Side-by-side domain controller hardware refresh to Windows Server 2025.
Blueprint for replacing aging domain controllers with new hardware while preserving replication, DNS, time, and rollback safety.
Blueprint for replacing aging domain controllers with new hardware while preserving replication, DNS, time, and rollback safety.
Start by defining exactly which domain controllers are being replaced, which roles they hold, which sites they serve, and what evidence must exist before any old controller can be retired.
Runbook note: Keep at least one known-good legacy controller online in each critical site until replication, DNS, and time hierarchy validation pass on the 2025 nodes.
Command path:
Get-ADDomainController -Filter * | Select HostName,Site,IsGlobalCatalog,OperationMasterRolesnetdom query fsmorepadmin /replsummarydcdiag /e /c /v /f:dcdiag-baseline.txtw32tm /query /statusGUI path: Server Manager > Tools > Active Directory Users and Computers, Active Directory Sites and Services, DNS, and Event Viewer to document current ownership and site placement.
The new servers should already have fixed addressing, correct time, hardened baseline settings, and management access before the promotion wizard is ever opened.
Command path:
Rename-Computer -NewName HF-DC25-01 -RestartInstall-WindowsFeature AD-Domain-Services,DNS -IncludeManagementToolsResolve-DnsName _ldap._tcp.dc._msdcs.corp.example.com -Type SRVTest-ComputerSecureChannel -VerboseGUI path: Server Manager > Local Server for hostname, NIC, and time settings, then Server Manager > Add roles and features to install AD DS and DNS binaries.
Promotion is only the midpoint. The real milestone is when the new server advertises correctly, participates in replication, hosts DNS cleanly, and survives forced validation from more than one site.
Command path:
Install-ADDSDomainController -DomainName corp.example.com -InstallDns -NoGlobalCatalog:$falserepadmin /syncall /AdePGet-Service Netlogon,DFSR,DNSdcdiag /test:Advertising /test:DNS /test:SysVolCheck /test:NetLogonsGUI path: Server Manager > Notifications > Promote this server to a domain controller, then DNS Manager and Active Directory Sites and Services to verify registration and placement.
Once the new controllers are stable, move role ownership, authoritative DNS usage, and time-service responsibility in a controlled order so each dependency change is independently testable.
Command path:
Move-ADDirectoryServerOperationMasterRole -Identity HF-DC25-01 -OperationMasterRole 0,1,2,3,4Set-DnsClientServerAddress -InterfaceAlias "Ethernet" -ServerAddresses 10.10.10.11,10.10.10.12w32tm /config /syncfromflags:manual /manualpeerlist:"time.windows.com,0x8" /reliable:yes /updatew32tm /resync /rediscoverGUI path: AD Users and Computers > Domain > Operations Masters, AD Domains and Trusts > Operations Master, and Active Directory Schema snap-in for FSMO transfers.
Demotion and cleanup should be the final administrative step, not the shortcut used to discover whether the new estate actually works.
Command path:
Uninstall-ADDSDomainController -DemoteOperationMasterRole:$true -RemoveApplicationPartitionsGet-ADDomainController -Filter * | Select HostName,Siterepadmin /showrepl * /csvntdsutil "metadata cleanup" "connections" "connect to server HF-DC25-01" quit quitGUI path: Server Manager > AD DS > More > Demote this domain controller, then Active Directory Sites and Services and DNS Manager for post-demotion cleanup.
A controller refresh is complete only when authentication, policy, DNS, replication, backup, and recovery tests all succeed from the new hardware path without relying on the retired estate.
Command path:
gpupdate /forcenltest /dsgetdc:corp.example.comrepadmin /replsummarydcdiag /e /test:DNS /test:Advertising /test:ServicesGUI path: Event Viewer, Group Policy Management, Active Directory Administrative Center, and Windows Server Backup for final operator signoff.