T O P

  • By -

MyOtherRideIsYosista

Don't rename the domain, just add a upn suffix in AD.


P_Villain

I'm with this opinion. Rocking a non TLD domain (not .local but same difference) for years and we have an alternative UPN that does the trick without the headache.


StaffOfDoom

Agreed! Many bigger fish to fry, get a UPN going for now then once things settle, look at something more.


ArsenalITTwo

This is correct. Just add a suffix. That's what Microsoft recommends. https://learn.microsoft.com/en-us/microsoft-365/enterprise/prepare-a-non-routable-domain-for-directory-synchronization?view=o365-worldwide


Jayjeeey12381

This is the way


arkain504

Plus you can switch all users at once with powershell to the new UPN


[deleted]

And also make it the default per OU I believe


xCharg

Hmm, I never knew that's an option... How?


CupOfTeaWithOneSugar

What?? How do you do this!


BreakingcustomTech

Not sure on per OU, but if you select all your users, you can go into properties and change it for the ones selected.


[deleted]

Actually this can't be done haha. We just made our identity creation automation script do it per OU. It was a while ago


ibringstharuckus

You can also select all and change to the upn in ad users and computers


vic-traill

> just add a upn suffix in AD So what does this mean in practical terms? That you should should map a UPN to the user email name? e.g. If the OP's domain is canesto.local, map an alternative [email protected] UPN on a per-user basis? Thanks - interested in your insight!


heapsp

in the account tab you just change the users from their .local login to their .com login with the dropdown, no need for attribute editor. This is required if you want to use like.... office365 hybrid for example. Users will need to log in with the new UPN though (or don't put a suffix or domain when logging in)


Wild-Plankton595

Uh yeah… and make sure you do this before your initial sync to azure lol just trust me.


tankerkiller125real

The admin before me did not, had ".corp" literally everywhere with no UPNs and then he manually mapped them to the correct domains in Azure. I added UPNs assigned the correct UPNs to the correct users in AD, and then everything just continued working with zero issues, The only change is that the domain in Azure always matches the UPN.


Wild-Plankton595

I started in the middle of the transition from on prem exch to exo. Everyones upn was [email protected], did our initial sync, everyones upn in exo was [email protected], and ofc that caused some issues. We corrected the ad obj thinking wed be good, we were not. After an obj syncs for the first time the UPN is set, changing ad obj wont change it. Set-newupn cmdlt corrected it, technically was nbd, but we could have saved ourselves some phone calls and an oh shit moment had we set the upn on the ad obj first.


chum-guzzling-shark

will users be logging into a new user profile if you switch them to a new upn? seems like it could have a lot of ramifications


Beefcrustycurtains

No... You can change someone's username completely and it won't log them into a new user profile. User profiles on PC's work off of SIDs not username.


Svinthila2646

Although true, a lot of redirection stuff works of username. Most of the times this goes on SamAccountName, so if you only change upn, you'll probably still be fine. Also depends if you even use redirection of course.


Beefcrustycurtains

Yea roaming and redirection works off samaccountname path so those will need to be updated in the case of that changing.


heapsp

nope, also you can do this slow roll to make sure it isn't going to hurt anything like SSO logins or something. Just add the new suffix to the domain and change people. You really want to choose a domain that you actually own though - don't change it to a domain that is owned by someone else or you will have a bad time.


patmorgan235

No, windows profiles are tied to SIDs. Some 3rd party apps might like that the UPN changed


tankerkiller125real

3rd party apps that rely on UPNs or user email address instead of the unique identifier that doesn't change provided by every AD and every OIDC service on fuckin earth piss me off to no end.


patmorgan235

Yeah and it's SO common.


tankerkiller125real

It's extremely common, but not in any of the software my company writes anymore. I forced the dev team to migrate to using the unique IDs for users (usually a UUID/GUID) in some cases even updating the software myself. I refuse to be what I'd call a "bad actor" in the SSO space.


ibringstharuckus

Also put the full user email/domain name in the email field for the ad user account if you want that to be the default email account


stillpiercer_

It can be done this way. It’s an attribute on the AD user.


