The page has been translated by Gen AI.

Active Directory Domain Controller Setup Guide

Active Directory Domain Controller Setup Guide

Overview

Active Directory (hereafter AD) is a service that provides Single Sign-On (hereafter SSO) to computing resources on the network. Generally, within computing resources, AD is used to configure user authentication and authorization. In AD, the Domain Name System (hereinafter DNS) is used to construct the directory structure to recognize, manage, operate, and configure network resources. Windows server’s Operating System (hereinafter OS) redundancy configuration can use the proprietary solution Windows Server Failover Cluster (hereinafter WSFC), and when configuring WSFC, it can be set up in both domain environments using AD and workgroups not using AD. When configuring WSFC on Samsung Cloud Platform (hereinafter SCP), it is recommended to use an AD Domain Controller (hereinafter DC).

Resource Generation in SCP

The capacity of AD DC is calculated based on the number of users. Central Processing Unit (hereinafter CPU) is 1,000 users per core, and the size of the disk and DC’s Database (hereinafter DB) is based on 60KB per user. Memory is based on (base OS usage 2GB) + (required AD DB capacity) + (OS security solution) usage. AD DC server should be configured simply by using only one Network Interface Card (hereinafter NIC).

Estimated Capacity

CategoryCapacity
CPU2Core
Memory4GB
OSWindows Server 2022 Standard
NIC1EA
DiskData Disk none.

When used for redundancy within SCP, only fewer than 10 users and computers are used, so the required computing resources are small. I selected 2Core, 4GB for minimal parallel processing and task handling.

IP Assignment

You must define the required IP before deploying and allocating the server. In SCP V2, IP addresses are assigned using DHCP (Dynamic Host Configuration Protocol). When creating a Console VM, the IP is generated automatically and selected randomly, so if you want to use a specific IP, you must enter the IP when creating the VM.

Configuration Example

CategoryIPDescription
addc-1192.168.10.5Primary Domain Controller DC that performs the role.
addc-2192.168.10.6This is a server that runs the Domain Controller service.

It is recommended to configure a simple network for AD DC servers using only one NIC and one IP. Authentication and authorization between servers are based on host name and IP, and if additional NICs such as Heartbeat are added, subnet separation is required during operation and separate work is needed in DNS.

IP information of VM for Primary Domain Controller

The generated VM has an IP assigned as follows.

Color mode
ipconfig /all
ipconfig /all
Check IP Information
Windows IP Configuration

   Host Name . . . . . . . . . . . . : WIN-XXXXXXXXXXX
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : network.kr-west1.e.samsungsdscloud.internal.

Ethernet adapter Ethernet Instance 0:

   Connection-specific DNS Suffix  . : network.kr-west1.e.samsungscloud.internal.
   Description . . . . . . . . . . . : Red Hat VirtIO Ethernet Adapter
   Physical Address. . . . . . . . . : AA-BB-CC-DD-EE-FF
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.10.5(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Thursday, October 30, 2025 3:00:16 PM
   Lease Expires . . . . . . . . . . : Friday, October 31, 2025 3:00:16 AM
   Default Gateway . . . . . . . . . : 192.168.10.1
   DHCP Server . . . . . . . . . . . : 192.168.10.1
   DNS Servers . . . . . . . . . . . : 198.19.0.53
   NetBIOS over Tcpip. . . . . . . . : Enabled

The host name is not reflected with the information entered in the SCP console. Through DHCP, IP and DNS servers are configured. The DNS server is an internal DNS server provided within SCP, and it is configured to allow integration with other servers within SCP.

Firewall and Security Group Settings

After creating the VM, you need to open the ports used by AD in the firewall and Security Group.

ProtocolServer Port
(inbound)
Client Port
(outbound)
Description
TCP5353, 49152-65535DNS
TCP8849152-65535Kerberos Authentication
TCP13549152-65535RPC Endpoint Mapper
TCP44549152-65535SMB (file sharing)
TCP46449152-65535Kerberos password change
TCP38949152-65535LDAP
TCP63649152-65535LDAP over TLS/SSL
TCP326849152-65535LDAP Global Catalog
TCP326949152-65535LDAP Global Catalog SSL
TCP598549152-65535WinRM HTTP
TCP598649152-65535WinRM HTTPS
TCP938949152-65535Active Directory Management Gateway Service
TCP49152-6553549152-65535RPC for LSA, SAM, NetLogon, FRS RPC, DFSR RPC
UDP12349152-65535/UDPNTP (W32Time)
UDP46449152-65535/UDPKerberos password change
UDP38949152-65535/UDPLDAP
UDP5353, 49152-65535DNS
UDP8849152-65535Kerberos Authentication
ICMP0, 80, 8Echo request (8),Echo reply (0)

