You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: WindowsServerDocs/administration/windows-commands/nslookup-set-retry.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.date: 10/16/2017
11
11
12
12
13
13
14
-
If a reply isn't received within a certain amount of time, the time-out period is doubled, and the request is resent. This command sets the number of times a request is resent to a server for information, before giving up.
14
+
This command sets the number of times a request is resent to a server for information, before giving up.
15
15
16
16
> [!NOTE]
17
17
> To change the length of time before the request times out, use the [nslookup set timeout](nslookup-set-timeout.md) command.
@@ -26,7 +26,7 @@ set retry=<number>
26
26
27
27
| Parameter | Description |
28
28
| ---------- | ---------- |
29
-
|`<number>`| Specifies the new value for the number of retries. The default number of retries is **4**. |
29
+
|`<number>`| Specifies the new value for the number of retries. The default number of retries is **1**. |
Copy file name to clipboardExpand all lines: WindowsServerDocs/administration/windows-commands/nslookup-set-timeout.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.date: 10/16/2017
11
11
12
12
13
13
14
-
Changes the initial number of seconds to wait for a reply to a lookup request. If a reply isn't received within the specified amount of time, the time-out period is doubled, and the request is resent. Use the [nslookup set retry](nslookup-set-retry.md) command to determine the number of times to try to send the request.
14
+
Changes the number of seconds to wait for a reply to a lookup request. Use the [nslookup set retry](nslookup-set-retry.md) command to determine the number of times to try to send the request.
15
15
16
16
## Syntax
17
17
@@ -23,16 +23,16 @@ set timeout=<number>
23
23
24
24
| Parameter | Description |
25
25
| ---------- | ---------- |
26
-
|`<number>`| Specifies the number of seconds to wait for a reply. The default number of seconds to wait is **5**. |
26
+
|`<number>`| Specifies the number of seconds to wait for a reply. The default number of seconds to wait is **2**. |
27
27
| /? | Displays help at the command prompt. |
28
28
| /help | Displays help at the command prompt. |
29
29
30
30
### Examples
31
31
32
-
To set the timeout for getting a response to 2 seconds:
32
+
To set the timeout for getting a response to 5 seconds:
Copy file name to clipboardExpand all lines: WindowsServerDocs/identity/ad-ds/active-directory-functional-levels.md
+32-15Lines changed: 32 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,24 +1,43 @@
1
1
---
2
2
title: Active Directory Domain Services Functional Levels
3
-
description: Learn more about the different Active Directory domain and forest functional levels in Windows Server.
3
+
description: Discover the capabilities of Active Directory Domain Services functional levels and learn how they impact domain controllers and Windows Server compatibility.
4
+
#customer intent: As an IT admin, I want to understand the functional levels of Active Directory Domain Services so that I can determine the capabilities available in my environment.
4
5
ms.topic: concept-article
5
6
ms.author: roharwoo
6
7
author: robinharwood
7
-
ms.date: 10/03/2025
8
+
ms.date: 10/30/2025
8
9
---
10
+
9
11
# Active Directory Domain Services functional levels
10
12
11
13
Functional levels determine the available Active Directory Domain Services (AD DS) domain or forest capabilities. They also determine which Windows Server operating systems you can run on domain controllers in the domain or forest. However, functional levels don't affect which operating systems you can run on workstations and member servers joined to the domain or forest. This article describes which functioning levels are compatible with which versions of Windows Server.
12
14
13
-
When you deploy AD DS, set the domain and forest functional levels to the highest value that your environment can support in order to use as many AD DS features as possible. When you deploy a new forest, you need to set both the forest and domain functional levels. You can set the domain functional level to a value that's higher than the forest functional level, but you can't set the domain functional level to a value that's lower than the forest functional level.
15
+
When you deploy AD DS, set the domain and forest functional levels to the highest value that your environment can support in order to use as many AD DS features as possible. When you deploy a new forest, you need to set both the forest and domain functional levels. You can set a domain functional level higher than the forest functional level. You can't set a domain functional level lower than the forest functional level.
16
+
17
+
## Windows Server functional level interoperability
18
+
19
+
The following interoperability matrix summarizes which Windows Server versions you can run as domain controllers for each currently supported AD DS forest and domain functional level.
14
20
15
-
## Windows Server 2025 functional levels
21
+
| Windows Server version (DC) | Windows Server 2025 functional level | Windows Server 2016 functional level | Windows Server 2012 R2 functional level |
| Windows Server 2025 | ✅ Supported | ✅ Supported | ❌ Not supported |
24
+
| Windows Server 2022 | ❌ Not supported | ✅ Supported | ✅ Supported |
25
+
| Windows Server 2019 | ❌ Not supported | ✅ Supported | ✅ Supported |
26
+
| Windows Server 2016 | ❌ Not supported | ✅ Supported | ✅ Supported |
27
+
| Windows Server 2012 R2 | ❌ Not supported | ❌ Not supported | ✅ Supported |
28
+
29
+
✅ Supported means you can run a domain controller with that Windows Server release at the specified forest and domain functional level; ❌ Not supported means you cannot.
30
+
31
+
> [!NOTE]
32
+
> Windows Server 2019 and Windows Server 2022 use Windows Server 2016 as the most recent functional level. For earlier functional levels (for example Windows Server 2008 R2), see [Understanding Active Directory Domain Services (AD DS) Functional Levels](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754918(v=ws.10)).