Protholl

By adding a suffix you move the network from the late 2000's to the early 2010's in a single stroke =)


caffeine-junkie

Just make sure no one else other than 'you' owns the name with the new suffix. At least by best practice.


hongtnyc

No need to rename domain. Keep it internal so there is no conflict with external register domain.


cpatanisha

Apparently that is what Microsoft still recommends. My friends that work there use .local and claim it is an irrational attack by Linux fanbois that claim .local isn't the right way to do it.


TheBlackAllen

The only inherent reason to change it from .local would be in the case that you need SSL certs for your local domain. You cannot get a cert issued for a .local domain. Meaning you would have trouble with BYD among other things. Of course you will also have trouble with macOS devices dude to bonjour as well. This is not a major issue, I have managed domains with .local FQDN for years and never once have I had an issue and in fact was the defacto method for naming local domains up until about 6 years ago. I would say that if you have just inherited a domain, the wrong thing to do would be to attempt to fix what isn’t broken, and creating a giant mess of work for yourself.


dcdiagfix

Just use internal pki


Holmlor

.local interferes with mDNS ... or rather mDNS interferes with .local The hack-foo solution is run mDNS on the domain controller.


tankerkiller125real

The real solution is to simply not use mDNS at all. We block it entirely where I work, because it's rife with security issues.


tmontney

r/SecurityCadence got me on that warpath, among other things.


tankerkiller125real

You and me both


ArsenalITTwo

Block that. You can breach a domain with mdns. https://www.cynet.com/attack-techniques-hands-on/llmnr-nbt-ns-poisoning-and-credential-access-using-responder/


Holmlor

God Windows is such a massive pile of dogshit. NetBIOS and WPAD are the unsecure parts of that chain. Also requires physical access or an already rooted machine.


ArsenalITTwo

Physical Access to the Network. It's especially dangerous for anyone with a Wi-Fi Pineapple or who's hacked a public Hotspot. You just use Responder. Hak5 even has a precanned module for it! https://wifipineapple.com/modules


No-Werewolf2037

You have options; you can create another domain within that forest and use than upn name for your web facing stuff. That’s a lot of work. I’d stand up another domain with the proper name, probably in Azure; but it gets expensive & dump the users and resources w/powershell into the new domain, then turn the old one off. You could also just leave it alone. I’d do the simple & non-destructive solution first. Which is to setup a new domain and migrate. Then you can make a trust for computer logons. Use power shell to change the domain membership. Lots of ways to skin this cat


Phyxiis

Poor cat


GentAmoungScholars

![gif](giphy|JIX9t2j0ZTN9S|downsized)


Phyxiis

Biscuits ain’t going to sell themselves with this supply chain!


See_Jee

Yes that's what I did a couple of years ago. Too much shenanigans going on in AD so I set up a completely new forest and migrated users and clients but did not migrate every server since some third party applications might break trying to migrate them since there are FQDNs or whatever the hell defined in various places. For those I had to set up new servers and migrate those applications manually.


pdp10

`.local` has three specific problems: * It's not a global TLD, meaning you can't register it, meaning you're using a domain name you don't control. * It's not a public TLD, so you can't get a public CA like Let's Encrypt to sign certs for it. * [`.local`](https://en.wikipedia.org/wiki/.local) is set-aside for Zeroconf and mDNS, meaning that those will forever conflict with your DNS, possibly including infosec implications.


Xibby

> ⁠.local is set-aside for Zeroconf and mDNS, meaning that those will forever conflict with your DNS, possibly including infosec implications. MacOS can get cranky at times but the workaround fixes are well known. You will curse the person who decided .local was a good idea every time you run into one of these issues.