Primary Domain Controller configuration

AD is based on a multi‑master DB, so objects such as users or computers have their data changed on all DCs. Important DBs such as certain schemas are updated only on a single DC selected as the Primary Domain Controller (hereafter PDC). When configuring AD DC, the first server, the PDC, holds the Flexible Single Master Operations (FSMO) role, and the FSMO role can be failover via commands. The creation and information update of objects such as Cluster Name Object (CNO) and Virtual Computer Object (VCO) used in the process of configuring WSFC are performed on all DCs.

Host Name Change

When Windows servers are deployed in SCP V2, the host name is generated randomly. Change it to the host name selected during AD DC configuration planning. Host name changes are possible during operation, but it is recommended to change them in advance according to the planned configuration.

Powershell(administrator privileges) run

Run PowerShell (with administrator privileges) from Windows Run.

powershell
powershell

Host name status check

Print the current host name.

Color mode
hostname
hostname
Host Name Output
WIN-XXXXXXXXXXX

You can see that the host name is randomly generated starting with “WIN-”.

Host Name Change

Change the host name to the planned name addc-1. Windows servers require a restart when the host name is changed.

Color mode
Rename-Computer -NewName "addc-1" -Restart -Force
Rename-Computer -NewName "addc-1" -Restart -Force
Change Host Name
OptionValueDescription
-NewNameaddc-1This is the host name to be changed.
-RestartRestarting.
-ForceExecute forcibly.

Powershell(Administrator privileges) Run

When the OS restarts, run PowerShell (with administrator privileges) from Windows.

powershell
powershell

Check status after host name change

Print the changed host name.

Color mode
hostname
hostname
Host Name Output
addc-1

You can confirm that the host name has been changed to the planned addc-1.

Disable IPv6 adapter binding

When Windows Server is deployed, each NIC can bind both IPv4 and IPv6, and the basic functionality is enabled. Because Windows servers used in SCP do not use IPv6, IPv6 is disabled to prevent DNS malfunctions and the like. When Windows server is deployed, unique names are assigned sequentially within the server, and IPv6 is enabled by default. The NIC name may vary depending on the Windows OS version and configuration.

Prints NIC information that can bind the current IPv6.

Color mode
Get-NetAdapterBinding -ComponentID ms_tcpip6
Get-NetAdapterBinding -ComponentID ms_tcpip6
IPv6 bindable NIC output
OptionValueDescription
-ComponentIDms_tcpip6This is the component ID to set.
Name                         DisplayName                                        ComponentID          Enabled
----                         -----------                                        -----------          -------
Ethernet Instance 0          Internet Protocol Version 6 (TCP/IPv6)             ms_tcpip6            True

The NIC of the deployed server has the name Ethernet Instance 0 and IPv6 is enabled by default.

Disable IPv6 on NIC

Ethernet Instance 0 Disable IPv6 on the NIC.

Color mode
Disable-NetAdapterBinding -Name "Ethernet Instance 0" -ComponentID ms_tcpip6
Disable-NetAdapterBinding -Name "Ethernet Instance 0" -ComponentID ms_tcpip6
IPv6 Disable
OptionValueDescription
-NameEthernet Instance 0This is the NIC name to be changed.
-ComponentIDms_tcpip6Component ID to set.

Display NIC information after disabling IPv6

Outputs NIC information that can bind IPv6 after changing NIC settings.

Color mode
Get-NetAdapterBinding -ComponentID ms_tcpip6
Get-NetAdapterBinding -ComponentID ms_tcpip6
IPv6 Bindable NIC Output
Name                           DisplayName                                        ComponentID          Enabled
----                           -----------                                        -----------          -------
Ethernet Instance 0            Internet Protocol Version 6 (TCP/IPv6)             ms_tcpip6            False

You can confirm that IPv6 is disabled on Ethernet0 NIC.

Active Directory Domain Controller Role Installation

Add the AD-Domain-Services role for the AD DC role.

