Solved

Question about Hyper v virtual domain controller?

Posted on 2010-09-06
4
468 Views
Last Modified: 2013-11-06
I have a Windows 2008 DC with FSMO roles and Exchange 2010 Server. I am considering a P2V migration to Hyper V . Is there anything I need to consider as a precaution for Active Directory replication with the other GC or any other issue in mind?
0
Comment
Question by:355LT1
  • 2
4 Comments
 
LVL 6

Expert Comment

by:Joshua_Peters
Comment Utility
We run all our DC's except one as virtual. It really is the way to go when it is so easy to migrate to newer equipment in the future.
0
 

Author Comment

by:355LT1
Comment Utility
Not sure if I need another question but I thought what if the Hyper v server motherboard dies and I have a 2 week old VHD  clone on the DC with Exchange 2010 Server and copy it to  a new server mount it  and restore the Information Store  from backup, would that be a good recover plan?
0
 
LVL 6

Accepted Solution

by:
Joshua_Peters earned 250 total points
Comment Utility
Yes. I always have backups of backup. It may be a good idea to have an extra server board of the same kind to limit down time. You can access the virtual machine from another machine if the main one goes down because the VHD are just like pulling a real drive out and swapping in an identical drive. Virtual is the way of the future.
0
 
LVL 21

Assisted Solution

by:snusgubben
snusgubben earned 250 total points
Comment Utility
Do you have more than one DC?

If Yes, you can't just restore the image as you'll end up in a USN-rollback state.

http://blogs.technet.com/b/askds/archive/2009/06/05/dc-s-and-vm-s-avoiding-the-do-over.aspx
(you should also read the discussion in the thread)


The DS Team also made a two part how-to virtualize DCs:

http://blogs.technet.com/b/askds/archive/2010/06/10/how-to-virtualize-active-directory-domain-controllers-part-1.aspx

http://blogs.technet.com/b/askds/archive/2010/06/15/how-to-virtualize-active-directory-domain-controllers-part-2.aspx
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Mapping Drives using Group policy preferences Are you still using old scripts to map your network drives if so this article will show you how to get away for old scripts and move toward Group Policy Preference for mapping them. First things f…
Synchronize a new Active Directory domain with an existing Office 365 tenant
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now