Solved

checklist to verify that 2012 DC is ready for production

Posted on 2015-01-27
3
69 Views
Last Modified: 2015-02-10
Hello,
Could you please share the checklist to verify that 2012 Server DC is ready for production. Once we verify that one 2012 DC is ready then we will clone the image to use to deploy other DCs. I just want to make sure that nothing is missing.

For example, verify that there is no errors in the event log, replication is working, etc, update # is in place, DNS service is running, etc
0
Comment
Question by:creative555
3 Comments
 
LVL 58

Expert Comment

by:Cliff Galiher
ID: 40573412
2012 has built in BPAs, including those for DNS and ADDS. As an aside, special considerations must be mad when cloning a DC. It isn't trivial and, in most cases, should not be used as a deployment method.
0
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 500 total points
ID: 40573550
Take a look at the technet below. This is a complete guide to Cloning DC's in a production environment.

- illustrates best practices
- things to consider
- VMGID compatibility
- Platform requirements
etc

Technet Active Directory 2012 DC Cloning

Will.
0
 

Author Closing Comment

by:creative555
ID: 40602157
THank you so much!!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Active Directory Account getting mysteriously locked 13 67
GPO on certain users 17 34
Windows Server 2012 R2 Advanced Event Logs 2 23
Application timeout 4 39
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question