Color mode
Install-WindowsFeature AD-Domain-Services -IncludeManagementTools
Install-WindowsFeature AD-Domain-Services -IncludeManagementTools
Active Directory Domain services Add role
OptionValueDescription
-IncludeManagementToolsWhen installing the AD-Domain-Services role, it automatically adds the UI for management.

This is the result installed normally.

Success Restart Needed Exit Code      Feature Result                              
------- -------------- ---------      --------------
True    No             Success        {Active Directory Domain Services, Group P...

## Primary Domain Controller role promotion
When the AD-Domain-Services feature is installed, configure a new DC role.
The information to be used is as follows.
|Category|Variable Name|Value|
|---|---|---|
|Domain name|$FQDN| scp.test |
|NetBIOS|$NETBIOS|SCP|
|Directory Service Restore Mode password<br/>Domain Administrator password|$PASSWORD|It will be prompted when the command is executed.|
|Installation Directory|$InstallDirectory|C:\Windows\ |

In SCP V2, the default Adminstrator account is disabled and no password is set. Therefore, you must change the password of the Adminstrator account to use it. Also, the password of the Domain Administrator account must be changed, and the Domain Administrator account is changed to the password specified during AD DC role promotion.


### Primary Domain Controller role promotion command


Color mode
$FQDN = "scp.test"
$NETBIOS= "SCP"
$PASSWORD = Read-host 'Safe Mode Administrator Password: ' -AsSecureString
$InstallDirectory ="C:\Windows\"
Set-LocalUser -Name "Administrator" -Password $PASSWORD
Import-Module ADDSDeployment
Install-ADDSForest `
-CreateDnsDelegation:$false `
"-DatabasePath $InstallDirectory"NTDS" ``
-DomainMode "WinThreshold" ``
-DomainName $FQDN `
-DomainNetbiosName $NETBIOS  `
-ForestMode "WinThreshold" ``
-InstallDns:$true `
-LogPath $InstallDirectory"NTDS" `
-NoRebootOnCompletion:$false `
- SysvolPath $InstallDirectory"SYSVOL ``
-SafeModeAdministratorPassword  $PASSWORD `
-Force:$true
$FQDN = "scp.test"
$NETBIOS= "SCP"
$PASSWORD = Read-host 'Safe Mode Administrator Password: ' -AsSecureString
$InstallDirectory ="C:\Windows\"
Set-LocalUser -Name "Administrator" -Password $PASSWORD
Import-Module ADDSDeployment
Install-ADDSForest `
-CreateDnsDelegation:$false `
"-DatabasePath $InstallDirectory"NTDS" ``
-DomainMode "WinThreshold" ``
-DomainName $FQDN `
-DomainNetbiosName $NETBIOS  `
-ForestMode "WinThreshold" ``
-InstallDns:$true `
-LogPath $InstallDirectory"NTDS" `
-NoRebootOnCompletion:$false `
- SysvolPath $InstallDirectory"SYSVOL ``
-SafeModeAdministratorPassword  $PASSWORD `
-Force:$true
Primary Domain Controller role promotion
|Option|Value|Description| |---|---|---| |-CreateDnsDelegation|$false|Create DNS delegation. Used when integrating with existing AD. | |-DatabasePath|$InstallDirectory"NTDS"|AD database storage location | |-DomainMode|"WinThreshold"|The AD domain functional level WinThreshold is Windows Server 2016 and is a recent functional level. | |-DomainNetbiosName|$NETBIOS|NetBIOS name | |-ForestMode|"WinThreshold"|The AD domain functional level WinThreshold is Windows Server 2016 and is a recent functional level. | |-InstallDns|$true|Whether to install DNS during DC configuration | |-LogPath|$InstallDirectory"NTDS"|Log storage location | |-NoRebootOnCompletion|$false|Whether to restart after DC configuration is completed | |-SysvolPath|$InstallDirectory"SYSVOL|SYSVOL storage location<br>SYSVOL is a file share location used when deploying computer and user group policies. | |-SafeModeAdministratorPassword|$PASSWORD|Password when using Directory Services Restore Mode|-Force|$true|Whether to force execution without requesting user confirmation | This is the result that was completed normally. ```powershell Message Context RebootRequired Status ------- ------- -------------- ------ Operation completed successfully DCPromo.General.1 False Success
When the AD DC role is successfully promoted, the system automatically restarts.

