Windows NT 4.0 Domain Controller Configuration Guide
Introduction
Windows NT 4.0's domain model provides centralized authentication and management for network resources. This guide covers the setup, configuration, and management of Primary Domain Controllers (PDC) and Backup Domain Controllers (BDC).
Understanding NT Domain Architecture
Domain Model Overview
- Single Master Model: Only the PDC can make changes to the domain database
- Flat Namespace: No hierarchical structure like Active Directory
- SAM Database: Security Accounts Manager stores user and computer accounts
- NetBIOS-based: Relies on NetBIOS name resolution
Domain Controller Roles
Primary Domain Controller (PDC)
- Maintains the master copy of the domain database
- Handles all password changes and account modifications
- Performs authentication for domain users
- Only one PDC per domain
Backup Domain Controller (BDC)
- Maintains read-only copy of domain database
- Provides authentication services
- Can be promoted to PDC if needed
- Multiple BDCs recommended for redundancy
Planning Your Domain Structure
Domain Limitations
- SAM Size: Maximum 40 MB (approximately 40,000 users)
- Domain Name: 15 characters maximum (NetBIOS limitation)
- Trust Relationships: Manual configuration required
- No Transitive Trusts: Each trust must be explicitly defined
Recommended Domain Models
Single Domain Model
Best for organizations with: - Less than 40,000 users - Centralized administration - Single geographic location
Master Domain Model
Suitable for: - Centralized user management - Decentralized resource management - Multiple departments
Multiple Master Domain Model
For large organizations with: - More than 40,000 users - Geographic distribution - Departmental autonomy
Setting Up Primary Domain Controller
Method 1: During Installation
- Start Windows NT Server Setup
- Choose Server Type
Select type of server: [X] Primary Domain Controller [ ] Backup Domain Controller [ ] Stand-alone Server
- Enter Domain Name
- Maximum 15 characters
- No spaces or special characters
- Example:
CORP
orHEADQUARTERS
Method 2: Promoting Stand-alone Server
-
Open Server Manager
Start → Programs → Administrative Tools → Server Manager
-
Promote to PDC
- Click Computer menu
- Select "Promote to Primary Domain Controller"
- Enter new domain name
-
Confirm promotion
-
Restart Server
- Required for changes to take effect
- Server will start as PDC
Initial PDC Configuration
- Set Administrator Password ``` User Manager for Domains → Administrator → Properties
- Set strong password
-
Document in secure location ```
-
Configure Computer Account ``` Server Manager → Computer → Properties
- Verify domain membership
- Check replication settings ```
Configuring Backup Domain Controllers
Installing BDC
- During NT Server Installation
- Select "Backup Domain Controller"
- Enter existing domain name
-
Provide domain administrator credentials
-
Network Requirements
- Must be able to contact PDC
- Requires NetBIOS name resolution
- WINS server recommended
BDC Synchronization Settings
- Open Server Manager on PDC
- Configure Replication ``` Computer → Properties → Replication
Replication Governor: - Pulse: 5 minutes - Pulse Concurrency: 10 - Pulse Maximum: 30 minutes ```
Managing Multiple BDCs
Best practices for BDC placement: - Geographic Distribution: Place BDCs at remote sites - Load Balancing: Distribute authentication load - Redundancy: Minimum 2 BDCs recommended - WAN Links: Configure appropriate replication intervals
Trust Relationships
Creating Trust Relationships
-
Open User Manager for Domains
Start → Programs → Administrative Tools → User Manager for Domains
-
Access Trust Relationships
Policies → Trust Relationships
-
Add Trusted Domain
- Click "Add" in Trusted Domains section
- Enter domain name and password
- Password must match on both domains
Trust Configuration Examples
One-Way Trust
Domain A trusts Domain B:
Domain A (Trusting):
- Add Domain B to Trusted Domains
- Users from Domain B can access Domain A resources
Domain B (Trusted):
- Add Domain A to Trusting Domains
- Users can access Domain A resources
Two-Way Trust
Mutual trust between domains: 1. Configure Domain A to trust Domain B 2. Configure Domain B to trust Domain A 3. Test access in both directions
Domain Security Configuration
Account Policies
Configure in User Manager for Domains:
- Password Policy ``` Policies → Account
Recommended Settings: - Maximum Password Age: 42 days - Minimum Password Age: 1 day - Minimum Password Length: 8 characters - Password Uniqueness: 5 passwords - Account lockout threshold: 3 attempts - Reset count after: 30 minutes - Lockout duration: 30 minutes ```
- User Rights ``` Policies → User Rights
Critical Rights to Configure: - Log on locally: Restrict on DCs - Access this computer from network: Domain Users - Change system time: Administrators only - Shut down the system: Administrators only ```
Audit Policy
Enable auditing for security monitoring:
User Manager → Policies → Audit
Recommended Audit Settings:
[X] Logon and Logoff
[X] Success [X] Failure
[X] File and Object Access
[X] Success [X] Failure
[X] Use of User Rights
