Category Archives: Virtualization

Cases where VM-GenerationID doesn’t help make Active Directory virtualization-safe, Part 2

Yesterday, I talked about the new Active Directory virtualization safeguards in Windows Server 2012 (and beyond) and how Joe Richards triggered me to think about cases where the Active Directory virtualization safeguards (powered by the new VM-GenerationID) don’t help make Active Directory virtualization-safe(r). In the first post, I talked about how the Active Directory virtualization […]


Cases where VM-GenerationID doesn’t help make Active Directory virtualization-safe, Part 1

Joe Richards posted an interesting blogpost a while ago on why Active Directory VM-GenerationID functionality is not an alias for Active Directory anti-USN Rollback functionality. In it, he makes some valid claims: You are only protected in very limited set of very certain very specific circumstances. The VM-GenerationID "triggers" are dependent upon the virtualization platform.  […]


Active Directory in Hyper-V environments, Part 9

This entry is part 9 of 10 in the series Active Directory in Hyper-V environments

I have written a lot about Active Directory Domain Controllers and Hyper-V in this series. So far you’ve seen recommendations on host configuration, guest configuration, security and converting physical Active Directory Domain Controllers to virtual ones. Today, I’m covering anti-affinity.


KnowledgeBase: Active Directory database becomes corrupted when a Windows Server 2012-based Hyper-V host server crashes

As I’ve written before, Microsoft has made significant strides on making Active Directory Domain Controllers safe(r) to virtualize in Windows Server 2012. Sometimes, however, you encounter a situation that makes all that progress seem to disappear. Microsoft, last week, has released KnowledgeBase Article 2853952, describing such a situation.


Citrix XenServer joins the VM-GenerationID family

One of the new features in Active Directory Domain Services in Windows Server 2012 is Virtualization-safe(r) Active Directory. This feature makes it easier and safer to deploy and manage virtual Domain Controllers through the VM-GenerationID capability of the hypervisor platform.


I will be speaking at the UK VMUG Meeting in London

I just received confirmation on speaking at the UK Virtual Machine User Group (VMUG) Meeting in the Hilton Doubletree hotel in London on Tuesday May 21, 2013. I will be delivering my session on virtualization-safe(r) Active Directory and Domain Controller Cloning. The same session I have been delivering for the past year at numerous events, […]


List of Hypervisors supporting VM-GenerationID

Microsoft introduced the VM-GenerationID in Windows Server 2012, to enable Virtual Machines (VMs) to notice when they’re snapshotted, restored and/or cloned. Active Directory is the first technology to put the VM-GenerationID to good use. The following Hypervisors support VM-GenerationID: Windows Server 2012 Standard Edition (Hyper-V) Windows Server 2012 Enterprise Edition (Hyper-V) Hyper-V Server 2012  (Hyper-V) […]


Five Must-Have Hardware components to get the most out of Windows 8 (and Windows Server 2012)

Windows 8 offers many new  features, compared to Windows XP, Windows Vista and even Windows 7. Some of these features are fantastic, but come with a top of the bill hardware price tag. In this blogpost I’ll explain why you’ll need to scour the specifications of your hardware components for these five acronyms


Active Directory in Hyper-V environments, Part 8

This entry is part 8 of 10 in the series Active Directory in Hyper-V environments

Designing and implementing an Hyper-V environment can be challenging. Placement of Active Directory Domain Controllers requires additional consideration, especially in Hyper-V Failover Cluster scenarios where Active Directory membership for the cluster nodes is strictly needed. Windows Server 2012, in Active Directory terms, is a big step forward. We’ve been over the majority of the new […]


Active Directory in Hyper-V environments, Part 7

This entry is part 7 of 10 in the series Active Directory in Hyper-V environments

For a while, Microsoft’s KnowledgeBase article 976424, titled Error code when the kpasswd protocol fails after you perform an authoritative restore: "KDC_ERROR_S_PRINCIPAL_UNKNOWN", has been available to solve issues with unexpected behavior after authoritatively restoring  the krbtg account on Windows Server 2008 and Windows Server 2008 R2-based Domain Controllers.