Solved

checklist to verify that 2012 DC is ready for production

Posted on 2015-01-27
3
70 Views
Last Modified: 2015-02-10
Hello,
Could you please share the checklist to verify that 2012 Server DC is ready for production. Once we verify that one 2012 DC is ready then we will clone the image to use to deploy other DCs. I just want to make sure that nothing is missing.

For example, verify that there is no errors in the event log, replication is working, etc, update # is in place, DNS service is running, etc
0
Comment
Question by:creative555
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 58

Expert Comment

by:Cliff Galiher
ID: 40573412
2012 has built in BPAs, including those for DNS and ADDS. As an aside, special considerations must be mad when cloning a DC. It isn't trivial and, in most cases, should not be used as a deployment method.
0
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 500 total points
ID: 40573550
Take a look at the technet below. This is a complete guide to Cloning DC's in a production environment.

- illustrates best practices
- things to consider
- VMGID compatibility
- Platform requirements
etc

Technet Active Directory 2012 DC Cloning

Will.
0
 

Author Closing Comment

by:creative555
ID: 40602157
THank you so much!!
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
In this Micro Tutorial viewers will learn how to restore single file or folder from Bare Metal backup image of their system. Tutorial shows how to restore files and folders from system backup. Often it is not needed to restore entire system when onl…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question