Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Moey
Oct 22, 2010

I LIKE TO MOVE IT

dox posted:

I'm truly shocked this works for you... I would never recommend doing this, or really anything with OneDrive to anyone.

But its a Pro-tip damnit.

Adbot
ADBOT LOVES YOU

Dans Macabre
Apr 24, 2004


What's the good way to map network drives via group policy?

I have usually done it by setting up one GPO per security group, and if users are in that group they get the lettered drive mapped. However I have seen in a couple of environments where there is just one GPO for department drive mappings, and within that GPO various drives are set with item-level targeting to the security group. I feel like the second one is more difficult to manage. Am I wrong?

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

We give everyone in the company the same drive mappings and deal with access via permissions.

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

Tab8715 posted:

Curious, what's everyone experience with modifying intra/inter AD Replication timing?

I've asked a few a people and the overwhelming response I've got is ":aaa: that will use a lot of bandwidth!" and I've replied well how much exactly?

The kicker is no one is able to give me specifics and I'm really pushing towards just putting down 5 minutes for everything because it seems like a good number and there's nothing bandwidth intensive using our intra-site links.

Thoughts?

Tony's response has lots of good information in it. Wanted to touch on a few things as well


The bandwidth thing isn't much of an issue on modern links. Even some of the current MS documentation still touches on sites that may have 64K ISDN or 256Kb leased lines and poo poo. If you're on any kind of remotely decent connection bandwidth between DC's isn't worth thinking about. Now if you have a DC in outer loving Mongolia on a 33.6K dial up connection, yeah, it's something to think about. It's mostly a holdover from a time when WAN connections were slow and very very expensive.

Anyway, with that being said, it is technically possible to set a link to immediate replication for all AD changes (and I have done it in my environment for a few site links), but I would avoid doing it unless you have a really really good reason to do so. Also certain types of AD notifications don't wait for the standard change notification time period (15 minutes). Certain AD changes like password changes, account lockout events, those bypass the standard notification period.

So if you have an actual legit reason to look into this more, you can do it.

Internet Explorer
Jun 1, 2005





Tony Montana posted:

Give me an example of your implementation of roaming profiles. I've never seen it work right, and I've seen a lot of troubleshooting lost on it.

The wiki page has a list of common dramas, and there are plenty more than what is listed there.

VDI is the more modern approach, but even then.. Windows is a client rich architecture. It was a conscious decision in the creation of the OS, there was a point where they thought shall we just say gently caress it and make IE the OS and write all the apps in Java and then it runs on anything, anywhere. Things like 365 are coming full circle now, with the power of HTML5 and modern computers being able to churn complex webcode.. but Windows will offer a richness (which means resources, libraries, things developers can use to make fast and slick applications) that webapps can't. So when you're virtualising the desktop, can't we just do whatever you're going to do in a webapp with cloud storage anyway?

As for 'worrying about what is on people's desktops'.. that's why you redirect and have professional staff.. which is usually what enterprise means. We just dont give a poo poo about what's on someone's desktop.. it's part of their job to keep their work in a safe place. If they lose data because they're dumb, we just articulate all the nice infrastructure and policies and documentation in place for not dumb people and then it's just not our problem anymore. Don't get caught worrying about what every user might do with their work - your job is just to provide them the means to work properly and if they set it all on fire that's not your fault.

I'm going to put about as much effort in as a Wikipedia link (seriously a Wikipedia link for pros/cons of an IT technology?). Roaming Profiles work just fine. It's not the year 2000 anymore. Once the world figured out that you need to use Folder Redirection with your Roaming Profiles things got a lot better. Add v2 profiles and it works just fine and is better than the alternative. If you have needs for something more than that you have options like AppSense Environment Manager, Citrix Profile Management, or Microsoft User Experience Virtualization.

The second paragraph about the power of Web2.0 confuses me and I'll just pass on that.

