With the schema now extended for Windows Server 2025, it’s time to move forward with installing Active Directory Domain Services (AD DS) on our new Server 2025 machines and promoting them to domain controllers. This is where our new infrastructure begins to take form. We’ll introduce our Windows Server 2025 Domain Controllers into an existing domain—running alongside our 2016 ones—and ensure a seamless, zero-downtime transition.
Installing the Active Directory Domain Services Role
Install the AD DS role on your new Windows Server 2025 machine. This will load all necessary binaries and management tools and promote the server as a domain controller.
Step 1: Install AD DS Role via PowerShell
On the new 2025 server (e.g., DC2025-1), log in as an administrator and open a PowerShell prompt:
1 | Install-WindowsFeature AD-Domain-Services -IncludeManagementTools |
This installs both the AD DS role and the AD management tools. Once complete, you can verify with:
1 | Get-WindowsFeature AD-Domain-Services |
It should report as Installed.
Promoting the Server to a Domain Controller
Now that the role is installed, the next step is to promote the server to a domain controller. We’ll use PowerShell to streamline the process and make it easily repeatable.
Step 2: Promote via PowerShell
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | Install-ADDSDomainController ` -DomainName "CONTOSO.COM" ` -InstallDns ` -SiteName "Default-First-Site-Name" ` -Credential ( Get-Credential "CONTOSO\Administrator" ) ` -DatabasePath "C:\Windows\NTDS" ` -LogPath "C:\Windows\NTDS" ` -SysvolPath "C:\Windows\SYSVOL" ` -SafeModeAdministratorPassword ( ConvertTo-SecureString "YourDSRMpassword" -AsPlainText -Force ) ` -Verbose |
Parameter Breakdown:
- DomainName: The domain to which the server will be added.
- InstallDns: Installs the DNS Server role.
- SiteName: Name of the AD site (default is usually “Default-First-Site-Name”).
- Credential: Supply an account with Domain Admin/Enterprise Admin rights.
- DatabasePath, LogPath, SysvolPath: Leave as default or customize.
- SafeModeAdministratorPassword: Set the DSRM password.
- Verbose: Get detailed output during promotion.
After successful execution, the server will reboot and begin the process of becoming a domain controller.
GUI Alternative
The server manager will show a post-installation task for those who prefer a graphical method. Click “Promote this server to a domain controller” and follow the wizard. Select “Add a domain controller to an existing domain” and provide the necessary details, including credentials and DSRM password. Then reboot when prompted.
Post-Promotion Validation
Once the server has rebooted and promotion completes:
- Log in using a domain account (local accounts are now disabled).
- Run dcdiag to verify the health of the new DC.
- Check Active Directory Users and Computers: Ensure the new DC appears in the Domain Controllers OU.
- Use Active Directory Sites and Services: Verify the NTDS Settings object exists under the correct site.
Confirm Global Catalog
Most new DCs are also Global Catalog servers by default. To confirm:
1 | Get-ADDomainController -Identity "DC2025-1" -Properties IsGlobalCatalog |
It should return IsGlobalCatalog: True.
Verify Replication
Use the following command to check replication:
1 2 3 | repadmin /replsummary repadmin /showrepl DC2025-1 |
Look for successful replication on all partitions.
Check DNS
Open DNS Manager and connect to the new DC. Confirm the zones (e.g., contoso.com and _msdcs.contoso.com) are present. Under the SRV records path, verify that the new DC has registered itself:
1 | nslookup -type =SRV _ldap._tcp.dc._msdcs.contoso.com |
Your new DC should appear alongside the existing ones.
Adding Additional Domain Controllers
For resilience and redundancy, repeat the process above on another Server 2025 machine (e.g., DC2025-2). Having two new DCs allows you to eventually decommission the legacy ones without creating a single point of failure.
Advanced Note: In large environments or remote locations with poor connectivity, use Install From Media (IFM) to stage the new DC and reduce replication overhead.
Ensuring Zero Downtime
Adding new DCs is a non-disruptive process. While the new DC is promoted, existing DCs continue serving clients. There’s no need to stop services or take the domain offline. The only interruption is rebooting the new server—users are unaffected.
Post-Promotion Cleanup
Update DNS Settings
Set the new DCs to point to each other or themselves for DNS resolution:
- DC2025-1: Primary DNS = itself; Secondary = DC2025-2
- DC2025-2: Primary DNS = itself; Secondary = DC2025-1
Avoid pointing to old 2016 DCs to reduce dependency.
Time Synchronization
New DCs will sync time from the current PDC Emulator. Just verify that their clocks are accurate. We’ll handle time master changes in a later part.
Monitor Event Logs and Performance
Watch for:
- Replication errors: Event ID 1311 or 1566
- Directory Service logs
- CPU/memory spikes
Test Authentication
Verify that clients can authenticate via the new DCs using tools like setting a logon server or temporarily shutting down old DCs.
Wrapping Up Part 3
Your domain is running in mixed mode with 2016 and 2025 domain controllers. Promotion has occurred with zero downtime, and replication is flowing. In the next part, we’ll begin adjusting SRV records and draining traffic from the old DCs to transition fully to the new environment. Onward!
Thanks,
Cristal Kawula – Checkyourlogs.net