## Log in with domain Administrator account
Check whether you can log in with the Administrator account of the created domain.
The information to be used is as follows.
|Category|Value|
|---|---|
|Domain name| scp.test |
|Netbios|SCP|
|Account name|SCP|
|Domain Administrator password|the $PASSWORD value entered when promoting the above Primary Domain Controller|

**scp\Administrator** Enter the password used for the above PDC promotion to log into the server.



# Secondary Domain Controller configuration
How to configure an additional DC.

You must add as a member to the existing PDC and promote the DC role.

## Host Name Change
In SCP V2, when a Windows server is deployed, the host name is generated randomly. Change it to the host name selected during AD DC configuration planning. Changing the host name during operation is possible, but it is recommended to change it in advance according to the planned configuration.

###  Powershell(administrator privileges) Run
Connect to the secondary DC server and run PowerShell (with administrator privileges) from Windows.

![powershell](img/set_active_directory_domain_controller/powershell.png 'powershell')

### Check host name status

Print the current host name.


Color mode
hostname
hostname
Host Name Output
```powershell WIN-XXXXXXXXXXX

You can see that the host name is randomly generated starting with “WIN-”.

Host Name Change

Change the host name to the planned name addc-2. Windows servers require a restart when changing the host name.

Color mode
Rename-Computer -NewName "addc-2" -Restart -Force
Rename-Computer -NewName "addc-2" -Restart -Force
Change Host Name
OptionValueDescription
-NewNameaddc-2The host name to be changed.
-RestartRestarting.
-ForceExecute forcibly.

Powershell(administrator privileges) run

When the OS restarts, run PowerShell (with administrator privileges) from Windows.

powershell
powershell

Check status after host name change

Print the changed host name.

Color mode
hostname
hostname
Host Name Output
addc-2

You can confirm that the host name has been changed to addc-2.

IPv6 Adapter Binding Disabled

In Windows Server, after the initial deployment, it is enabled to bind IPv4 and IPv6 to a single NIC. Because Windows servers used in SCP do not use IPv6, IPv6 is disabled to prevent DNS malfunctions, etc. Outputs adapter information that can bind the current IPv6. When the Windows server is deployed, unique names are sequentially assigned within the server, and IPv6 is enabled by default. The NIC name may vary depending on the Windows OS version and configuration.

Display NIC information that can be configured for IPv6

Prints the adapter information that can bind IPv6 currently.

Color mode
Get-NetAdapterBinding -ComponentID ms_tcpip6
Get-NetAdapterBinding -ComponentID ms_tcpip6
IPv6 Bindable NIC Output
Name                         DisplayName                                        ComponentID          Enabled
----                         -----------                                        -----------          -------
Ethernet Instance 0          Internet Protocol Version 6 (TCP/IPv6)             ms_tcpip6            True

After the OS is deployed, the server’s NIC is named Ethernet Instance 0 and IPv6 is enabled by default.

Disable IPv6 on NIC

Disable IPv6 on Ethernet Instance 0.

Color mode
Disable-NetAdapterBinding -Name "Ethernet Instance 0" -ComponentID ms_tcpip6
Disable-NetAdapterBinding -Name "Ethernet Instance 0" -ComponentID ms_tcpip6
IPv6 Disable

Output NIC information after disabling IPv6

Outputs adapter information that can bind IPv6 after changing NIC settings.

Color mode
Get-NetAdapterBinding -ComponentID ms_tcpip6
Get-NetAdapterBinding -ComponentID ms_tcpip6
IPv6 Bindable NIC Output
Name                           DisplayName                                        ComponentID          Enabled
----                           -----------                                        -----------          -------
Ethernet Instance 0            Internet Protocol Version 6 (TCP/IPv6)             ms_tcpip6            False

You can confirm that IPv6 is disabled on Ethernet0 NIC.

DNS client configuration

To add a member to the domain in AD, you must change to a DNS server that contains DC information.

Check DNS client configuration information

Check the currently configured DNS server settings.

Color mode
Get-DnsClientServerAddress
Get-DnsClientServerAddress
DNS client settings check