Your third paragraph is just lazy IT. "we just don't give a poo poo about what's on someone's desktop... it's part of their [user's] job to keep their work in a safe place." Yeah, welcome to the year 2000, please store all files in your Home Drive. :allears:

Zero VGS posted:

As everyone said, AppData can gently caress up a lot of things, it was redirected at one of my previous places and it would do all sorts of crazy poo poo, such as if someone was logged into two computers at once, Firefox would refuse to open on the second computer because it was "already in use", among other anomalies.

Pro-tip, if you have Office 365, each licensed used gets 1tb of OneDrive storage. Assuming none of your individuals hard drives are larger than 1tb, what you can do is install OneDrive for Biz, reboot, go into the user profile folder, highlight "Desktop, Documents, Pictures, Videos" etc, except AppData, then drag them all into the OneDrive for Business folder. Now every file the user has is automatically backed up the moment is it created or rewritten, and they can look up the complete version history on the O365 portal. I have 500+ users set up this way and it's great.

Word/Excel/Powerpoint save their files to OneDrive for Biz by default, but this covers absolutely everything doc on their PC, with the sole exceptions of Outlook Signatures and Sticky Notes which Microsoft stupidly buries in App Data.

Plus, if you ever have to reimage their PC or give them a new one, just reinstall OneDrive for Biz, repeat the folder drags, and poof the Desktop is back. It's like a ghetto redirection. Sharepoint which OneDrive for Biz runs on can sometimes have weird sync issues but I'll take it to being responsible for a file server any day.

This is just about the worst loving idea I've ever heard. Ignoring everything terrible about it, you seriously went to 500+ users and dragged all the "Desktop, Documents, Pictures, Videos, etc" into OneDrive? Are you kidding me? And what happens when that breaks for all 500+ users at once because of some dumb Windows or OneDrive patch?

Some of you people are the IT guys I want to murder.

Matt Zerella
Oct 7, 2002

Norris'es are back baby. It's good again. Awoouu (fox Howl)
While we're on the subject of cloud storage, how do you guys give access to users files remotely?

Our company want's to be more mobile and I have no idea where to start. Ideally it would just kind of replicate what we have on our servers.

Zero VGS
Aug 16, 2002
ASK ME ABOUT HOW HUMAN LIVES THAT MADE VIDEO GAME CONTROLLERS ARE WORTH MORE
Lipstick Apathy

dox posted:

I'm truly shocked this works for you... I would never recommend doing this, or really anything with OneDrive to anyone.

To be fair, OneDrive for Business is actually Sharepoint with a sync client. The files are hosted on Sharepoint. It's not really like the consumer OneDrive. We already trust our department shares to it so why not?

Internet Explorer posted:

This is just about the worst loving idea I've ever heard. Ignoring everything terrible about it, you seriously went to 500+ users and dragged all the "Desktop, Documents, Pictures, Videos, etc" into OneDrive? Are you kidding me? And what happens when that breaks for all 500+ users at once because of some dumb Windows or OneDrive patch?

Well, I did the 200 users when I first got there then we made the redirection part of provisioning new PCs as we scaled up another 300. But a Windows or OneDrive patch wouldn't:

a) Remove any of the files from the "%userprofile%\OneDrive for Business" folder
b) Delete the files off Sharepoint
c) If by some insanity it did, there's a Sharepoint recycle bin and second stage recycle bin

I think you're overreacting a bit. It's been fine for a year and a half across Win7, 8, and 10. gently caress, I even used the automatic sync and version history to recover every file for a guy who managed to get his whole PC Cryptolocker'ed. Best part is if you have even the most basic O365 tier then it's free for the whole organization and it's set-it-and-forget it, 30 seconds to set up for each user.

LmaoTheKid posted:

While we're on the subject of cloud storage, how do you guys give access to users files remotely?

If you go my route, the user just logs into portal.office.com from anything, then click the OneDrive tile, and they have all their files in their original folder structure. They can for instance browse to their desktop, open up an Excel file in the Excel Online web browser app, edit it on their iPad, come back to their desk in the morning and it has synced itself back.

