://support.microsoft.com/kb/2018683">2018683</a> (https://support.microsoft.com/kb/2018683)</p></td>
<td><p>N/A</p>
<p>MIIS 2003 and ILM 2007 will work with a forest upgrade to Windows Server 2008 R2 as long as the Active Directory Recycle Bin feature is not enabled. Use ILM 2007 SP1 or FIM 2010 to synchronize operations that involve Active Directory Recycle Bin.</p></td>
</tr>
</tbody>
</table>
If you have a Group Policy central store that is hosted with Windows Server 2008 administrative template (ADMX) files, you may have to upgrade the ADMX files or remove the central store. For more information, see [Windows 7, Windows Server 2008 R2 and the Group Policy Central Store](https://go.microsoft.com/fwlink/?linkid=182337) (https://go.microsoft.com/fwlink/?LinkId=182337).
Run Adprep commands
This section describes how to run the following adprep commands.
Add schema changes using adprep /forestprep
If you are deploying RODCs, run adprep /rodcprep
Run adprep /domainprep /gpprep
If you encounter errors when you run an Adprep command, see Adprep errors.
Add schema changes using adprep /forestprep
Identify the domain controller that holds the schema operations master role (also known as flexible single master operations or FSMO role) and verify that it has inbound-replicated the schema partition since startup:
Run the dcdiag /test:knowsofroleholders command. If the schema role is assigned to a domain controller with a deleted NTDS settings object, follow the steps in article 255504 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=70776) to seize the role to a live domain controller in the forest root domain.
Log on to the schema operations master with an account that has Enterprise Admins, Schema Admins, and Domain Admins credentials in the forest root domain. By default, the built-in administrator account in a forest root domain has these credentials.
On the schema master, run the repadmin /showreps command. If schema master has inbound-replicated the schema partition since startup, continue to the next step. Otherwise, use the replicate now command Dssite.msc to trigger inbound replication of the schema partition to the schema master. (See Force replication over a connection (https://go.microsoft.com/fwlink/?LinkId=164634)). You can also use the repadmin /replicate <name of schema master> <GUID of replication partner> command. The showreps command returns the globally unique identifier (GUID) of all replication partners of the schema master.
Locate the correct version of Adprep for your upgrade:
The Windows Server 2008 installation media contain one version of adprep, Adprep.exe, in the \sources\adprep folder Windows Server 2008 installation disk, that runs on both x86-based and x64-based operations masters.
Windows Server 2008 R2 installation media contain both x86-based (Adprep32.exe) and x64-based (Adprep.exe) versions of adprep in the \support\adprep folder of the Windows Server 2008 R2 installation disk.
Windows Server 2008 and Windows Server 2008 R2 schema updates can be added directly to forests with Windows 2000 Server, Windows Server 2003, or Windows Server 2008 schema versions.
Windows Server 2008 and Windows Server 2008 R2 versions of adprep.exe can be run directly on Windows Server 2000 SP4, Windows Server 2003, Windows Server 2003 R2, and Windows Server 2008 (for Windows Server 2008 R2) operations masters.
If you copy Adprep.exe from the installation media to a local computer or a network share, copy the entire adprep folder and provide the full path to the Adprep.exe file.
Update the forest schema with adprep /forestprep.
While you are still logged on to the console of the schema master with an account that has Enterprise Admins, Schema Admin, and Domain Admin credentials, run the appropriate version of adprep /forestprep from the Windows Server 2008 or Windows Server 2008 R2 installation media. Specify the full path to Adprep.exe to prevent running another version of Adprep that may be present in the PATH environment variable.
For example, if you are running the Windows Server 2008 version of Adprep from a DVD drive or network path that is assigned the drive letter D:, the command to run is as follows:
>D:\sources\adprep\adprep /forestprep
The syntax for running Windows Server 2008 R2 Adprep on a 64-bit schema master is as follows:
<dvd drive letter>:\support\adprep\adprep /forestprep
The syntax for running Windows Server 2008 R2 Adprep on a 32-bit, x86-based schema master is as follows:
D:\support\adprep\adprep32 /forestprep
For a list of operations that Windows Server 2008 adprep /forestprep performs, see Windows Server 2008: Forest-Wide Updates (https://go.microsoft.com/fwlink/?LinkId=164636).