InterfaceAlias               Interface Address ServerAddresses
                             Index     Family
--------------               --------- ------- ---------------
Ethernet Instance 0                  3 IPv4    {198.19.0.53}
Ethernet Instance 0                  3 IPv6    {}

You can confirm that the NIC index of the network card on the server is 3.

Change DNS server to PDC

Change the DNS server to 192.168.10.5, the IP of the PDC server. Select interface number 3 of the NIC to configure.

Color mode
$DNSSERVERS = ("192.168.10.5")
$INTERFACEINDEX = 3
Set-DnsClientServerAddress -InterfaceIndex $INTERFACEINDEX -ServerAddresses $DNSSERVERS
$DNSSERVERS = ("192.168.10.5")
$INTERFACEINDEX = 3
Set-DnsClientServerAddress -InterfaceIndex $INTERFACEINDEX -ServerAddresses $DNSSERVERS
Change DNS server IP

Check information after changing DNS client settings

Check the changed DNS server settings.

Color mode
Get-DnsClientServerAddress
Get-DnsClientServerAddress
Check DNS client settings

You can confirm that the DNS server is set to PDC.

InterfaceAlias               Interface Address ServerAddresses
                             Index     Family
--------------               --------- ------- ---------------
Ethernet Instance 0                  3 IPv4    {192.168.10.5}
Ethernet Instance 0                  3 IPv6    {}

AD domain information lookup

Check whether the scp.test domain is resolved using the changed DNS server.

Color mode
nslookup scp.test
nslookup scp.test
Domain Lookup Test
Server:  addc-1.network.kr-west1.e.samsungsdscloud.internal
Address:  192.168.10.5

Name:    scp.test
Address:  192.168.10.5

You can confirm that querying the scp.test domain returns the PDC’s IP address.

Join as AD Member

Windows Server when deployed is a Workgroup by default, and if you join as a member to an AD domain, it changes to that domain. Domain → Workgroup or Workgroup → Domain requires a server restart.

Join as a member to the AD domain

If the DNS server is changed to the DNS server where DC information is queried, you can join the queried domain as a member.

Color mode
$FQDN = "scp.test"
Add-Computer -DomainName $FQDN -Restart
$FQDN = "scp.test"
Add-Computer -DomainName $FQDN -Restart
Join as a member of the domain
OptionValueDescription
-RestartJoin as a member of the domain and the OS restarts.

When the command is executed, enter the account information that can join the domain to connect.

Require Credential
Require Credential

If you join as a member on the scp.test domain, you need to restart the server for the information to take effect.

Active Directory Domain Controller role installation

Powershell(administrator privileges) run

Connect to the Secondary DC server and run PowerShell (administrator privileges) from Windows.

powershell

AD-Domain-Services role installation

For the AD DC role, add the AD-Domain-Services role.

Color mode
Install-WindowsFeature AD-Domain-Services -IncludeManagementTools
Install-WindowsFeature AD-Domain-Services -IncludeManagementTools
Active Directory Domain services Add role
OptionValueDescription
-IncludeManagementToolsWhen installing the AD-Domain-Services role, it automatically adds the UI for management.
Success Restart Needed Exit Code      Feature Result                              
------- -------------- ---------      23-03-2023 --------------                              
True    No             Success        {Active Directory Domain Services, Group P...
This is the result installed normally.

### Secondary Domain Controller role promotion
AD-Domain-Services feature is installed, configure a new DC role.
The information to be used is as follows.
|Category|Variable Name|Value|
|---|---|---|
|Domain name|$FQDN|scp.test |
|NetBIOS|$NETBIOS|SCP |
|Installation Directory|$InstallDirectory|C:\Windows\ |
|DNS site name|$SITENAME|"Default-First-Site-Name"|


Color mode
$FQDN = "scp.test"
$NETBIOS= "SCP"
$InstallDirectory ="C:\Windows\"
$SITENAME = "Default-First-Site-Name"
$PASSWORD = Read-host 'Set Administrator Password: ' -AsSecureString
Set-LocalUser -Name "Administrator" -Password $PASSWORD
Import-Module ADDSDeployment
Install-ADDSDomainController `
-NoGlobalCatalog:$false `
-CreateDnsDelegation:$false `
-Credential (Get-Credential) `
-CriticalReplicationOnly:$false `
-DatabasePath $InstallDirectory"NTDS" ``
-DomainName $FQDN  `
-InstallDns:$true `
-LogPath $InstallDirectory"NTDS" `"
-NoRebootOnCompletion:$false `
