Virtualizing Active Directory Domain Services on Vmware Vsphere®

Virtualizing Active Directory Domain Services on Vmware Vsphere®

Virtualizing Active Directory Domain Services On VMware vSphere® Release 3.0 December 2020 uction Version 2.0.1 October 2011 Virtualizing Active Directory Domain Services on VMware vSphere © 2014 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2020 VMware, Inc. All rights reserved. Page 2 of 65 Virtualizing Active Directory Domain Services on VMware vSphere Contents 1. Introduction .................................................................................... 7 1.1 Purpose ........................................................................................................................ 7 1.2 Target Audience ........................................................................................................... 7 1.3 Scope ........................................................................................................................... 7 2. Why Virtualize Active Directory? ................................................... 9 2.1 Workload Characteristics .............................................................................................. 9 2.2 Virtualization is Mainstream ........................................................................................ 10 2.3 Availability ................................................................................................................... 10 3. Understanding Domain Controller Virtualization ......................... 11 3.1 Securing Virtualized Domain Controllers .................................................................... 11 3.2 Protecting AD DS against Virtual Infrastructure Failures ............................................ 13 3.3 Time Synchronization ................................................................................................. 13 3.4 USN Rollback ............................................................................................................. 14 3.5 Windows Server 2012 Virtualization Safeguards ........................................................ 19 4. Best Practices for Virtualizing Domain Controllers ..................... 28 4.1 Timekeeping ............................................................................................................... 28 4.2 Completely Disabling Time Sync for Domain Controllers ........................................... 31 4.3 vSphere HA and vSphere DRS................................................................................... 32 4.4 Domain Controller Golden Templates ......................................................................... 37 4.5 Disaster Recovery of Domain Controllers ................................................................... 38 5. Conclusion.................................................................................... 42 Appendix A: Testing Domain Controller Cloning ................................ 43 Appendix B: Testing Domain Controller Safeguard ........................... 60 © 2020 VMware, Inc. All rights reserved. Page 3 of 65 Virtualizing Active Directory Domain Services on VMware vSphere List of Figures Figure 1. Active Directory Replication ........................................................................................... 16 Figure 2. Users Created After a Virtual Machine Snapshot .......................................................... 17 Figure 3. Domain Controller Reverted to Previous Snapshot ....................................................... 17 Figure 4. USN Rollback Effect after Reverting DC-1 Snapshot .................................................... 18 Figure 5. Microsoft Hyper-V Generation Counter Device ............................................................. 19 Figure 6. Virtual Machine Guest Operating System Version ........................................................ 20 Figure 7. msDS-GenerationId Attribute ........................................................................................ 22 Figure 8. Domain Controller Snapshot Reversion with Safeguard................................................ 23 Figure 9. Replication After Safeguard ........................................................................................... 24 Figure 10. Generating a Custom Application Allow List ................................................................ 25 Figure 11. New-ADDCCloneConfigFile Command ....................................................................... 26 Figure 12. Time Synchronization for ESXi Host and PDC Emulator ............................................. 28 Figure 13. Time Synchronization Using a Domain Hierarchy ....................................................... 30 Figure 14. VM Restart Priority ...................................................................................................... 32 Figure 15. Enabling Virtual Machine Monitoring in vSphere HA ................................................... 33 Figure 16. DRS Anti-Affinity Rule ................................................................................................. 34 Figure 17. Virtual Machine and Host DRS Groups ....................................................................... 35 Figure 18. Should-Run-On DRS Rule ........................................................................................... 36 Figure 19. Using Primary Site Domain Controller During Recovery Plan Testing......................... 39 Figure 20. Cloning Recovery Site Domain Controller During Recovery Plan Testing ................... 40 Figure 21. Protecting Operations Master Role Holders ................................................................ 41 Figure 22. Custom Allow XML File ............................................................................................... 50 Figure 23. Generating DC Clone Configuration File ..................................................................... 53 Figure 24. Shutting Down the Domain Controller ......................................................................... 54 Figure 25. Verifying Replication .................................................................................................... 60 Figure 26. Taking a Virtual Machine Snapshot ............................................................................. 61 Figure 27. Verifying that Users Exist on All Domain Controllers ................................................... 62 Figure 28. Verifying Users After Reversion................................................................................... 63 Figure 29. Validating Replication and InvocationID ...................................................................... 64 © 2020 VMware, Inc. All rights reserved. Page 4 of 65 Virtualizing Active Directory Domain Services on VMware vSphere List of Tables Table 1. Virtual Machine State Changes ...................................................................................... 21 Table 2. Domain Controller Cloning Events .................................................................................. 59 Table 3. Domain Controller Safeguard Events ............................................................................. 65 © 2020 VMware, Inc. All rights reserved. Page 5 of 65 Virtualizing Active Directory Domain Services on VMware vSphere © 2020 VMware, Inc. All rights reserved. Page 6 of 65 Virtualizing Active Directory Domain Services on VMware vSphere 1. Introduction As the prominent directory service and authentication store, Active Directory Domain Services (AD DS) is in the majority of network infrastructures. In some environments AD DS is viewed as another required service, but it does not attract much attention. In other environments AD DS is treated as the business critical application (BCA) that it is. Considering that the ability to access network resources and the Internet, look up user information, and use email often requires AD DS, it is worth understanding the importance of this service and the stability of its underlying infrastructure. In much the same way that the criticality of AD DS differs from organization to organization, so does the acceptance of virtualizing this service. More conservative organizations choose to virtualize a portion of the AD DS environment and retain a portion on physical hardware. The cause is typically misinformation, lack of experience in virtualization, or fear of the unknown. With the release of Windows Server 2012, new features alleviate many of the legitimate concerns that administrators have about virtualizing AD DS. These new features, the latest versions of VMware® vSphere®, and recommended practices help achieve 100 percent virtualization of AD DS. The majority of the considerations enumerated in this documents have not changed substantially over the years. While additional enhancements in both Active Directory Domain Services, the Windows Operating System and VMware vSphere have combined to make virtualizing Domain Controllers on vSphere have safer, more secured and more reliable, only a few of them alter the prescriptive guidance originally provided in this document. For example, since this document was originally published, support

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    65 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us