Zero VGS fucked around with this message at 04:40 on Oct 9, 2015

Tony Montana
Aug 6, 2005

by FactsAreUseless

Internet Explorer posted:

I'm going to put about as much effort in as a Wikipedia link (seriously a Wikipedia link for pros/cons of an IT technology?). Roaming Profiles work just fine. It's not the year 2000 anymore. Once the world figured out that you need to use Folder Redirection with your Roaming Profiles things got a lot better. Add v2 profiles and it works just fine and is better than the alternative. If you have needs for something more than that you have options like AppSense Environment Manager, Citrix Profile Management, or Microsoft User Experience Virtualization.

The second paragraph about the power of Web2.0 confuses me and I'll just pass on that.

Your third paragraph is just lazy IT. "we just don't give a poo poo about what's on someone's desktop... it's part of their [user's] job to keep their work in a safe place." Yeah, welcome to the year 2000, please store all files in your Home Drive. :allears:

Hang on.. Roaming Profiles.. I bet you're the guy..

Yeah, you're the guy that said working for a major vendor is a mark against you. It's like trying to explain colour to a blind man, I'm sorry but you just have no frame of reference and I'm wasting my time.

NevergirlsOFFICIAL posted:

What's the good way to map network drives via group policy?

I have usually done it by setting up one GPO per security group, and if users are in that group they get the lettered drive mapped. However I have seen in a couple of environments where there is just one GPO for department drive mappings, and within that GPO various drives are set with item-level targeting to the security group. I feel like the second one is more difficult to manage. Am I wrong?

GPO Preferences. You can tie maps to sec groups or a number of things, whatever makes more business sense. Depends on the GPO structure and strategy, some places like everything in nicely named sec groups so low level staff can add and remove (or even managers with a delegated ADUC console). But if helpdesk is already filling in the Department field with a new hire and it's accurate, then why add another sec group that needs to be managed? It doesn't have to be one sec group per drive either.. but if your shares are DFS then just end up with something that takes the least administrative effort, is the most automated and the most robust. A mix is fine too, perhaps that Finance-Restricted sec group should be provisioned in a different way that the general drive.

GreenNight posted:

We give everyone in the company the same drive mappings and deal with access via permissions.

Depends on the size of the network. If you gave everyone every drive in some of the places I've worked you either run out of letters or use a good percentage of them.

Tony Montana fucked around with this message at 07:57 on Oct 9, 2015

Internet Explorer
Jun 1, 2005





Tony Montana posted:

Hang on.. Roaming Profiles.. I bet you're the guy..

Yeah, you're the guy that said working for a major vendor is a mark against you. It's like trying to explain colour to a blind man, I'm sorry but you just have no frame of reference and I'm wasting my time.

Yeah, I am definitely that guy and you further prove my point with such gems as a Wikipedia link of "drawbacks" in a technical discussion and "who cares about user files, let God sort it out." Don't exert yourself with all that effort.

Internet Explorer
Jun 1, 2005





Honestly I'm just still laughing at your cloud apps and Roaming Profiles = "users should out things in the right places!" responses. Both show you have no idea what you're talking about. And you totally missed the low hanging fruit about Microsoft UEV, no one uses that poo poo. It's garbage.

wyoak
Feb 14, 2005

a glass case of emotion

Fallen Rib
If you've got remote users using Windows, DirectAccess is goddamn awesome for whatever ails you.

I've always tried to keep it simple as far as shares - one root with directories for each major department, everyone maps to the root. That way S: is always S:. Access-based enumeration or not. Breaks down if you have too many departments obviously.

wyoak fucked around with this message at 17:24 on Oct 9, 2015

Maneki Neko
Oct 27, 2000

wyoak posted:

If you've got remote users using Windows, DirectAccess is goddamn awesome for whatever ails you.

I've always tried to keep it simple as far as shares - one root with directories for each major department, everyone maps to the root. That way S: is always S:. Access-based enumeration or not. Breaks down if you have too many departments obviously.