-SiteName $SITENAME `
- SysvolPath $InstallDirectory"SYSVOL" ``
-Force:$true
$FQDN = "scp.test"
$NETBIOS= "SCP"
$InstallDirectory ="C:\Windows\"
$SITENAME = "Default-First-Site-Name"
$PASSWORD = Read-host 'Set Administrator Password: ' -AsSecureString
Set-LocalUser -Name "Administrator" -Password $PASSWORD
Import-Module ADDSDeployment
Install-ADDSDomainController `
-NoGlobalCatalog:$false `
-CreateDnsDelegation:$false `
-Credential (Get-Credential) `
-CriticalReplicationOnly:$false `
-DatabasePath $InstallDirectory"NTDS" ``
-DomainName $FQDN  `
-InstallDns:$true `
-LogPath $InstallDirectory"NTDS" `"
-NoRebootOnCompletion:$false `
-SiteName $SITENAME `
- SysvolPath $InstallDirectory"SYSVOL" ``
-Force:$true
Secondary Domain Controller role promotion
|Option|Value|Description| |---|---|---| |-NoGlobalCatalog|$false|Whether to install the global catalog. The default DC installs the global catalog.| |-CreateDnsDelegation|$false|Create DNS delegation. Used when integrating with existing AD.| |-Credential|Input when executing command|Enter the account information that has permission for DC deployment. <br> An account with Enterprise Admin or Domain Admin privileges is required. | |-CriticalReplicationOnly|$false|Whether to replicate only important information. | |-DatabasePath|$InstallDirectory"NTDS"|AD database storage location | |-DomainName|$FQDN|Domain name | |-InstallDns|$true|Whether to install DNS during DC configuration | |-LogPath|$InstallDirectory"NTDS"|Log storage location | |-NoRebootOnCompletion|$false|Whether to restart after DC configuration is completed| |-SiteName|$SITENAME|Existing site name | |-SysvolPath|$InstallDirectory"SYSVOL"|SYSVOL storage location<br>SYSVOL is a file share location used when deploying computer and user group policies. | |-Force|$true|whether to force execution without requesting user confirmation ``| Enter the PDC's Domain Administrator account information to promote it to an auxiliary DC in AD. ```powershell Supply values for the following parameters: Credential
Require Credential
Require Credential

Enter the password for recovery mode during the deployment process.

SafeModeAdministratorPassword: ********
Confirm SafeModeAdministratorPassword: ********
Message Context RebootRequired Status
------- ------- -------------- ------
Operation completed successfully DCPromo.General.1 False Success

If promotion to AD DC succeeds, the server will restart.

Change DNS settings on PDC

In AD, the DC configures the DNS server to set the remote server as the primary DNS server and the local DNS as the secondary DNS server. To prepare for server restarts or internal DNS errors, the DNS server of another DC is set as the primary DNS server.

DNS client configuration change

Connect to the PDC server and run PowerShell (administrator privileges) in Windows.

powershell
powershell

Check current DNS client settings

Check the DNS client configuration information of the server deployed with PDC.

Color mode
Get-DnsClientServerAddress
Get-DnsClientServerAddress
DNS client settings check

The server deployed with the new PDC is set to the loopback address 127.0.0.1.

InterfaceAlias               Interface Address ServerAddresses
                             Index     Family
--------------               --------- ------- ---------------
Ethernet0                            4 IPv4    {127.0.0.1}
Ethernet0                            4 IPv6    {}

Set the additional DC’s IP 192.168.10.6 as primary and set the local DNS as secondary.

DNS Client Information Edit

The PDC’s DNS client should be set with the backup DC as primary and the PDC server as secondary. The secondary DNS server address is set by choosing either the local DNS server loopback (127.0.0.1) address or the actual IP address of the PDC.

Color mode
$DNSSERVERS = ("192.168.10.6","127.0.0.1")
$INTERFACEINDEX = 4
Set-DnsClientServerAddress -InterfaceIndex $INTERFACEINDEX -ServerAddresses $DNSSERVERS
Get-DnsClientServerAddress
$DNSSERVERS = ("192.168.10.6","127.0.0.1")
$INTERFACEINDEX = 4
Set-DnsClientServerAddress -InterfaceIndex $INTERFACEINDEX -ServerAddresses $DNSSERVERS
Get-DnsClientServerAddress
Change PDC's DNS client settings

The settings have been applied without any issues.

InterfaceAlias               Interface Address ServerAddresses
                             Index     Family
--------------               --------- ------- ---------------