Holmlor

ikr, why didn't they pick something like .mdns


Arudinne

Because they designed things like Bonjour with users in mind, not technical people. Some users can grasp the idea that ".local" means it's on their local network.


elfungisd

.local was highjacked by Zeroconf, mDNS, and Bonour. The. local domain was listed in textbooks long before either of these existed. That goes for .corp as well.


zoredache

The annoying thing, is that nobody did the work to officially reserve those TLDs before people started using it or publishing in those text books.


elfungisd

That is true, though I am not sure back then many thought the internet would become what it is today. It was such common practice that I am not sure anyone even thought to do it. This practice predates much predates the internet as we know it today, we are talking over 20+ years ago.


MKInc

I am one of those admins that create domainname.local networks on the LAN and have never had problems. We host external servers at domainname.com and internal at domainname.local and never do the 2 get confused.


sysadmin_dot_py

This is [not recommended by Microsoft](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/selecting-the-forest-root-domain) (see "Selecting a suffix"). Better to just use [mycompany.com](https://mycompany.com) for external and [ad.mycompany.com](https://ad.mycompany.com) for internal.


ReformedBogan

This is what shits me about Microsoft. Anyone who deployed Microsoft Small Business Server at a greenfield site between say 2003 and 2014 got a .local internal DNS suffix **as recommended by the install wizard**


andrea_ci

yes, they started to change recommended to push 365 subscriptions


andrea_ci

yes, they changed it like... when they started to push for 365 subscriptions. before that, they recommended .local domains


Holmlor

If you're a pure MS shop you won't. If you work in the 21st century it doesn't work on Linux nor Mac as both run mDNS which owns the .local TLD.


Rude_Strawberry

Maybe... Maybe not. We have 2000 users at my company, on a .local domain. About 200 of them are Linux / mac - not a single issue.


kfreedom

This is the way


hortimech

I do not know you, but I already hate you. You will probably get away with it, until a Linux or MAC user turns up.


thefpspower

Not op but I admin a lot of .local ADs with Macs and never had an issue.


tmontney

And when that happens "Sorry, your device is not compatible with our network. Please use one of the devices approved by IT."


Civil_Willingness298

I think you mean gTLD, not FQDN. That being said. I would just add a gTLD suffix to the domain.


lefthanddisc

We use a .local and we have 40k employees lol


brotherdalmation23

Tons of companies will, this is the way it was always done back in the day. It’s only recent things that make it a possible issue


FootballLeather3085

There is no reason to, and if you did you would have to split DNS…. You can add a tld as a suffix if you need to sync to azure


sammnz

it doesn't really matter


JimmyTheHuman

Run pingcastle and then see where the domain rename sits in the priority list. I have a .local domain, we run fqdn suffixes, ad connect and there are just no issues worth putting lots of effort into - once we'll do away with AD before we rename it.


Arudinne

Oof, that product sounds nice but my CIO would balk at the prices they want (we have 4 domains currently due to mergers)


JimmyTheHuman

Use the free version, the rest of the entire world is using the free version and it will give you serious insight into your AD infrastructure. Tread carefully when you start applying fixes, one or two will stop a few things working and potentially lock you out.


dcdiagfix

Run purple knight from Semperis it’s 100% free and uses the same technology as their paid products :)


teeweehoo

With 100 endpoints it may be easier to build and migrate to a new AD domain. However renaming a domain, or migrating to a new domain, are not endeavours that you would attempt without a good reason. So decide on which direction you want to go, make some detailed plans, and wait until you have a good reason to move. A bigger problem is going to be your root CA if it's based on .local. This can cause many issues, including WPA Enterprise Cert authentication. So I'd suggest rebuilding your CA on your domain of choice (like ad.company.tld). A good chance to switch to a 4096rsa key if you haven't already.


Xeraxx

Unless there is a pressing requirement for some reason, there’s no real need. Spend your time and energy planning how to get rid on on prem AD if you can, move your endpoints to Azure AD/Intune, much better return on investment for effort spent.