DirectAccess also seems to be going the way of the dinosaur, according to Microsoft program managers. At Ignite I talked to people responsible for remote access stuff in windows server and they said while they aren't killing off DirectAccess, they aren't dumping a ton more resources into it either. I guess we'll see how things look in server 2016

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

Probably part of their push to make everyone use their cloud tools poor choice of words. Encourage cloud service adoption in the enterprise space. Yeah, that sounds better.

Who needs DA when you have OneDrive for business? PC Management? Oh well how about some InTune licenses? On premise hosted business apps? How about Azure AD Premium, and setting up some Application Proxies until you move them to Azure or get the SaaS version?

wyoak
Feb 14, 2005

a glass case of emotion

Fallen Rib

Maneki Neko posted:

DirectAccess also seems to be going the way of the dinosaur, according to Microsoft program managers. At Ignite I talked to people responsible for remote access stuff in windows server and they said while they aren't killing off DirectAccess, they aren't dumping a ton more resources into it either. I guess we'll see how things look in server 2016
Well that's a bummer - it is kind of weird to setup but once it's running it's completely transparent to the user and lets me manage them wherever they are. I did have the feeling it never really took off though so it's not a total surprise.

Maneki Neko
Oct 27, 2000

skipdogg posted:

Probably part of their push to make everyone use their cloud tools poor choice of words. Encourage cloud service adoption in the enterprise space. Yeah, that sounds better.

Who needs DA when you have OneDrive for business? PC Management? Oh well how about some InTune licenses? On premise hosted business apps? How about Azure AD Premium, and setting up some Application Proxies until you move them to Azure or get the SaaS version?

I just kind of got the sense they were pushing more towards making VPN experience which many different vendors can hook into a lot better for everyone, since yeah, probably not a huge adoption rate compared to folks with existing VPN setups.

Thanks Ants
May 21, 2004

#essereFerrari


The issue I found with DirectAccess was that as great as it is for Windows clients, you still needed something else for your iPads / Mac users. At which point you could just use the 'something else' for your Windows clients as well and not have to manage two environments.

Zero VGS
Aug 16, 2002
ASK ME ABOUT HOW HUMAN LIVES THAT MADE VIDEO GAME CONTROLLERS ARE WORTH MORE
Lipstick Apathy

Thanks Ants posted:

The issue I found with DirectAccess was that as great as it is for Windows clients, you still needed something else for your iPads / Mac users. At which point you could just use the 'something else' for your Windows clients as well and not have to manage two environments.

Supposing I go with something else, does anything exist to actually mimic an "always-on" VPN? The closest I've seen is Log Me In Hamachi, though I don't know if I'd trust that at an enterprise level.

I mean, the built-in VPN client in Windows 10 would be fine if I could get a non-convoluted script to make sure it connects at login (at bootup would be even better) and does everything it can to reconnect if ever down. Naturally, Microsoft would prefer you pay for that, but I don't see what's stopping someone from reverse engineering something.

Thanks Ants
May 21, 2004

#essereFerrari


I'm not really sure - MDM can provide a VPN-on-demand system where opening a certain app or requesting certain URLs will automatically dial the VPN, but I am not aware of a way of doing that in Windows.

Question time: How long does Windows Server cache NXDOMAIN responses obtained from forwarders (so internet addresses, not internal zones), and can you change this? My Google-fu is weak because everything I can find refers to making changes to the DNS client caching expiry. We have a dev team adding DNS entries externally, immediately trying to hit them from inside the network and then having to wait an hour for the negative response to time out.

nexxai
Jul 17, 2002

quack quack bjork
Fun Shoe

Thanks Ants posted:

Question time: How long does Windows Server cache NXDOMAIN responses obtained from forwarders (so internet addresses, not internal zones), and can you change this? My Google-fu is weak because everything I can find refers to making changes to the DNS client caching expiry. We have a dev team adding DNS entries externally, immediately trying to hit them from inside the network and then having to wait an hour for the negative response to time out.
According to a quote here (http://social.technet.microsoft.com/wiki/contents/articles/26864.windows-server-dns-service-negative-caching.aspx), it looks like it's defaulted to an hour. "Now even if that host becomes available again, it's cached for an hour the host isn't available."