For a list of operations that Windows Server 2008 R2 adprep /forestprep performs , see Windows Server 2008 R2: Forest-Wide Updates (https://go.microsoft.com/fwlink/?LinkId=164637).
If you encounter errors, see “Forestprep errors” later in this topic.
If you are deploying RODCs, run adprep /rodcprep
You do not have to run Windows Server 2008 R2 adprep /rodcprep in a forest that has already been prepared with Windows Server 2008 adprep /rodcprep. Proceed to adprep /domainprep.
If you are deploying RODCs for the first time:
While still logged on with Enterprise Admins credentials on the schema master, run adprep /rodcprep.
Note
Rodcprep will run on any member computer or domain controller in the forest if you are logged on with Enterprise Admin credentials. You can run adprep /rodcprep before or after adprep /domainprep. We recommend running adprep /rodcprep on the schema master immediately after adprep /forestprep as a matter of convenience because that operation also requires Enterprise Admins credentials.
For Windows Server 2008 Rodcprep, specify the full path to Adprep. For example, if the DVD or network path is assigned drive D:, run the following command:
c:\windows >D:\sources\adprep\adprep /rodcprep
For Windows Server 2008 R2:
If the computer where you run Rodcprep is a 64-bit computer, run the following command:
D:\support\adprep\adprep /rodcprep
If the computer where you run Rodcprep is a 32-bit computer, run the following command:
D:\support\adprep\adprep32 /rodcprep
If you encounter errors, see “Rodcprep errors” later in this topic.
Before you deploy RODCs, install the RODC compatibility pack on computers that Windows XP or Windows Server 2003 as needed. For more information, see article 944043 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=122974).
Run adprep /domainprep /gpprep
For each domain that you intend to add Windows Server 2008 or Windows Server 2008 R2 domain controllers to:
Run netdom query fsmo or dcdiag /test:<name of FSMO test> to identify the infrastructure operations master.
If operations master roles are assigned to deleted or offline domain controllers, transfer or seize the roles as required.
Log on to the infrastructure master with an account that has Domain Admins credentials.
Run Windows Server 2008 adprep /domainprep /gpprep from the Windows Server 2008 operating system disk using the following syntax:
Note
You do not have to add the /gpprep parameter in the following command if you already ran it for Windows Server 2003.
<drive>:\<path>\adprep /domainprep /gpprep
For example, if the DVD or network path is assigned drive D, use the following syntax:
D:\sources\adprep\adprep /domainprep /gpprep
For Windows Server 2008 R2:
If the infrastructure master is 64-bit, use the following syntax:
D:\support\adprep\adprep /domainprep /gpprep
If the infrastructure master is 32-bit, use the following syntax:
D:\support\adprep\adprep32 /domainprep /gpprep
If you encounter errors, see “Domainprep errors” later in this topic
Upgrade domain controllers
For background information about which types of operating systems and domain controllers can be upgraded, see Supported in-place upgrade paths. This section includes the following topics:
Upgrading and promoting new domain controllers into an existing domain
Post-installation tasks
Fixes to install after AD DS installation
Upgrading and promoting new domain controllers into an existing domain
Complete the following steps if you are performing either of these in-place upgrades:
Upgrading to Windows Server 2008 or Windows Server 2008 R2 from Windows Server 2003 domain controllers
Upgrading to Windows Server 2008 R2 from Windows Server 2008 or Windows Server 2003 or domain controllers
If you have the Japanese language locale installed on Windows Server 2003 domain controllers that are being upgraded in place to Windows Server 2008, read and comply with article 949189 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=164588).
If the Active Directory Migration Tool (ADMT) version 3.1 is installed on a Windows Server 2003 or Windows Server 2008 domain controller that is being upgraded to Windows Server 2008 R2, uninstall ADMT 3.1 before the upgrade.
When promoting new domain controllers, make sure that object information about the newly promoted domain controllers (the computer account in the domain partition and the NTDS Settings object in the configuration partition) has outbound replicated to a sufficient number of domain controllers that are remaining in the forest before you retire the only domain controller in the forest that has that object information. For example, if you promote DC2 and use DC1 as the helper domain controller, then make sure that DC1 has outbound replicated object information about DC2 to other domain controllers before you retire DC1. This is particularly an issue where the helper domain controllers used by newly promoted domain controllers are rapidly demoted before outbound reapplication takes place.