[ ] Success [X] Failure
[X] User and Group Management
[X] Success [X] Failure
[X] Security Policy Changes
[X] Success [X] Failure
[X] Restart, Shutdown, and System
[X] Success [X] Failure
[X] Process Tracking
[ ] Success [ ] Failure
WINS Integration
Why WINS is Critical
- Provides NetBIOS name resolution
- Essential for domain controller location
- Required for browsing across subnets
WINS Configuration for DCs
-
Install WINS Service
Control Panel → Network → Services → Add Select "Windows Internet Name Service"
-
Configure WINS Client ``` TCP/IP Properties → WINS Address
- Primary WINS Server: [IP Address]
-
Secondary WINS Server: [IP Address] ```
-
Special NetBIOS Names Domain controllers register:
DOMAIN<1B>
: Domain Master BrowserDOMAIN<1C>
: Domain Controllers groupDOMAIN<1D>
: Master Browser
Performance Optimization
PDC Optimization
- Hardware Recommendations
- Fast processor (Pentium Pro or better)
- Minimum 64 MB RAM (128 MB recommended)
- Fast SCSI disk subsystem
-
Dedicated to domain controller role
-
Service Configuration Disable unnecessary services: ``` Control Panel → Services
Services to Disable: - Alerter (unless using) - ClipBook Server - Messenger (unless required) - Schedule (unless using AT commands) ```
- Registry Optimizations ``` HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
Pulse = 300 (5 minutes) PulseConcurrency = 20 PulseMaximum = 7200 (2 hours) ```
Network Optimization
- Dedicated Network Segment
- Place DCs on same subnet when possible
- Use switched network for better performance
-
Consider dedicated replication network
-
Protocol Binding Order ``` Control Panel → Network → Bindings
Optimize order: 1. Server service → TCP/IP 2. Server service → NetBEUI (if used) 3. Workstation service → TCP/IP ```
Monitoring and Maintenance
Event Log Monitoring
Key event logs to monitor:
- System Log
- Hardware errors
- Service failures
-
Replication issues
-
Security Log
- Authentication failures
- Account changes
-
Policy modifications
-
Application Log
- Directory service errors
- Database issues
Performance Monitoring
Use Performance Monitor for:
Key Counters:
- System\Processor Queue Length
- Memory\Pages/sec
- PhysicalDisk\Disk Queue Length
- Server\Errors Logon
- WINS Server\Queries/sec
Regular Maintenance Tasks
- Weekly
- Review event logs
- Check replication status
-
Verify BDC synchronization
-
Monthly
- Review user accounts
- Check trust relationships
-
Analyze performance logs
-
Quarterly
- Test BDC promotion procedures
- Review and update documentation
- Perform disaster recovery drill
Troubleshooting Common Issues
Replication Problems
Symptoms: BDCs not receiving updates
Solutions:
1. Check network connectivity
ping [PDC_NAME]
nbtstat -a [PDC_NAME]
-
Force synchronization
Server Manager → [BDC_NAME] → Synchronize with PDC
-
Check Event Logs for errors
Authentication Failures
Symptoms: Users cannot log on
Diagnostics: 1. Verify domain controller availability 2. Check account status in User Manager 3. Review security event log 4. Test with known good account
Trust Relationship Broken
Symptoms: "No trust relationship" errors
Resolution: 1. Delete trust on both sides 2. Recreate trust relationship 3. Ensure matching passwords 4. Verify NetBIOS name resolution
Browser Election Conflicts
Symptoms: Network neighborhood issues
Fix:
1. Check browser roles:
browstat status
browstat elect
- Configure PDC as Domain Master Browser:
Registry: MaintainServerList = Yes IsDomainMaster = Yes
Disaster Recovery
PDC Failure Procedures
- Immediate Response
- Identify operational BDC
- Promote BDC to PDC
-
Notify administrators
-
Promotion Process
On selected BDC: Server Manager → Computer → Promote to Primary Domain Controller
-
Post-Promotion
- Verify domain functionality
- Update WINS registrations
- Check trust relationships
Backup Strategies
- System State Backup
- Use NT Backup
- Include Registry
-
Schedule daily backups
-
Domain Database Backup
Files to backup: %SystemRoot%\System32\Config\SAM %SystemRoot%\System32\Config\SECURITY %SystemRoot%\System32\Config\SYSTEM
-
Recovery Testing
- Maintain offline BDC
- Test promotion procedures
- Document recovery steps
Migration Path
Planning for Active Directory
When preparing for future migration:
- Document Current Environment
- All domain controllers
- Trust relationships
- Group memberships
-
Security policies
-
Clean Up Before Migration
- Remove unused accounts
- Consolidate domains if possible
-
Update documentation
-
Test Migration Process
- Use test environment
- Practice upgrade procedures
- Identify potential issues
Best Practices Summary
- Always maintain multiple BDCs
- Document all configurations
- Test disaster recovery procedures
- Monitor performance regularly
- Keep service packs current
- Implement strong security policies
- Plan for future growth
- Maintain proper backups
Conclusion
Windows NT 4.0 domain controllers require careful planning and regular maintenance. While the technology is outdated, these systems may still be found in legacy environments. Understanding their operation is crucial for maintaining existing systems or planning migrations to modern platforms.