The term you want to Google is "negative caching".

Thanks Ants
May 21, 2004

#essereFerrari


I actually found that article (but thanks), but it looks like it's relating to setting the TTL on NXDOMAIN responses generated by a query to a zone that you are hosting yourself, not forwarding on to Google or resolving through the root servers.

Swink
Apr 18, 2006
Left Side <--- Many Whelps
Win10 has some Per-App VPN stuff going on which is interesting. It started in Win8 and it seems like the direction they're gonna take.

As already stated, DA is Windows only and also kinda poo poo to support.

BaseballPCHiker
Jan 16, 2006

Zero VGS posted:

Supposing I go with something else, does anything exist to actually mimic an "always-on" VPN? The closest I've seen is Log Me In Hamachi, though I don't know if I'd trust that at an enterprise level.

I think Cisco AnyConnect can do this if setup correctly. I know I've used it in the past for iPads that needed VPN connections right away (the horror).

incoherent
Apr 24, 2004

01010100011010000111001
00110100101101100011011
000110010101110010
Rumor: Windows server licensing is moving to SQL style licensing.

https://www.reddit.com/r/sysadmin/comments/3okd38/you_thought_microsoft_sql_server_licensing_was/

Sounds like something they'd do to increase revenue.

Walked
Apr 14, 2003

incoherent posted:

Rumor: Windows server licensing is moving to SQL style licensing.

https://www.reddit.com/r/sysadmin/comments/3okd38/you_thought_microsoft_sql_server_licensing_was/

Sounds like something they'd do to increase revenue.

I posted over there; and unfortunately this seems way too plausible to me. I hope its wrong though

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

Makes sense for them to do this. Our latest hosts are E5-2699v3's with 36 physical cores per box. Licensing has been trying to keep up with core density and virtualization for a while.

Spending only 6K per host for unlimited Windows VM's is awesome, so I'm not surprised they're going to change it.

peak debt
Mar 11, 2001
b& :(
Nap Ghost
That loud sound you hear is the collective sigh of Intel and AMD engineers as they find out they have to completely redesign their architecture again because of stupid licensing reasons.

Maneki Neko
Oct 27, 2000

incoherent posted:

Rumor: Windows server licensing is moving to SQL style licensing.

https://www.reddit.com/r/sysadmin/comments/3okd38/you_thought_microsoft_sql_server_licensing_was/

Sounds like something they'd do to increase revenue.

Hhaha, we just had a conversation about that internally last week (all speculation of course), that is going to super gently caress us over if that happens (we're a service provider with SPLA). :(

EDIT:

In other random speculation move, Ignite got moved from May (in chicago) to September (in Atlanta). I'm guessing Server 2016 won't be coming out until Q3 of 2016 then

http://blogs.microsoft.com/blog/2015/10/14/microsofts-2016-event-lineup/

Maneki Neko fucked around with this message at 19:31 on Oct 14, 2015

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

Yo Zero VGS, you're getting a little closer to having your AD in the Cloud you want

https://azure.microsoft.com/en-us/pricing/details/active-directory-ds/

dox
Mar 4, 2006

skipdogg posted:

Yo Zero VGS, you're getting a little closer to having your AD in the Cloud you want

https://azure.microsoft.com/en-us/pricing/details/active-directory-ds/

He's just going to put his Active Directory in OneDrive, it'll work fine.

Thanks Ants
May 21, 2004

#essereFerrari


skipdogg posted:

Yo Zero VGS, you're getting a little closer to having your AD in the Cloud you want

https://azure.microsoft.com/en-us/pricing/details/active-directory-ds/

:jackbud:

At last. I was about to experiment with Amazon's Simple AD but I can't help thinking something from Microsoft is going to work better.