33
+
34
+
### Windows Server 2025 functional levels
16
35
17
36
You can use the following operating systems as domain controllers (DCs) with the Windows Server 2025 forest and domain functional level.
18
37
19
38
- Windows Server 2025
20
39
21
-
### Windows Server 2025 forest and domain functional level features
40
+
####Windows Server 2025 forest and domain functional level features
22
41
23
42
The Windows Server 2025 domain functional level includes all features available in earlier domain functional levels, but also has the following new features:
24
43
@@ -29,7 +48,7 @@ To learn more about new features, see [What's new in Windows Server 2025](../../
29
48
> [!NOTE]
30
49
> Windows Server 2019 and Windows Server 2022 use Windows Server 2016 as the most recent functional levels.
31
50
32
-
## Windows Server 2016 functional levels
51
+
###Windows Server 2016 functional levels
33
52
34
53
You can use the following operating systems as domain controllers (DCs) with the Windows Server 2016 forest and domain functional level.
35
54
@@ -39,9 +58,9 @@ You can use the following operating systems as domain controllers (DCs) with the
39
58
- Windows Server 2016
40
59
41
60
> [!NOTE]
42
-
> Domains must use DFSR as the engine to replicate SYSVOL. To learn more about migrating to DFSR, see [Streamlined Migration of FRS to DFSR SYSVOL](https://techcommunity.microsoft.com/t5/storage-at-microsoft/streamlined-migration-of-frs-to-dfsr-sysvol/ba-p/425405). Windows Server 2016 is the last Windows Server release that supports the File Replication Service (FRS). See [Windows Server version 1709 no longer supports FRS](/troubleshoot/windows-server/networking/windows-server-version-1709-no-longer-supports-frs) for information on how to work around this issue.
61
+
> Domains must use DFSR as the engine to replicate SYSVOL. To learn more about migrating to DFSR, see [Streamlined Migration of FRS to DFSR SYSVOL](https://techcommunity.microsoft.com/blog/filecab/streamlined-migration-of-frs-to-dfsr-sysvol/425405). Windows Server 2016 is the last Windows Server release that supports the File Replication Service (FRS). See [Windows Server version 1709 no longer supports FRS](/troubleshoot/windows-server/networking/windows-server-version-1709-no-longer-supports-frs) for information on how to work around this issue.
43
62
44
-
### Windows Server 2016 forest and domain functional level features
63
+
####Windows Server 2016 forest and domain functional level features
45
64
46
65
All default Active Directory features in earlier forest functional levels are available, plus the following features:
47
66
@@ -55,7 +74,7 @@ All default Active Directory features in earlier domain functional levels are av
55
74
56
75
For more information, see [What's New in Kerberos Authentication](../../get-started/whats-new-in-windows-server-2016.md#kerberos-authentication).
57
76
58
-
## Windows Server 2012 R2 functional levels
77
+
###Windows Server 2012 R2 functional levels
59
78
60
79
You can use the following operating systems as domain controllers (DCs) with the Windows Server 2012 R2 forest and domain functional level.
61
80
@@ -64,15 +83,15 @@ You can use the following operating systems as domain controllers (DCs) with the
64
83
- Windows Server 2016
65
84
- Windows Server 2012 R2
66
85
67
-
### Windows Server 2012 R2 forest and domain functional level features
86
+
####Windows Server 2012 R2 forest and domain functional level features
68
87
69
88
All default Active Directory features, all features from the Windows Server 2012 domain functional level, plus the following features:
70
89
71
90
- DC-side protections for Protected Users. When Protected Users authenticate to a Windows Server 2012 R2 domain, they're no longer able to:
72
91
73
92
- Authenticate with NTLM authentication.
74
93
75
-
- Use DES or RC4 cipher suites in Kerberos pre-authentication.
94
+
- Use DES or RC4 cipher suites in Kerberos preauthentication.
76
95
77
96
- Be delegated with unconstrained or constrained delegation.
78
97
@@ -86,9 +105,9 @@ All default Active Directory features, all features from the Windows Server 2012
86
105
87
106
- A new forest-based Active Directory object to be used to classify accounts for authentication policies or for authentication isolation. The new object can create a relationship between user, managed service, and computer accounts.
88
107
89
-
## Functional and domain levels in previous versions of Windows Server
108
+
###Functional and domain levels in previous versions of Windows Server
90
109
91
-
If you want to identify functional levels for a previous version of Windows Server, see [Understanding Active Directory Domain Services (AD DS) Functional Levels](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754918(v=ws.10)).
110
+
If you want to identify functional levels for a previous version of Windows Server, such as Windows Server 2008 R2, see [Understanding Active Directory Domain Services (AD DS) Functional Levels](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754918(v=ws.10)).
92
111
93
112
## Related content
94
113
@@ -97,5 +116,3 @@ If you want to identify functional levels for a previous version of Windows Serv
97
116
- Use the PowerShell command [Set-ADDomainMode](/powershell/module/activedirectory/set-addomainmode) to raise the domain functional level.
98
117
99
118
- To learn more about raising the domain and forest functional levels, see [How to raise Active Directory domain and forest functional levels](/troubleshoot/windows-server/active-directory/raise-active-directory-domain-forest-functional-levels).
0 commit comments