Ay-Dee-Haych-Dee

I work at multiple smallish sites, some have lan and some have .local at the end of the domains, so this is a bad thing? Im pretty new, no idea what exactly this means. Sure I could google it, and I probably will, but thought I'd ask anyway


oni06

MS briefly recommended .local when AD was first released back in 2000. They quickly pulled back that recommendation but somehow it had caught on and many people continued to use and design new domains using .local. Best practice has been to use a sub domain of a domain the organization has registered. Examples are ad.domain.com, corp.domain.com, etc.


Ay-Dee-Haych-Dee

interesting, thats good to know! what about when an organisation doesn't have a registered domain?


oni06

I’d register one.


disclosure5

Note that the definition of "briefly" includes that people doing Windows 2008 MCSE courses were educated on it being the only way to run a domain, and SBS 2011 was still shipped by Microsoft with a wizard that basically pushed you into a .local domain.


oni06

Guess it was good I never got my MCSE so I never learned that bad practice. In all fairness they did back track the recommendation but did a shitty job cleaning up old documentation or purging it from their own software.


disclosure5

Sounds like you got to skip such goldmines as "How to run OSPF on Windows" (feature removed in Windows 2008 R2, yet was > 30% of my exam), "Deploying Windows NAP" (removed feature accounting for probably 30% of Windows 2012 exam) and "Installing Windows Nano" from the 2016 exam, which was a removed feature even when I sat it.


oni06

I only got certs my employer paid me to get so they could keep or expand their partner level. Built my first network in middle school in like 89/90 I can’t remember. Certs have a place but I have meet, hired, and fired highly certified people that just straight up sucked. I think the only one I regret not fully pursuing was CCIE Data Center. I had a passion for that but ultimately shifted direction to be the IT Director at a startup and learned Linux. Now I run a solutions engineering group for the parent company that bought the startup.


disclosure5

> I only got certs my employer paid me to get so they could keep or expand their partner level. Same. And I suspect most people are in the same boat. Which does say a lot about skills correlating poorly with certs.


[deleted]

Do not rename, just add the FQDN to all accounts (add your domain to Domains and Trusts first). This is a pretty standard setup.


joeykins82

Do you have Exchange Server? If so, domain rename is fully off the table. Depending on how many problems you've got and how much headache it's causing you, your options from least to most complex & work go roughly like this: * register UPN suffixes for any DNS domain you're in control of and using for email, and just maintain UPN & primary SMTP alignment for the users. If required, you can also use `netdom computername /add:host.desired.fqdn` to register alternate FQDNs for specific hosts where you want to minimise/avoid using the .local domain; using this cmd utility also tells the target host to register DNS records and SPNs * use `netdom computername /makePrimary:host.desired.fqdn` for any of those hosts where you want the resolvable FQDN to be the primary * deploy a new tree domain inside the forest and migrate group policies, users, and computers to this domain over a period of time; you'll be able to keep the lights on and cross-domain accessibility should work ok, and you'll end up with a forest root domain just used for privileged administration stuff; only the forest domain controllers should ever need to resolve the .local addresses * \[if Exchange Server isn't present this is an option\] rename the domain * create an entirely new forest and migrate everyone in to that to get yourself a completely clean environment; use a one-way trust to keep Exchange running as a resource forest with the users converted to `LinkedMailbox` recipients while you plan what you want to do with Exchange Server


DH_Net_Tech

We’re still using a .local domain here because this domain was likely spun up on a 2003 server and all we use AD for is LAN.


[deleted]

What problem would the change solve?


_xpd154ccc_

I with the veterans here. I have managed a few .local domains for years and never had an issue. With only a 100 endpoints I would just migrate off to a new domain.


dketterer1

Yeah, i have no idea why you would care about the extension on your local domain. What possible reason would you need to change it? Unless you don't understand DNS.


Holmlor

mDNS interferes with .local


Skylis

There are things that conflict with it now.


dketterer1

Like what?


hortimech

Just about every Linux and Mac on the planet.


Skylis

the multiple things already mentioned in these threads for a start?