Ethernet0                            4 IPv4    {192.168.10.6, 127.0.0.1}
Ethernet0                            4 IPv6    {}

NTP Settings

In AD, time is a critical factor in the process of issuing and verifying tickets for authentication and authorization.

NTP Picture
NTP Picture

In the AD domain, the standard for synchronizing time is that the PDC synchronizes time via an external NTP using the NTP policy, and other DCs and member servers synchronize time based on the PDC using the NT5DS policy. The NTP server provided by SCP V2 is 198.10.0.54.

NTP Server Information

The following settings were configured based on the internal NTP of SCP.

NTP Server IPFlag OptionDescription
198.19.0.540x90x8 client
0x1 SpecialInterval

Primary Domain Controller’s NTP configuration

Connect to the Primary Domain Controller server and run PowerShell (with administrator privileges) from Windows Run.

powershell
powershell

Primary Domain Controller’s NTP configuration command

Color mode
$NTPSERVERS = "198.19.0.54,0x9"
$POLLINTERVAL = 6
w32tm /config /manualpeerlist:"$NTPSERVERS" /syncfromflags:MANUAL /update
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MaxPollInterval -Value $POLLINTERVAL
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MinPollInterval -Value $POLLINTERVAL
net stop w32time
net start w32time
w32tm /resync
w32tm /query /status
$NTPSERVERS = "198.19.0.54,0x9"
$POLLINTERVAL = 6
w32tm /config /manualpeerlist:"$NTPSERVERS" /syncfromflags:MANUAL /update
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MaxPollInterval -Value $POLLINTERVAL
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MinPollInterval -Value $POLLINTERVAL
net stop w32time
net start w32time
w32tm /resync
w32tm /query /status
Change PDC's NTP settings

Poll attempts time synchronization with a value of 2^PollInterval. PDC server uses the shortest possible synchronization interval because time accuracy is important.

Leap Indicator: 0(no warning)
Stratum: 4 (secondary reference - syncd by (S)NTP)
Precision: -23 (119.209ns per tick)
Root Delay: 0.0028150s
Root Dispersion: 7.8464434s
ReferenceId: 0xC6130036 (source IP:  198.19.0.54)
Last Successful Sync Time: 10/31/2025 3:41:12 PM
Source: 198.19.0.54,0x9
Poll Interval: 6 (64s)

When the NTP client configuration is completed, it has been synchronized based on the time of the NTP server 198.19.0.54. If the Source is displayed as the NTP server, the configuration and service restart have been completed successfully.

Secondary Domain Controller’s NTP configuration

Connect to the Secondary server and run Powershell (administrator privileges) from Windows.

powershell
powershell

NTP Settings

In an AD domain, a backup DC sets the NT5DS policy to synchronize time based on the PDC.

Secondary Domain Controller’s NTP configuration command

Color mode
$POLLINTERVAL = 6
w32tm /config /syncfromflags:domhier /update
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MaxPollInterval -Value $POLLINTERVAL
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MinPollInterval -Value $POLLINTERVAL
net stop w32time
net start w32time
w32tm /resync
w32tm /query /status
$POLLINTERVAL = 6
w32tm /config /syncfromflags:domhier /update
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MaxPollInterval -Value $POLLINTERVAL
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\W32Time\Config' -Name MinPollInterval -Value $POLLINTERVAL
net stop w32time
net start w32time
w32tm /resync
w32tm /query /status
Change NTP settings of auxiliary DC

Poll attempts time synchronization with a value of 2^PollInterval. DC servers use the shortest possible synchronization interval because time accuracy is important.

Leap Indicator: 0(no warning)
Stratum: 5 (secondary reference - syncd by (S)NTP)
Precision: -23 (119.209ns per tick)
Root Delay: 0.0045627s
Root Dispersion: 7.9036352s
ReferenceId: 0x0A00026F (source IP:  192.168.10.5)
Last Successful Sync Time: 10/31/2025 8:22:41 PM
Source: addc-1.scp.test
Poll Interval: 6 (64s)

When the NTP client configuration is completed, the NTP time source is set to the PDC server addc-1.scp.test, and the time has been synchronized correctly. If the Source is displayed as an NTP server, the configuration is correct and the NTP service restart has been completed.

Reference Document

Active Directory Domain Services Capacity Planning
Best practices for DNS client settings in Windows Server
Service overview and network port requirements for Windows