Understanding DNS in Active Directory
- Posted by
- Posted on January 18, 2026
- IT Support, Microsoft Applications, Servers, Windows
- No Comments.

How Domain Controllers, SRV Records, Kerberos, and NETLOGON Actually Work
When most people think of DNS, they think of simple name resolution. A hostname resolves to an IP address, and that is it. In an Active Directory environment, DNS plays a much deeper role. It is not just name resolution. It is service discovery, authentication routing, and identity infrastructure.
This article explains how DNS works in Active Directory from the ground up, using a newly installed primary Domain Controller as the reference point.
1. DNS in Active Directory Is Service Discovery
In a non-domain environment, DNS answers one main question:
What IP address belongs to this name?
In Active Directory, DNS answers a different and more important question:
Which server provides this service, and how do I reach it?
That is why Active Directory depends heavily on DNS records that describe services, not just hosts.
2. A Records and AAAA Records
A Records
An A record maps a hostname to an IPv4 address.
primary-dc.lab.local → 10.0.0.10
Every Domain Controller must have a correct A record. When a client learns the name of a Domain Controller from DNS, it uses the A record to actually connect.
If an A record is missing or stale:
- DNS queries succeed
- Connections fail
- Errors appear unrelated to DNS
This is extremely common in DHCP based lab environments.
AAAA Records
An AAAA record maps a hostname to an IPv6 address.
Windows enables IPv6 by default and prefers it when available. Domain Controllers automatically register AAAA records if IPv6 is enabled.
Even if you believe you are not using IPv6:
- Windows is
- Kerberos may use it
- LDAP may bind to it
- SMB may prefer it
Partially broken IPv6 causes intermittent authentication and policy issues that are notoriously difficult to troubleshoot.
3. SRV Records and Why They Exist
SRV records allow DNS to describe services.
Instead of mapping a name to an IP, an SRV record describes:
- A service
- A protocol
- A port
- A target server
- Priority and weight
Active Directory cannot function without SRV records.
4. Core Active Directory SRV Records
_ldap
LDAP is how clients read directory data.
Used for:
- Finding Domain Controllers
- Querying users and groups
- Reading Group Policy metadata
If LDAP SRV records are broken:
- Domain join fails
- Logons fail
- Group Policy fails
_kerberos
Kerberos is how clients authenticate securely.
LDAP answers who you are. Kerberos proves it cryptographically.
Kerberos SRV records point clients to Key Distribution Centers on Domain Controllers.
If Kerberos SRV records are broken:
- Users cannot log in
- Services cannot authenticate
- Time-related errors appear
_gc (Global Catalog)
The Global Catalog is a special role that a Domain Controller can hold.
It contains a partial, read-only copy of objects from all domains in the forest, and only commonly searched attributes.
The Global Catalog is used for:
- Universal group membership
- Forest-wide searches
- Exchange address lookups
- Cross-domain authentication
Global Catalog traffic uses:
- TCP 3268 for LDAP
- TCP 3269 for LDAPS
_pdc (PDC Emulator)
The PDC Emulator is a FSMO role.
FSMO stands for Flexible Single Master Operations. These are tasks that must be handled by one authoritative Domain Controller to prevent conflicts.
The PDC Emulator:
- Coordinates password changes
- Resolves authentication conflicts
- Acts as the domain time authority
- Handles account lockouts
Clients and DCs locate the PDC Emulator using a dedicated SRV record so urgent authentication issues can be resolved immediately.
5. What a Global Catalog Is
A Global Catalog is not a separate server. It is a role held by a Domain Controller.
It acts like an index: fast, forest-wide, and partial.
Without a Global Catalog:
- Logons may fail
- Universal groups break
- Exchange lookups fail
Most environments configure every DC as a Global Catalog for redundancy.
6. Special DNS Zones in Active Directory
_msdcs
The _msdcs zone is reserved for Microsoft Directory Services.
It contains:
- Critical SRV records
- Domain Controller GUID mappings
- Replication metadata
Clients and DCs know to look here automatically.
_sites
Site-aware SRV records allow clients to locate the closest Domain Controller based on IP subnet.
This reduces:
- Logon latency
- WAN traffic
- Cross-site authentication issues
Sites are enforced through DNS records.
