Does Active Directory have two types of replication?

I have been working on various networking and security projects lately that involve active directory (AD) and have noticed that our clients are still using old Microsoft AD versions. Here are a few things I’ve learned along the way about AD and some of the efficiencies gained when upgrading to a “more recent” version.

If you’ve been using Microsoft AD since the 2003 version or earlier, then there is a chance that you are using an old and inefficient method of replication known as file replication service (FRS) versus the more modern distributed file system replication(DFSR) method. Utilizing the “an old” version of software is not necessarily a reason to move to a new version, but in this case there are many reasons to research the new method and upgrade if the improvements warrant a change.

Why is DFSR better than FRS?

Both methods replicate the SYSVOL folder between domain controllers, but they do so very differently. For starters, FRS is only capable of replicating whole files, while DFSR replicates changes at the block level. This greatly reduces the amount of data that must move between domain controllers and can reduce WAN capacity requirements for larger environments significantly. As you might guess, DFSR utilizes the Microsoft Distributed File System which has many other uses.

Beyond efficiency, you might consider these several reasons for moving to DFSR:

  1. FRS is in maintenance mode at Microsoft with no new features being added
  2. If you use “read only” domain controllers for remote offices, there are cases where FRS does not fully replicate
  3. There are very few options for monitoring/instrumenting FRS replication
  4. For more reasons, see this informative article on Technet — written in 2010!: https://blogs.technet.microsoft.com/askds/2010/04/22/the-case-for-migrating-sysvol-to-dfsr/
Support for FRS in Windows Server is probably going away… soon…

The original plan was for Windows Server 2016 to have no support for FRS. At the last minute, Microsoft changed this plan, which is a good indication that many users have not yet made the change to DFSR. It would be a large surprise for this extension to carry through to 2016R2 or whatever the next Windows Server release is called as it’s been more than a decade since there have been any changes to the FRS code.

Where are you running today? Hint, (‘Eliminated’) is better than (‘Start’)

It’s very easy to determine which replication method is currently being used in your environment. From PowerShell or an administrative command prompt, run the following command:

“dfsrmig /getmigrationstate”

If you are using FRS, then your result will look like this:

The statement about “All Domain Controllers have migrated successfully” is deceiving. The “Start” state actually translates to FRS being used for the domain and means migration has not started much less completed as the word “successfully” in the response implies.

If you are using DRFS, then your result will look like the following image.

The screen capture below shows the result for a domain that has completely migrated to DFSR. Any result that differs from these two examples indicates a partial migration has occurred. As before, the terminology is a bit odd, as “Eliminated” usually doesn’t really sound like a desired state for anything. In this case, however it is where you want to be as this indicates that FRS is completely eliminated from your AD replication process.

We’re still using FRS, What are our options?

The Microsoft guide for DFSR migration can be found at the following link: https://www.microsoft.com/en-us/download/details.aspx?id=4843

The guide is 52 pages long and fully explains what is required to accomplish this task. If your internal IT staff does not have the needed training or experience or simply does not have the available time to devote to this task, then we would be glad to help. If you do choose to do this on your own, do not be alarmed if the first of three migration stages takes a long time. Depending on the size of your domain and other factors, this stage can take hours or even days to complete.

After you have completed the migration, you will enjoy faster and more reliable replication, reduced bandwidth usage between sites, and will have more options for instrumenting this critical part of your active directory infrastructure to keep tabs on its health.

Active Directory is a system which offers centralized control of your computers.