Run <dvd or network path>:\setup.exe.
Read article 942564 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=164558) and consider the right setting for the AllowNT4Cryto policy for your environment.
If dcpromo.exe fails, see Dcpromo errors.
If you have remotely encrypted Encrypting File System (EFS) files on Windows Server 2003 computers that are being upgraded in place to Windows Server 2008, read and comply with article 948690 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=106115). This problem does not apply to domain controllers that are upgraded to Windows Server 2008 R2.
Consider installing the following fixes after the in-place upgrade unless they are integrated into your installation media:
If you are installing Windows Server 2008, install Service Pack 2 (SP2). Windows Server 2008 R2 includes Windows Server 2008 SP2 fixes.
If you are using Group Policy Preferences on Windows Vista or Windows Server 2008 computers, download the July 2009 update to article 943729 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=164591).
Download the fix for a Group Policy Management Console (GPMC) filter bug in article 949360 (https://go.microsoft.com/fwlink/?LinkID=184908) in the Microsoft Knowledge Base.
If you use devolution (as opposed to suffix search lists) to resolve DNS queries for single-label and non-fully qualified DNS names, download the DNS devolution fix. See article 957579 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=166140).
Complete the following steps if you are performing an in-place upgrade of Windows Server 2008 or Windows Server 2008 R2 writable domain controllers into existing Windows 2000 Server, Windows Server 2003 or Windows Server 2008 domains:
Verify that the target domain is at the Windows 2000 native domain functional level or higher.
If you are promoting Windows Server 2008 domain controllers that are configured to use the Japanese language, read and comply with article 949189 in the Microsoft Knowledge base (https://go.microsoft.com/fwlink/?LinkID=164588). The hotfix should be installed immediately after promotion and before the first boot into normal mode.
From the Windows Start menu, run Dcpromo.exe (or install the Active Directory Domain Services Role in Server Manager, and then run Dcpromo).
When the AllowNT4Crytpo page appears, read article 942564 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=164558) consider the right setting for AllowNT4Cryto for your environment.
If you encounter an error, see the list of Dcpromo errors at the end of this topic.
Do the following if you are performing an in-place upgrade of Windows Server 2008 RODCs into existing Windows Server 2003 domains, Windows Server 2008 domains, or domains that have a mix of those operating systems:
If the option to install RODC is not available in Dcpromo, verify that the forest functional level is Windows Server 2003 or higher.
If the option to install RODC is not available and the error message indicates that there is no Windows Server 2008 in the domain, verify that a Windows Server 2008 domain controller exists in the domain and that it is accessible on the network to the RODC that you are promoting.
If an error message indicates that access is denied, see the Microsoft Knowledge Base.
Post-installation tasks
For all domain controllers:
Configure the forest root PDC with an external time source. For more information, see Configure the forest root PDC with an external time source (https://go.microsoft.com/fwlink/?LinkId=91969).
Enable delete protection on organizational units (OUs) and other strategic containers to prevent accidental deletions.
Make a system state backup of upgraded and newly promoted domain controllers. If you promoted the first domain controller in a new domain and do not yet have additional domain controllers, making a system state backup is more important for recovering accidental deletions. For more information, see AD DS Backup and Recovery Step-by-Step Guide (https://go.microsoft.com/fwlink/?LinkId=190448).
Use only Active Directory–aware backup applications to restore domain controllers or roll back the contents of AD DS. Restoring snapshots that were created by imaging software is not supported on domain controllers.
Fixes to install after AD DS installation
After installation of AD DS, install the following hotfixes.
Note
It is impossible to provide a complete list of hotfixes. The following is a list of hotfixes that are available as of October 2010 that focus on the AD DS and DNS Server roles.
Hotfix | To apply the hotfix for Windows Server 2008 | To apply the hotfix for Windows Server 2008 R2 |
---|---|---|
Article 949189 (https://go.microsoft.com/fwlink/?LinkID=164588): Japanese Language Locale |
Install Article 949189 or Windows Server 2008 SP2. |
Not applicable |
Article 949360 (https://go.microsoft.com/fwlink/?LinkId=184908): GPMC filter bug |
Install MSKB 949360 or Windows Server 2008 SP2. |
Not applicable |
Article 951191 (https://go.microsoft.com/fwlink/?LinkId=184906): KERB5KDC_ERR_C_PRINICPAL_UNKNOWN error |
Install MSKB 951191 or Windows Server 2008 SP2. |
Not applicable |
Article 943729 (https://go.microsoft.com/fwlink/?LinkID=164591): GPP rerelease |
Install MSKB 943729 or Windows Server 2008 SP3 when available. |
Not applicable |
Article 957579 (https://go.microsoft.com/fwlink/?LinkId=184907): DNS devolution fix |
Install MSKB 957579 or Windows Server 2008 SP3 when available. |
Not applicable |
Article 971438 (https://go.microsoft.com/fwlink/?LinkId=185193): A GPO is not applied to a computer that is a member of a nested group |
Install MSKB 971438 or Windows Server 2008 SP3 when available. |
Not applicable |
Article 981370 (https://go.microsoft.com/fwlink/?LinkId=206168):The DNS Server service on an RODC does not respond to DNS queries for several minutes if the link to some RWDCs breaks in Windows Server 2008 |
Install MSKB 981370 or Windows Server 2008 SP3 when available. |
Not applicable |
Article 976494 (https://go.microsoft.com/fwlink/?LinkId=206174):Error 1789 when you use the LookupAccountName function on a computer that is running Windows 7 or Windows Server 2008 R2 |
Not applicable |
Install MSKB 976494 or Windows Server 2008 R2 SP1 when available. |
Article 978277 (https://go.microsoft.com/fwlink/?LinkId=184911): The specified account does not exist |
Not applicable |
Install MSKB 978277 or Windows Server 2008 R2 SP1 when available. |
Article 978387 (https://go.microsoft.com/fwlink/?LinkId=184915): Dcdiag fails with error code 0x621 |
Not applicable |
Install MSKB 978387 or Windows Server 2008 R2 SP1 when available. |
Article 978516 (https://go.microsoft.com/fwlink/?LinkId=185190): Significant delays when you read the same set of files several times |
Not applicable |
Install MSKB 978516 or Windows Server 2008 R2 SP1 when available. |
Article 978837 (https://go.microsoft.com/fwlink/?LinkId=185191): Group Policy Management Editor window crashes when you apply some changes for NRPT policy settings |
Not applicable |
Install MSKB 978837 or Windows Server 2008 R2 SP1 when available. |
Article 2309290 (https://go.microsoft.com/fwlink/?LinkId=204904): The DNS Server service does not respond to multi-label name resolution request correctly when background zone loading occurs in Windows Server 2008 R2 |
Not applicable |
Install MSKB 2309290 or Windows Server 2008 R2 SP1 when available. |
Article 2413670 (https://go.microsoft.com/fwlink/?LinkId=214821) Events 1659, 1481, and 1173 are recorded in the Directory Service event log on Windows Server 2008 R2-based domain controllers after you remove Active Directory Domain Services from the last domain controller in a tree root domain |
Not applicable |
Install MSKB 2413670 or Windows Server 2008 R2 SP2 when available. |
Article 983534 (https://go.microsoft.com/fwlink/?LinkId=215717) Performance of the DNS Server service keeps decreasing under a heavy load situation in Windows Server 2008 R2 |
Not applicable |
Install MSKB 983534 or Windows Server 2008 R2 SP2 when available. |
Article 2522461 Filtering does not work in the DNS Manager snap-in when you reverse lookup DNS zones to filter records in Windows Server 2008 R2 |
Not applicable |
Install MSKB 2522461 or Windows Server 2008 R2 SP2 when available. |
Article 2548145 The size of the Active Directory increases rapidly on a Windows Server 2008 R2-based domain controller that hosts the DNS Server role |
Not applicable |
Install MSKB 2548145 or Windows Server 2008 R2 SP2 when available. |
Article 2520155 DNS Host record of a computer is deleted after you change the DNS server assignment |
Install MSKB 2520155 or Vista SP3 or Windows Server 2008 SP3 when available. |
Install MSKB 2520155 or Windows 7 SP2 or Windows Server 2008 R2 SP2 when available. |
Articles 2499016 and 2518874 The Windows Event Log service may crash |
Install MSKB 2518874 or Vista SP3 or Windows Server 2008 SP3 when available. |
Install MSKB 2499016 or Windows 7 SP2 or Windows Server 2008 R2 SP2 when available. |
Article 2457402 You experience delays with an application or service that uses NTDSA APIs for passing changes from RWDC data centers to RODC data centers |
Not applicable |
Install MSKB 2457402 or Windows Server 2008 R2 SP2 when available. Install the hotfix on the RODC. |
Article 2413670 Events 1659, 1481, and 1173 are recorded in the Directory Service event log on Windows Server 2008 R2-based domain controllers after you remove Active Directory Domain Services from the last domain controller in a tree root domain |
Not Applicable |
Install MSKB 2413670 or Windows Server 2008 R2 SP2 when available. |
For RODCs:
If you are deploying RODCs, install the hotfix in article 953392 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=150337) on all Windows Server 2008 writable domain controllers. This fix is not required on Windows Server 2008 R2 writable domain controllers.
Read article 944043 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=122974), and install the corrective fixes on the Windows client and server computers that are affected by the scenarios that are listed in the Knowledge Base article.
Troubleshooting errors
This section describes errors in Adprep.exe and Dcpromo.exe. If you encounter an error that is not covered, search site:Microsoft.com: “error description” or post your problem to the following community sites:
Directory Services (https://go.microsoft.com/fwlink/?LinkId=166141)
Discussions in microsoft.public.windows.server.active_directory (https://go.microsoft.com/fwlink/?LinkId=166142)
Adprep errors
These sections describe errors for the forestprep, domainprep, and rodcprep commands.
Forestprep errors
If an error message indicates that the schema operations master is assigned to a deleted domain controller, see the Microsoft Knowledge Base.
If the error message says “Adprep was unable to extend the schema” or “Adprep failed to verify whether the schema master has completed a replication cycle after last reboot,” verify that the schema master has inbound-replicated the schema partition since the reboot. See Force a replication event with all partners in Forcing Replication (https://go.microsoft.com/fwlink/?LinkId=164668), and run the repadmin /syncall command.
If the error message says “The callback function failed,” see Adprep was unable to complete because the call back function failed in Running Adprep.exe (https://go.microsoft.com/fwlink/?LinkId=164669).
If the error message says “There is a schema conflict with Exchange 2000. The schema is not upgraded.”, see article 314649 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=166190).
If the error message says ”An attribute with the same link identifier already exists,” see article 969307 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=164670).
For all other error messages, run a query for the error message that is enclosed in quotation marks at Microsoft Help and Support (https://go.microsoft.com/fwlink/?LinkID=56290).
Domainprep errors
If the error message says “Adprep detected that the domain is not in native mode,” see Raise the domain functional level (https://go.microsoft.com/fwlink/?LinkID=141249).
If the error message indicates that the callback function failed, see Adprep was unable to complete because the call back function failed in Running Adprep.exe (https://go.microsoft.com/fwlink/?LinkID=164669).
For all other error messages, run a query for the error message that is enclosed in quotation marks at Microsoft Help and Support (https://go.microsoft.com/fwlink/?LinkID=56290).
Rodcprep errors
If Rodcprep fails with the error message “Adprep could not contact a replica for partition <distinguished name for the forest-wide or domain-wide DNS application partition>” that is documented in article 949257 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkID=140285), run the Fixfsmo.vbs script in the same article, and then rerun Rodcprep until it runs successfully.
For all other error messages, run a query for the error message that is enclosed in quotation marks at Microsoft Help and Support (https://go.microsoft.com/fwlink/?LinkID=56290).
Dcpromo errors
If the upgrade rolls back without any onscreen error or recorded error in a debug log, verify that you have sufficient free disk space on the volumes that are hosting %systemdrive, Ntds.dit, and SYSVOL.
If an error message says "To install a domain controller into this Active Directory forest, you must first prepare the forest using ""adprep /forestprep""… ", verify that /forestprep has been run and that the helper domain controller has inbound-replicated /forestprep changes. For more information, see Running adprep.exe (https://go.microsoft.com/fwlink/?LinkID=142597).
If an error message says "To install a domain controller into this Active Directory domain, you must first prepare the forest using ""adprep /domainprep""…” and verify that /domainprep has been run and that the helper domain controller has inbound-replicated /domainprep changes. For more information, see Running adprep.exe (https://go.microsoft.com/fwlink/?LinkID=142597).
If an error message says:
The operation failed because: The attempt to join this computer to the <target DNS domain> failed. “The specified user already exists.”
The cause is that the computer being promoted has identified a previously promoted computer account in the target domain with the same host name.
To resolve this error:
If computer being promoted is replacing a previously demoted domain controller with the same computer name, verify that metadata for demoted domain controller is removed from AD DS, and retry the promotion. For more information, see Cleaning metadata of removed writable domain controllers.
If then error persists, review the %systemroot%\debug\DCPROMOUI.LOG to identify the name of the replication source domain controller that is being used by domain controller being promoted.
Verify that the replication source domain controller has inbound replicated the removal of the conflicting domain controller account. Failure of the removal to replicate to the source domain controller could be caused by replication failure or replication latency.
The error can have other root causes. For more information, see the following articles in the Microsoft Knowledge Base:
If an error message says:
“You cannot install an additional domain controller at this time because the RID master <domain controller name> is offline” or “You will not be able to install a writable domain controller at this time because the RID master <domain controller name> is offline. Do you want to continue?”
The cause is that Dcpromo attempts to identify the owner of the RID Master role by reading the fsmoRoleOwner attribute of CN=RID Manager$,CN=System,DC=<domain> and extracting the dnsHostName of the RID Master. Dcpromo then tries to initiate an LDAP connection over port 389 to the RID Master Server using its fully qualified computer name. If the LDAP connection fails for any reason, Dcpromo determines the RID Master to be offline. Initial sync failures by the RID FSMO should not cause this error.
Run repadmin /showattr fsmo_rid: ncobj:domain: /filter:(objectclass=ridmanager) /subtree and either netdom query fsmo or dcdiag /test:<name of FSMO test>
The output of the repadmin command will include the fSMORoleOwner. If the fSMORoleOwner distinguished name path that is returned from the command in the previous step is mangled or assigned to a deleted domain controller, remove the metadata for that domain controller and seize the role to a live domain controller that hosts a writable copy of the domain partition.
Verify that RID master role is assigned to a live domain controller that has successfully inbound-replicated the domain directory partition since it last restarted from at least one other domain controller in the same domain.
If the current role holder is the only live domain controller in the domain but its copy of Active Directory or AD DS refers to domain controllers that no longer exist, remove the stale metadata for those domain controllers, restart the live domain controller, and try promotion again.
For more information, see article 2009385 in the Microsoft Knowledge Base.
If a warning indicates that there is no static IP address configured for an IPv6 address on a Windows Server 2008 domain controller, click Yes and complete the wizard.
If the check box for installing the DNS Server role is unavailable, either the Active Directory domain has a single-label DNS name or Dcpromo.exe cannot discover another Microsoft DNS server in the domain.
If you see the error message “A delegation for this DNS Server cannot be created because the authoritative parent zone cannot be found…,” see Known Issues for Installing and Removing AD DS (https://go.microsoft.com/fwlink/?LinkId=164418).
If you see the error message “The DNS zone could not be created...," see the Microsoft Knowledge Base.
If Event ID 16651 appears in the Directory Services log, see article 316201 (https://go.microsoft.com/fwlink/?LinkId=184855) in the Microsoft Knowledge Base.
If the system is unable to share SYSVOL, see the Microsoft Knowledge Base.
If Dcpromo fails with an error message that says “Failed to modify the necessary properties for the machine account. Access is denied,” make sure that administrators are granted the Enable computer and user accounts to be trusted for delegation permission in Default Domain Controllers Policy and that the policy has been linked to the Domain Controllers OU. Also make sure that the helper domain controller’s machine account resides in the Domain Controllers OU and that it has successfully applied policy. For more information, see article 232070 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=166198).
If Dcpromo fails with an error message that says “Active Directory could not create the NTDS Settings object for this domain controller,” see the Microsoft Knowledge Base.
In the domain controller is multihomed, disable host (A) resource record registration by network adapters that are not available to calls on the production network.
In the domain controller is multihomed and a network cable is not attached to a network adapter, disable unused network adapters to prevent them from registering host (A) resource records for APIPA assigned addresses (169.254.*.*) that can never be resolved by clients.
You should also enable DNS scavenging and aging. For more information, see Enable Aging and Scavenging for DNS (https://go.microsoft.com/fwlink/?LinkId=184877).