7. Zone Integrity Records
SOA (Start of Authority)
Every DNS zone has one SOA record.
It defines:
- The authoritative server
- Serial number
- Replication timing values
Even in AD-integrated DNS, SOA is required for zone health.
NS (Name Server)
NS records define which servers are authoritative for a zone.
They allow:
- Proper referrals
- Zone replication
- Resolver trust
Incorrect NS records cause inconsistent DNS behavior that is difficult to diagnose.
8. PTR Records (Reverse Lookup)
PTR records map IP addresses back to hostnames.
They are used for:
- Diagnostics
- Logging
- Kerberos validation
- Administrative clarity
Forward lookups make things work. Reverse lookups make things debuggable.
9. Optional but Common DNS Records
CNAME
CNAME records create aliases that map one name to another name.
They are generally safe for applications, but risky for Domain Controllers and authentication services.
Microsoft strongly discourages using CNAMEs for LDAP or Kerberos endpoints.
MX
MX records define mail routing for a domain.
They are not required for Active Directory itself, but are common in labs and Exchange environments.
TXT
TXT records store free-form text and are commonly used for:
- SPF
- DKIM
- Domain verification
- Microsoft 365 integration
10. DNS and Client Configuration
Why clients must use AD DNS
Domain members must use only internal AD DNS servers.
If a router or public DNS server is used:
- SRV records do not exist
- DC discovery fails
- Authentication becomes unreliable
Correct design:
- Clients use DCs for DNS
- DCs use forwarders for external resolution
11. What Happens During a Real Domain Logon
Step 1: DC discovery
The client queries SRV records to locate a Domain Controller.
Step 2: Kerberos authentication
The client performs:
- AS-REQ / AS-REP to obtain a Ticket Granting Ticket (TGT)
- TGS-REQ / TGS-REP to obtain service tickets
No passwords are sent over the network.
Step 3: Global Catalog lookup
If universal groups are involved, the client contacts a Global Catalog.
Step 4: Policy and directory access
LDAP is used to read directory data, and SMB is used to download policy files.
12. SMB, SYSVOL, and NETLOGON
SMB
SMB (Server Message Block) is the Windows file sharing protocol.
Used for:
- SYSVOL
- NETLOGON
- Group Policy files
- Logon scripts
NETLOGON
NETLOGON is a service, a secure channel, and a network share.
It handles:
- Secure channel establishment
- Authentication coordination
- DNS SRV registration
- Trust relationships
If NETLOGON fails:
- Authentication breaks
- DNS records may disappear
- Trust errors occur
13. Testing DNS and AD Health
nslookup examples
nslookup -type=SRV _ldap._tcp.dc._msdcs.domain.local
nslookup -type=SRV _kerberos._tcp.domain.local
nslookup -type=SRV _gc._tcp.domain.local
nslookup -type=SRV _ldap._tcp.pdc._msdcs.domain.local
nltest examples
nltest /dsgetdc:domain.local
nltest /dsgetdc:domain.local /GC
nltest /sc_verify:domain.local
nltest /dclist:domain.local
These commands validate how Windows actually interprets DNS, not just what exists on paper.
14. The Mental Model That Makes AD Click
- DNS finds services
- Kerberos proves identity
- LDAP reads directory data
- SMB retrieves files
- NETLOGON ties it all together
Once this model is understood, Active Directory troubleshooting becomes methodical instead of guesswork.
Recent Posts
- How to connect to MS 365 Admin and Exchange via Powershell
- Understanding DNS in Active Directory
- Convert an Exchange Online User Mailbox to a Shared Mailbox Using PowerShell
- Configuring a Primary Domain Controller to Use DHCP in a Test Lab
- How to Fix the “Your Organization Manages Updates” Error in PC Health Check
Archives
- January 2026
- December 2025
- October 2025
- September 2025
- August 2025
- July 2025
- June 2025
- February 2025
- January 2025
- January 2021
- May 2020
- February 2020
- December 2019
- August 2019
- January 2019
- July 2018
Categories
- Computers
- IT Support
- Lab
- Linux
- Mac OS
- Management
- Microsoft Applications
- Networking
- Printer
- Router
- Servers
- Switch
- Uncategorised
- Virtualization
- Windows