Modules

Active Directory Infrastructure

Lessons

  • Introduction to Active Directory
  • New Features Windows Server 2008 R2
  • Active Directory under the hood
  • Active Directory Forest and Trees
  • Active Directory system requirements
  • Installing Active Directory
  • Installing Active Directory on Server Core
  • Global Catalog
  • Operation Master Roles
  • Moving operational master roles
  • Operation Master Role and Global Catalog Placement
  • Seizing operational master roles
  • Settings an external time source
  • Domain functional levels
  • Forest Functional Levels
  • Upgrading Active Directory
  • Adding a child domain
  • Active Directory Trusts
  • Sites and Subnets
  • Active Directory Replication

Maintaining Active Directory Objects

Lessons

  • Creating a user
  • Computer Accounts
  • Windows Groups
  • Group Types
  • Default Local Groups
  • Built-in Groups Domain Controllers and Server
  • Domain Groups
  • Special Identities
  • AGDLP
  • AGUDLP
  • Universal Group Caching
  • Contacts
  • Protected Admin
  • Service Accounts
  • Managed Service Accounts
  • Offline Domain Join
  • OU and Shadow Groups
  • Delegation of Control
  • Active Directory Command Line Tools
  • CSVDE and LDIFDE
  • PowerShell
  • VBScript
  • Active Directory Migration Tool
  • RSAT and Snap-ins

Group Policy

Lessons

  • Group Policy Introduction
  • Group Policy New Features
  • Configuring Group Policy
  • Installing Group Policy Tools
  • Group Policy Processing Order
  • Group Policy Enforced and Blocked
  • Group Policy Loopback Processing
  • Group Policy Preferences
  • Group Policy Starter GPOs
  • Group Policy Filtering
  • Group Policy Replication
  • Group Policy Restricted Groups
  • Local Group Management with Preferences
  • Group Policy Software Deployment Concepts
  • Group Policy Software Deployment
  • AppLocker
  • Optimization
  • Troubleshooting Group Policy
  • Security Templates
  • Security Configuration Wizard
  • Windows Auditing
  • Active Directory Auditing
  • Active Directory Password Polices
  • Fine-Grained Password Policies
  • Deny Domain Local Group

DNS

Lessons

  • Windows DNS Install Requirements
  • DNS install on Windows Server 2008 R2
  • DNS Namespace
  • Recursive and Iterative Queries
  • Configuring Root Hints on Windows
  • DNS Zones
  • Windows DNS zone Demonstration
  • Creating DNS Records using Microsoft DNS
  • DNS Time to live, aging and scavenging
  • DNS Delegation Using Windows DNS
  • DNS Round Robin and Netmask Ordering
  • DNS GlobalNames
  • DNS and Active Directory
  • DNS Forwarding and Conditional Forwarding
  • DNS and Active Directory Partitions
  • DNS Split Brain

Federation Services

Lessons

  • Claim Based Identity Systems
  • Claims
  • Federation Services Terminology
  • AD FS Features
  • AD FS Minimum Requirements and Prerequisites
  • AD FS Components
  • Installing Enterprise CA for AD FS on Windows Server 2008 R2
  • Installing AD FS on Windows Server 2008 R2
  • Setting up HighCost Training AD FS 2008 R2
  • Relying Party Trust Theory
  • AD FS Configuring a Relying Party Trust Windows Server 2008 R2
  • AD FS Claims Provider Trust
  • Claims Provider Trust Demonstration

Certificates

Lessons

  • What is new in Certificate Services 2008 R2
  • Components of Certificate Services
  • Standalone and Enterprise CA’s
  • Setup CRL Distribution Points

How does replication work in Active Directory?

Replication is managed by the Knowledge Consistency Checker (KCC). The KCC manages replication between DCs in a single site by using automatically created connections. The KCC reads configuration data and reads and writes connection objects for DCs. The KCC only uses RPC to communicate with the directory service.

What is inbound and outbound replication in Active Directory?

Inbound replication is the incoming data transfer from a replication partner to a DC, and outbound replication is the data transfer from a DC to its replication partner.

What type of replication does Active Directory implement between domain controllers?

After AD departed from the traditional master-slave method of replication, it now uses a multi-master approach for the replication of directory data. As the name suggests, in the multi-master approach, each domain controller acts as a master and can replicate data to the other domain controllers.

What is urgent replication in Active Directory?

Urgent replication uses regular change notification between destination and source domain controller pairs that otherwise use change notification, but notification is sent immediately in response to urgent events instead of waiting the default period of 15 seconds.