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

Looking at the docs, it looks like it's still not designed to service end users and normal computers. *yet*

Zero VGS
Aug 16, 2002
ASK ME ABOUT HOW HUMAN LIVES THAT MADE VIDEO GAME CONTROLLERS ARE WORTH MORE
Lipstick Apathy

skipdogg posted:

Looking at the docs, it looks like it's still not designed to service end users and normal computers. *yet*

As long as it can authenticate my O365 users against LDAP so we can sign into my on site NAS, Wi-Fi, and VPN instead of having to maintain separate logins for those, I'm all over that poo poo. It's loving charity-level pricing for a change, too.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Zero VGS posted:

As long as it can authenticate my O365 users against LDAP so we can sign into my on site NAS, Wi-Fi, and VPN instead of having to maintain separate logins for those, I'm all over that poo poo. It's loving charity-level pricing for a change, too.

Gotta get you hooked for cheap before they gently caress you in the rear end for renewals.

Thanks Ants
May 21, 2004

#essereFerrari


skipdogg posted:

Looking at the docs, it looks like it's still not designed to service end users and normal computers. *yet*

Yeah, I was getting a touch carried away. It's an AD domain that I guess runs using the Azure AD Connect tool and you can bind Azure VMs to it, but it doesn't yet work across a VPN link.

Still, a 'proper' domain replicated in the cloud for that sort of pricing is decent.

devmd01
Mar 7, 2006

Elektronik
Supersonik
I have a DNS architecture across 4 separate forests/domains (with trusts between them) that i'm trying to simplify and make consistent due to turnover in staff over the years. Depending on the domain some use conditional forwarding for DNS to the other namespaces, some use zone transfers, and one uses a mixture of both. The eventual goal is to consolidate all resources to DomainA, but this is going to be a multi-year process. First up will be the end users/email/client devices, and I need to re-architect and document the DHCP/DNS configuration to support not only the eventual collapsing of domains, but adding on additional trusts/domain migrations to DomainA from other partner companies.

Each domain has of course the primary DNS suffix as a zone, but a couple also have some additional zones for the external dns name for split-brain. We are also doing a mixture of full zone transfers/conditional forwarders of the DNS namespaces of some additional partner companies that do not have a trust through our MPLS.

DomainA, DomainB, and DomainC all live in Site1.

DomainD is in Site2, which is also DR for DomainA/DomainB, so they have DCs for those domains as well. 100Mbit direct pipe between Site1 and Site2.

Branch locations are a mixture of hub and spoke from Site2 with site to site VPNs or direct to the MPLS. None are large enough to warrant a DC on site.

Like all things AD architecture and DNS related, everyone has their own opinion. I have full ownership and control of all 4 domains so I don't have to coordinate with anyone else for DC changes, etc. What would be the current best practice for this situation?

As I see it, I have three options:

- Full Zone Transfers between all domains every which way. Obnoxious to set up and maintain with 11 DCs.
- Stub Zones. Much easier to maintain, need to make sure that SOA, etc is set up correctly for each namespace.
- Conditional forwarders. Easiest, but not sure it's the best solution.

devmd01 fucked around with this message at 16:23 on Oct 15, 2015

Dans Macabre
Apr 24, 2004


Tony Montana posted:

GPO Preferences. You can tie maps to sec groups or a number of things, whatever makes more business sense. Depends on the GPO structure and strategy, some places like everything in nicely named sec groups so low level staff can add and remove (or even managers with a delegated ADUC console). But if helpdesk is already filling in the Department field with a new hire and it's accurate, then why add another sec group that needs to be managed? It doesn't have to be one sec group per drive either.. but if your shares are DFS then just end up with something that takes the least administrative effort, is the most automated and the most robust. A mix is fine too, perhaps that Finance-Restricted sec group should be provisioned in a different way that the general drive.

ok thanks!

Tony Montana
Aug 6, 2005

by FactsAreUseless

devmd01 posted:

I have a DNS architecture across 4 separate forests/domains (with trusts between them) that i'm trying to simplify and make consistent due to turnover in staff over the years. Depending on the domain some use conditional forwarding for DNS to the other namespaces, some use zone transfers, and one uses a mixture of both. The eventual goal is to consolidate all resources to DomainA, but this is going to be a multi-year process. First up will be the end users/email/client devices, and I need to re-architect and document the DHCP/DNS configuration to support not only the eventual collapsing of domains, but adding on additional trusts/domain migrations to DomainA from other partner companies.

