[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

DC Locator Setting in GP / Local Authentication

Posted on 2007-12-01
2
Medium Priority
?
577 Views
Last Modified: 2008-05-30
I have noticed that my clients are authenticating against domain controllers that are not local to them.  I have checked the site and services, the settings are correct.  I have been doing some research and located the option to setup the DC Locator Server http://searchwinit.techtarget.com/tip/0,289483,sid1_gci1283750,00.html ) .  If this option is configured, will it force the computers to authenticate to the subnets that are on that network vs. ones that are not?  Also, if forced, if those controllers are down will it authenticate to the local computer or search for remotes listed in DNS?
0
Comment
Question by:securitythreat
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 20390076
If you want clients to authenticate with particular domain controllers in preference to others then you need to configure Active Directory Sites properly.

You should start by defining your subnets in Active Directory Sites and services, then you need to create sites and associate one or more subnets with each site. Once that is done then clients will attempt to use a DC on their own site for authentication.

Of course is you want to minimise traffic across the subnets you should also place a DNS server in each site (easy to do if you use AD integrated DNS), and point clients to that DNS server as their preferred DNS server. Also the DC/DNS server should be made a global catalg server as well to provide GC lookups locally as well. If you are uding DHCP you could also look at localising that as well.

0
 
LVL 1

Author Comment

by:securitythreat
ID: 20390104
I have all this in place.  However, this is still an issue.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses

865 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question