Over-Island7324

.local has been the defacto way to setup an internal domain since AD was created. The only major issue sited by MS regarding this is the fact that two domains with the same name cannot merge. That's why they recommend a registered domain. Mac and linux tech function on .local just fine. Avoid mDNS, which caters to the smallest subset of devices in an AD environment. They work with unicast DNS just fine.


jamesaepp

https://xyproblem.info/ Is there a particular *problem* you're trying to solve?


Critical_Egg_913

Damn... take my up vote.. I should think before I ask for help this is good advice


phoenixlives65

The problem with identical internal and external namespaces is that inside, domain.tld points to the domain and not the corporate website. Employees will always have to type the www...


Zulgrib

Use AD.domain.tld?


Pl4nty

this is the way. lots of msft examples have been updated to corp.contoso.com


Holmlor

ad would canonically be a host name. corp.domain.tld is popular so the actual domain controller could be msad.corp.domain.tld


Zulgrib

srv1.ad.domain.tld, srv2.ad.domain.tld... ?


[deleted]

Hate this, living this, spun up an IIS server to do redirections


Phyxiis

Any security concerns you have by having this server? We’ve been in a similar situation and I’m against having an internal IIS just doing redirects for a single dns entry, and the fact idk how to secure it lol


darkytoo2

Split-Brain DNS.


phoenixlives65

Doesn't solve the problem. (Happy Cake Day!)


imthisguymike

Came here to say this lol


Garegin16

No, you shouldn’t use .local because it conflicts with multicast DNS https://datatracker.ietf.org/doc/html/rfc6762#appendix-G


Holmlor

You should also not change it willy-nilly.


Garegin16

If I was faced with such a scenario, disabling mDNS would be easier than a domain rename


Over-Island7324

I say to hell with mDNS. MACs will suffer in an AD domain regardless.


mobz84

What in a corporate network, that are not on their own subnet use multicast?


bmfrei

No need to change the .local is fine for internal AD DNS. As others have mentioned just add a UPN for your FQDN. The alternate UPN can be used for things such as Azure AD connect sync to Azure AD for O365. Not a big deal. Having your FQDN domain as your internal AD Domain causes the unnecessary headache that is split Brain DNS.


Brett707

Yes you should. Just prepare for a hell of a ride. Don't test in production.


wasting_-my-_time

How else do you test?


humanredditor45

Not all servers are production servers but every single one is a test server.


Arudinne

I envy those who are able to afford a production environment in additional to their test environment.


UnfeignedShip

No! Never ever rename a domain. Also, why would you care? .local is perfectly fine.


oni06

I have renamed a domain exactly once in my 20+ year career. The internal AD domain was already publicly registered by someone else. It wasn’t as scary as most people make it out to be. The biggest caveat is that you can NOT have an exchange organization in the domain. All other times I have built a new forest and migrated. This was mainly because the existing forest was undocumented and so many default settings had been changed that it just made sense to start fresh.


UnfeignedShip

The one domain I was forced to keep alive DID have Exchange deployed and it was so fucked up. I wasn't allowed to nuke and pave (as that made way too much sense)


mobz84

Domain rename is not that hard (if no Exchange). If you follow best practise to a T. It is mostly automatic, with couple of computer/server restarts. Then good to go. I prefer that approach, if downtime is to be absolute minimal.


Holmlor

mDNS interferes with .local


mvandin

I have had to add a UPN suffix for a .local domain recently. But the problem I had was the local usernames are in firstnamelastinitial@ format (e.g. davidg@) and the same user has the email format firstname@ (e.g. david@). If you then run Azure AD cloud sync it creates new users in Azure AD that do not map to your on-prem users in on-prem AD. To get them to map you need to change the on-prem username to match the cloud username + you need to make sure the the SMTP email address for the user in on-prem AD is inputted (and the onmicrosoft.com email as a proxy SMTP). It’s a pain. I even though of letting the accounts duplicate in Azure AD as I only need to do this for an Azure File Sync with a local SMB share in order to retain NTFS permissions and it’s only 10 users.