Each domain has of course the primary DNS suffix as a zone, but a couple also have some additional zones for the external dns name for split-brain. We are also doing a mixture of full zone transfers/conditional forwarders of the DNS namespaces of some additional partner companies that do not have a trust through our MPLS.

DomainA, DomainB, and DomainC all live in Site1.

DomainD is in Site2, which is also DR for DomainA/DomainB, so they have DCs for those domains as well. 100Mbit direct pipe between Site1 and Site2.

Branch locations are a mixture of hub and spoke from Site2 with site to site VPNs or direct to the MPLS. None are large enough to warrant a DC on site.

Like all things AD architecture and DNS related, everyone has their own opinion. I have full ownership and control of all 4 domains so I don't have to coordinate with anyone else for DC changes, etc. What would be the current best practice for this situation?

As I see it, I have three options:

- Full Zone Transfers between all domains every which way. Obnoxious to set up and maintain with 11 DCs.
- Stub Zones. Much easier to maintain, need to make sure that SOA, etc is set up correctly for each namespace.
- Conditional forwarders. Easiest, but not sure it's the best solution.

I will jump into this and give a detailed response, but you'll have a wait a few days. I've got a new contract starting Monday in our nation's capital, working on the Defense network! Pretty excited, fly-in-fly-out role for stupid money. Network engineering, these guys don't want me for Wintel.. even with just a CCNA you can do all sorts of interesting stuff in that space.

AlternateAccount
Apr 25, 2005
FYGM
Maybe it's just Friday and I am tired, but I have a server that I can't log into. We use GP to put the Domain Admins into the Local Admins on every domain member machine, but it's not working.

- The machine returns MACHINENAME.DOMAIN.LOCAL from the IP in NSLOOKUP. Would the DNS servers accept information from non-domain machines? And clearly the context there would indicate that it's on the domain.
- There is no machine account I can find in AD. That's weird.

What am I missing here? Does GP not get applied to machines that are mysteriously on the domain somehow without a computer account?

hihifellow
Jun 17, 2005

seriously where the fuck did this genre come from

AlternateAccount posted:

- The machine returns MACHINENAME.DOMAIN.LOCAL from the IP in NSLOOKUP. Would the DNS servers accept information from non-domain machines? And clearly the context there would indicate that it's on the domain.

Yes. DNS doesn't care if the machine is a domain member or not, only that it (or an authority like a DHCP server) has the rights to name itself in DNS.

AlternateAccount posted:

- There is no machine account I can find in AD. That's weird.

Yeah that ain't good, re-add the computer to the domain. No machine account, no authentication to the domain.

Also you don't have to put domain admins in to the local admin group, it's added automatically as part of a domain join.

Adbot
ADBOT LOVES YOU

wyoak
Feb 14, 2005

a glass case of emotion

Fallen Rib

AlternateAccount posted:

Maybe it's just Friday and I am tired, but I have a server that I can't log into. We use GP to put the Domain Admins into the Local Admins on every domain member machine, but it's not working.

- The machine returns MACHINENAME.DOMAIN.LOCAL from the IP in NSLOOKUP. Would the DNS servers accept information from non-domain machines? And clearly the context there would indicate that it's on the domain.
- There is no machine account I can find in AD. That's weird.

What am I missing here? Does GP not get applied to machines that are mysteriously on the domain somehow without a computer account?
Could be that your DHCP server is creating the DNS record, not the client. DNS suffix doesn't mean it's on the domain. If there's no machine account it's probably not on the domain, barring some weird situation with display name mismatches.

devmd01 posted:

- Full Zone Transfers between all domains every which way. Obnoxious to set up and maintain with 11 DCs.
- Stub Zones. Much easier to maintain, need to make sure that SOA, etc is set up correctly for each namespace.
- Conditional forwarders. Easiest, but not sure it's the best solution.
I'd default to conditional forwarders unless you can find some reason not to.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply