You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/problems-with-dc-ad-integrated-dns-zones.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,11 +17,11 @@ _Applies to:_ Supported versions of Windows Server
17
17
18
18
## Symptoms
19
19
20
-
Domain Name System (DNS) registrations of SRV and domain controller (DC) locator A records (registered by Netlogon) and NS records (added by the authoritative DNS servers) in an Active Directory-integrated DNS zone for some DCs may not work in a domain that contains a large number of DCs.
20
+
Domain Name System (DNS) registrations of SRV and domain controller (DC) locator A records (registered by Netlogon) and NS records (added by the authoritative DNS servers) in an Active Directory-integrated DNS zone for some DCs might not work in a domain that contains a large number of DCs.
21
21
22
22
For Windows Server 2022 and earlier versions, you can have about 1200 DCs and DNS servers register all DNS records relevant to operate the DNS zones and domains. For Windows Server 2025, you can enable an optional feature that allows about 3200 DCs to register their DNS records. See the [References](#references) section for details.
23
23
24
-
One or more of the following error messages may be logged in the Event log:
24
+
One or more of the following error messages might be logged in the Event log:
25
25
26
26
```output
27
27
Event Type: Error
@@ -68,7 +68,7 @@ Description: The directory replication agent (DRA) was able to successfully appl
68
68
69
69
In an Active Directory-integrated DNS zone, DNS names are represented by dnsNode objects, and DNS records are stored as values in the multi-valued dnsRecord attribute on dnsNode objects, causing the error messages listed earlier in this article to occur.
70
70
71
-
This problem occurs because Active Directory has a limitation of approximately 1200 values that can be associated with a single object in Windows Server 2022 and earlier versions. For Windows Server 2025, this limit can be lifted to about 3200 values.
71
+
This problem occurs because Active Directory has a limitation of approximately 1,200 values that can be associated with a single object in Windows Server 2022 and earlier versions. For Windows Server 2025, this limit can be lifted to about 3,200 values.
72
72
73
73
## Resolution
74
74
@@ -78,7 +78,7 @@ You can use the following methods to resolve this issue.
78
78
79
79
### Method 1
80
80
81
-
If your DCs are also DNS servers, they all host the AD-integrated zones and all would add themselves to the NS record for the zone by default. If you exceed the limit for non-linked attributes, updates to the DNS record AD object will fail.
81
+
If your DCs are also DNS servers, they all host the AD-integrated zones and all would add themselves to the NS record for the zone by default. If you exceed the limit for nonlinked attributes, updates to the DNS record AD object will fail.
82
82
83
83
If you want to reduce the list of DNS servers that can add NS records corresponding to themselves to a specified zone, choose a subset of DNS servers and then run **Dnscmd.exe** with the `/AllowNSRecordsAutoCreation` switch. Consider having DCs in the list that are well-connected in the network and well-monitored. It could be a set of DCs running in your central datacenters.
84
84
@@ -103,7 +103,7 @@ If you want to reduce the list of DNS servers that can add NS records correspond
103
103
> [!NOTE]
104
104
> Run this command on only one DNS server. Active Directory replication propagates the changes to all DNS servers that are running on DCs in the same domain.
105
105
106
-
In an environment in which the majority of the DNS DCs for a domain are located in branch offices and a few are located in a central location, you may want to use the `Dnscmd` command described earlier in this article to set the IPList to include only the centrally located DNS DCs. By doing so, only the centrally located DNS DCs add their respective NS records to the Active Directory domain zone.
106
+
In an environment in which the majority of the DNS DCs for a domain are located in branch offices and a few are located in a central location, you might want to use the `Dnscmd` command described earlier in this article to set the IPList to include only the centrally located DNS DCs. By doing so, only the centrally located DNS DCs add their respective NS records to the Active Directory domain zone.
107
107
108
108
### Method 2
109
109
@@ -123,25 +123,25 @@ This value affects all Active Directory-integrated DNS zones. The values have th
123
123
124
124
|Value |Meaning |
125
125
|---------|---------|
126
-
|0 | DNS server automatically creates NS records for all Active Directory-integrated DNS zones unless any zone, that is hosted by the server, contains the AllowNSRecordsAutoCreation attribute (described earlier in this article) that does not include the server. In this situation, the server uses the AllowNSRecordsAutoCreation configuration. |
127
-
|1 | DNS server does not automatically create NS records for all Active Directory-integrated DNS zones, regardless of the AllowNSRecordsAutoCreation configuration in the Active Directory-integrated DNS zones. |
126
+
|0 | DNS server automatically creates NS records for all Active Directory-integrated DNS zones unless any zone, that is hosted by the server, contains the AllowNSRecordsAutoCreation attribute (described earlier in this article) that doesn't include the server. In this situation, the server uses the AllowNSRecordsAutoCreation configuration. |
127
+
|1 | DNS server doesn't automatically create NS records for all Active Directory-integrated DNS zones, regardless of the AllowNSRecordsAutoCreation configuration in the Active Directory-integrated DNS zones. |
128
128
129
129
> [!NOTE]
130
130
> To apply the changes to this value, you must restart the DNS Server service.
131
131
132
-
## Experiencing the problem for the SRV and A records of a zone owned by Domain Controllers
132
+
## Experiencing the problem for the SRV and A records of a zone owned by DCs
133
133
134
134
> [!IMPORTANT]
135
135
> This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information, see [How to back up and restore the registry in Windows](https://support.microsoft.com/topic/how-to-back-up-and-restore-the-registry-in-windows-855140ad-e318-2a13-2829-d428a2ab0692).
