Solved

Checklist to validate that AD Site, Subnets, and Costs have been applied properly and working

Posted on 2015-02-12
2
78 Views
Last Modified: 2015-02-24
Hello,
WE are upgrading all the environment from 2003 to 2012 DC. WE are building all new 2012 r2 DCs and migrating the DNS and DHCP. What would be the steps to validate that AD Site, Subnets, and Costs have been applied properly and working. Also, we need to validate that users are being authenticated by the Domain Controller within their geographic site  and receive GPO from their geographic zone and not from DC somewhere else. Could you please let me know how to do it and all the commands/steps that I need to run. THank you very much.
0
Comment
Question by:creative555
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
rgorman earned 500 total points
ID: 40606395
All the sites and subnets from the existing environment will still apply in the new environment.  You shouldn't have to do anything with that other than at least confirm there are connection objects created between the new DC's and the old DC's in your various sites in sites and services.  Make sure at least one of the new DC's is configured as a global catalog server as well (if not all of them).
0
 

Author Comment

by:creative555
ID: 40607315
IS that is? WHat are the tests to verify that Subnets, and Costs have been applied properly and working. Could you please list more steps on how to verify good subnets and costs and that there is no slowness, etc. THank you so much
0

Featured Post

Turn Insights into Action

Communication across every corner of your business is essential to increase the velocity of your application delivery and support pipeline. Automate, standardize, and contextualize your communication processes with xMatters.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question