Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


Computer are authenticating to 2 DC's

Posted on 2012-09-04
Medium Priority
Last Modified: 2012-09-04
I have two new DC's and some of our computers are authenticating to one and some to the other.  Why is that?
I just want to make sure there isn't a problem brewing.
Question by:J.R. Sitman
  • 2
LVL 39

Accepted Solution

Krzysztof Pytko earned 600 total points
ID: 38363575
That's OK :) This is normal AD configuration. Computers/users are authenticating along all available Domain Controllers in a Site. By default when config is not changed, Fefault-First-Site exists where all DCs are assigned.

That's standard netmask ordering and DNS round robin feature

LVL 35

Assisted Solution

by:Joseph Daly
Joseph Daly earned 600 total points
ID: 38363576
That is perfectly acceptable. If they are in the same site then they should authenticate to both.

If they are in different sites and it is taking a long time to authenticate the clients then you need to take a look in your AD sites and services and set up proper site boundaries.

Author Closing Comment

by:J.R. Sitman
ID: 38363622
Thanks.  the post were 2 seconds apart so I split the points.
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 38363638
You're welcome :)


Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Sometimes it necessary to set special permissions on user objects.  For instance when using a Blackberry server, the SendAs permission needs to be set. I see many admins struggle with the setting that permission only to see it disappear within a few…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question