136
136
137
-
Netlogon is managing the registration of a DCs DNS records. To prevent a DC from attempting dynamic updates of certain DNS records that by default are dynamically updated by Netlogon, use Regedt32.exe to configure the following registry value:
137
+
Netlogon is managing the registration of a DCs DNS record. To prevent a DC from attempting dynamic updates of certain DNS records that by default are dynamically updated by Netlogon, use Regedt32.exe to configure the following registry value:
> It is not necessary to restart the Netlogon service. If the DnsAvoidRegisterRecords registry value is created or modified while the Netlogon service is stopped or within the first 15 minutes after Netlogon is started, appropriate DNS updates take place with a short delay (however, the delay is no later than 15 minutes after Netlogon starts).
175
+
> It isn't necessary to restart the Netlogon service. If the DnsAvoidRegisterRecords registry value is created or modified while the Netlogon service is stopped or within the first 15 minutes after Netlogon is started, appropriate DNS updates take place with a short delay (however, the delay is no later than 15 minutes after Netlogon starts).
176
176
177
177
You can also set the list of DNS records to suppress using a Group Policy:
178
178
@@ -183,9 +183,9 @@ DNS registrations of A records performed by Netlogon can be also be modified by
183
183
Be aware that both the DnsAvoidRegisterRecords and the RegisterDnsARecords registry values need to allow registering the host (A) record:
184
184
185
185
- RegisterDnsARecords = 0x1<br>
186
-
If you list LdapIpAddress and GcIpAddress in the DnsAvoidRegisterRecords registry value settings, A records are not registered.
186
+
If you list LdapIpAddress and GcIpAddress in the DnsAvoidRegisterRecords registry value settings, A records aren't registered.
187
187
- RegisterDnsARecords = 0x0<br>
188
-
No matter whether you list LdapIpAddress and GcIpAddress in the DnsAvoidRegisterRecords registry value settings, A records are not registered.
188
+
No matter whether you list LdapIpAddress and GcIpAddress in the DnsAvoidRegisterRecords registry value settings, A records aren't registered.
189
189
190
190
To prevent the problem described earlier in this article from occurring in an environment in which a set of DCs and/or global catalog (GC) servers are located in a central location and a large number of the DCs and/or GC servers are located in branch offices, the administrator can disable registration of some of the DNS records by Netlogon on the DCs/GCs in the branch offices. In this situation, the list of mnemonics that should not be registered includes:
191
191
@@ -213,20 +213,20 @@ GC-specific records:
213
213
214
214
> [!NOTE]
215
215
> These lists do not include the site-specific records. Therefore, DCs and GC servers in branch offices are located by site-specific records that are usually used by a DC locator. If a program searches fora DC/GC by using generic (non-site-specific) records such as any of the recordsin the lists that are listed earlier in this article, it finds a DC/GC in the central location.
216
+
>
217
+
> Read-Only DCs default to registering DNS records specific to their site.
216
218
217
-
Read-Only DCs default to registering DNS records specific to their site.
219
+
An administrator might also choose to limit the number of the DC locator records such as SRV and A records registered by Netlogon for the same generic DNS name (_ldap._tcp.dc._msdcs.\<DomainName>), even in a scenario with fewer DCs than the non-linked attribute value limit in the same domain, to reduce the size of DNS responses to queries for such records.
218
220
219
-
An administrator may also choose to limit the number of the DC locator records such as SRV and A records registered by Netlogon for the same generic DNS name (_ldap._tcp.dc._msdcs.\<DomainName>), even in a scenario with fewer DCs than the non-linked attribute value limit in the same domain, to reduce the size of DNS responses to queries for such records.
220
-
221
-
You can create this setting in a Group Policy linked to the Domain Controllers OU, put all branch DCs into a "AD Branch DCs" group and set the Group Policy to apply only to members of the "AD Branch DCs" group.
221
+
You can create this setting in a Group Policy linked to the Domain Controllers OU, put all branch DCs into an "AD Branch DCs" group and set the Group Policy to apply only to members of the "AD Branch DCs" group.
222
222
223
223
## Status
224
224
225
225
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
226
226
227
227
## More Information
228
228
229
-
Every DNS server that is authoritative for an Active Directory-integrated DNS zone adds an NS record. By default, every DC in a domain registers an SRV record for a set of non-site-specific names such as "_ldap._tcp.\<domain_name>" and A record(s) that map(s) the Active Directory DNS domain name to the TCP/IP address(es) of the DC. When a DNS server tries to write a record with many values for the same shared name, Local Security Authority Subsystem (LSASS) runs at 100 percent CPU usage for approximately 10 seconds and the registration does not succeed. Netlogon retries this registration every hour; the 100 percent CPU usage spike reappears at least once an hour and the attempted registrations do not succeed.
229
+
Every DNS server that is authoritative for an Active Directory-integrated DNS zone adds an NS record. By default, every DC in a domain registers an SRV record for a set of non-site-specific names such as "_ldap._tcp.\<domain_name>" and A record(s) that map(s) the Active Directory DNS domain name to the TCP/IP address(es) of the DC. When a DNS server tries to write a record with many values for the same shared name, Local Security Authority Subsystem (LSASS) runs at 100 percent CPU usage for approximately 10 seconds and the registration doesn't succeed. Netlogon retries this registration every hour; the 100 percent CPU usage spike reappears at least once an hour and the attempted registrations don't succeed.
0 commit comments