?
Solved

priority of authenticate user in DCs

Posted on 2011-09-20
3
Medium Priority
?
194 Views
Last Modified: 2012-05-12
please if I have two domain controllers how can I clarify the priority example the user pc with which domain controller it will authenticate as the first choice and after the second if the first does not respond
0
Comment
Question by:DRRAM
  • 2
3 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 36570378
It will try to authenticate with a DC in its own site (assuming you have set up sites and services correctly).
Within sites (or within the domain if you have a single site), the client will attempt to try to authenticate with DCs according to the weighting and priority set in the SRV records in DNS
0
 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 36570386
if you want the full detail see http://support.microsoft.com/kb/247811
0
 

Author Closing Comment

by:DRRAM
ID: 36920518
thx
0

Featured Post

Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question