Skip to content

Commit 0dcd378

Browse files
committed
Update site-recovery-active-directory.md
1 parent 186a369 commit 0dcd378

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/site-recovery/site-recovery-active-directory.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ When you initiate a test failover, don't include all the domain controllers in t
101101
Beginning with Windows Server 2012, [additional safeguards are built into Active Directory Domain Services (AD DS)](https://technet.microsoft.com/windows-server-docs/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100). These safeguards help protect virtualized domain controllers against USN rollbacks if the underlying hypervisor platform supports **VM-GenerationID**. Azure supports **VM-GenerationID**. Because of this, domain controllers that run Windows Server 2012 or later on Azure virtual machines have these additional safeguards.
102102

103103

104-
When **VM-GenerationID** is reset, the **InvocationID** value of the AD DS database is also reset. In addition, the RID pool is discarded, and SYSVOL folder is marked as non-authoritative. For more information, see [Introduction to Active Directory Domain Services virtualization](https://technet.microsoft.com/windows-server-docs/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100) and [Safely virtualizing DFSR](https://blogs.technet.microsoft.com/filecab/2013/04/05/safely-virtualizing-dfsr/).
104+
When **VM-GenerationID** is reset, the **InvocationID** value of the AD DS database is also reset. In addition, the RID pool is discarded, and sysvol folder is marked as non-authoritative. For more information, see [Introduction to Active Directory Domain Services virtualization](https://technet.microsoft.com/windows-server-docs/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100) and [Safely virtualizing DFSR](https://blogs.technet.microsoft.com/filecab/2013/04/05/safely-virtualizing-dfsr/).
105105

106106
Failing over to Azure might cause **VM-GenerationID** to reset. Resetting **VM-GenerationID** triggers additional safeguards when the domain controller virtual machine starts in Azure. This might result in a *significant delay* in being able to sign in to the domain controller virtual machine.
107107

@@ -123,11 +123,11 @@ If virtualization safeguards are triggered after a test failover, you might see
123123

124124
![Invocation ID Change](./media/site-recovery-active-directory/Event1109.png)
125125

126-
* SYSVOL folder and NETLOGON shares aren't available.
126+
* Sysvol folder and NETLOGON shares aren't available.
127127

128-
![SYSVOL folder share](./media/site-recovery-active-directory/sysvolshare.png)
128+
![Sysvol folder share](./media/site-recovery-active-directory/sysvolshare.png)
129129

130-
![NtFrs SYSVOL folder](./media/site-recovery-active-directory/Event13565.png)
130+
![NtFrs sysvol folder](./media/site-recovery-active-directory/Event13565.png)
131131

132132
* DFSR databases are deleted.
133133

@@ -141,7 +141,7 @@ If virtualization safeguards are triggered after a test failover, you might see
141141
>
142142
>
143143
144-
1. At the command prompt, run the following command to check whether SYSVOL folder and NETLOGON folder are shared:
144+
1. At the command prompt, run the following command to check whether sysvol folder and NETLOGON folder are shared:
145145

146146
`NET SHARE`
147147

@@ -161,7 +161,7 @@ If the preceding conditions are satisfied, it's likely that the domain controlle
161161
* Although we don't recommend [FRS replication](https://blogs.technet.microsoft.com/filecab/2014/06/25/the-end-is-nigh-for-frs/), if you use FRS replication, follow the steps for an authoritative restore. The process is described in [Using the BurFlags registry key to reinitialize File Replication Service](https://support.microsoft.com/kb/290762).
162162

163163
For more information about BurFlags, see the blog post [D2 and D4: What is it for?](https://blogs.technet.microsoft.com/janelewis/2006/09/18/d2-and-d4-what-is-it-for/).
164-
* If you use DFSR replication, complete the steps for an authoritative restore. The process is described in [Force an authoritative and non-authoritative sync for DFSR-replicated SYSVOL folder (like "D4/D2" for FRS)](https://support.microsoft.com/kb/2218556).
164+
* If you use DFSR replication, complete the steps for an authoritative restore. The process is described in [Force an authoritative and non-authoritative sync for DFSR-replicated sysvol folder (like "D4/D2" for FRS)](https://support.microsoft.com/kb/2218556).
165165

166166
You can also use the PowerShell functions. For more information, see [DFSR-SYSVOL authoritative/non-authoritative restore PowerShell functions](https://blogs.technet.microsoft.com/thbouche/2013/08/28/dfsr-sysvol-authoritative-non-authoritative-restore-powershell-functions/).
167167

0 commit comments

Comments
 (0)