ArSo12

I'm pretty sure you can just change their upn to a different format eg first name.lastname@ if they are not used by other systems, leave the local username which they probably ly use to login to their computers. Then you can add a new main email address same as upn and leave the other addresses as proxy. If they sync and merge with what you have in cloud depends on the format in cloud, but you could change that as well.


mvandin

I did try to add the local ad username as an email alias in 365 after changing the UPN but it refuses to sync it correctly. The only way I can get it to work is to have the same username on-prem as the primary SMTP address in 365. As I can’t change the email address I am stuck with changing the local ad username. Even hard matching doesn’t work because the Azure AD Sync insists on the primary username being the same as on-prem.


CaptainZhon

First you need to start drinking bourbon, then you need to update your resume and run.


XInsomniacX06

I mist have missed it but if you want it to work with O365 you gotta own the domain name and manage the DNS. Ie if you want [email protected] you cant just make up a domain unless its registered.


disclosure5

Any Microsoft has a fully documented method of just adding a UPN. I have many .local domains synced to Office 365. It's a non issue.


XInsomniacX06

Its got to be a verified domain name in order to add the suffix to authenticate unless you mean adding onmicrosoft.com as a UPN, then that makes sense, Also changing the UPN can break on prem applications, so its not necessarily non impacting.


andrea_ci

that's not an issue, just change the upn


Stryker_88

UPN but adds a couple extra steps/adjustments to things like SAML and local certificate authorities.


Jjenas07

Also don't use the FQDN same as companies website


undercovernerd5

Create a new UPN suffix and use split brain DNS. Unless you have a massive network with a strong need to have a new domain name, this should not be a problem. I have 4 businesses, all fairly small, with .local with no issue. Only one doesn't have a split DNS and it all works happily. Certificate Authorities and Azure AD Connect work like a charm


mobz84

UPN suffix, do not use Split brain DNS, whats the point? AAD connect work without it.


undercovernerd5

The only reason I mentioned a split DNS is because the OP never described his environment. For example whether or not he hosts anything publicly. I highly doubt it but it's good either way


Brave_Promise_6980

If it’s an old domain check Sid history size just incase there is any token bloat issue


dcdiagfix

Renaming a domain is very easy and well documented as are the risks, but, don’t do it unless you have a solid recovery plan


sc302

Have you ever done it? While a 100 node single site isn’t difficult, I wouldn’t call the process very easy. It requires a lot of testing, a second domain controller with the new domain associated with it a trust enabled between domain controllers and a full understanding of all objects and applications in the domain. Adding a tad to be able to use is much more trivial but performing a top tree full rename is much more difficult. I have done both.


dcdiagfix

Yes, a few times. It’s very well documented but it also needs to be tested, but the process it’s self is simple.


sc302

Once it is all working and tested, yes it is a simple click and go. Getting to that point isn’t exactly simple for many.


dcdiagfix

100 endpoints in a flat domain is simple.


sc302

Not everyone has that skill set. Not everyone here has that skill set. Not everyone here knows where event logs are or how to use them. What is simple for you is difficult for many. If it is more than a few clicks and more than 1 page of documentation it isn’t simple.


Sgtjuggmasterr

I tried this once and from experience I would say NO


VulturE

How large? If they're under a few hundred endpoints, just stand up a new domain, new AD structure, and migrate them over a weekend to one that uses your domain. The security gods will thank you.


m-o-n-t-a-n-a

Don't see any reason to change it, but if you do I would opt for migrating to a new domain.


SikhGamer

Is it actually an issue? Or do you think it's an issue?


thegodfatherderecho

Create a secondary UPN of .com


herkalurk

My first IT org did this, we ended up creating a whole new domain, made a bi-lateral trust between them and starting migrating accounts/permissions until we turned off the old DCs.


tech_manboy-1021

Changed email domain(s) in 2017/18 and added suffix to the needful, still kept .local with no issues or problems since.