Event banner

What's new in Active Directory

Event Ended
Tuesday, Nov 28, 2023, 10:00 AM PST
Online

Event details

Lean in as software developers from the Active Directory software engineering team dive into the latest improvements in Active Directory. We'll cover key areas of investment including scalability, security, and supportability and show you the enhancements we're making to help keep you more secure and productive!

 

This session is part of the Microsoft Technical Takeoff: Windows + Intune. Add it to your calendar, RSVP for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.

Char_Cheesman
Updated Dec 27, 2024

49 Comments

  • mashdk's avatar
    mashdk
    Copper Contributor
    How many percent size increase can we expect to see on NTDS.DIT with the 32k DB Page Sizes and uses 64-bit Long Value Ids?
    • Wayne_McIntyre's avatar
      Wayne_McIntyre
      Icon for Microsoft rankMicrosoft

      Hi Martin,

       

      There is no straight forward answer to this as it will depend on your data and how large the existing database is.  In most cases there will not be any meaningful impact to the overall size of the database until you start growing larger records beyond previous limits.

       

      We are continuing to collect data on this in our internal testing and in a variety of environments, and have yet to see any significant changes in size with existing data replicated in from 2022 DCs.

       

       

      • mashdk's avatar
        mashdk
        Copper Contributor
        Thanks 😊 In my Insider Build, the NTDS.DIT file was 40MB from scratch. My 2022 DC with some test-users and other stuff is about 20MB. So, I thought this was due to the DB changes.
  • AndrewPrior's avatar
    AndrewPrior
    Brass Contributor
    Looking at the early builds, I can see there are now dMSAs, or delegated Managed Service accounts. Could these be explained please?
    • Wayne_McIntyre's avatar
      Wayne_McIntyre
      Icon for Microsoft rankMicrosoft
      Hi Andrew, The session will cover dMSAs briefly as well as have a link to a short demo. This was a joint effort with our Auth/Kerberos team and they will also be publishing doc's on it and step by step instructions on usage and deployment. The main differences between a dMSA and a gMSA is: 1. dMSAs allow migration from existing user accounts that are used for services to be superseded/migrated by a dMSA. 2. dMSAs allow the credential keys to be bound to credguard 3. dMSAs keys are retrieved via kerberos 4. dMSAs passwords are never returned to client (cannot query attirbute over ldap) and password is never stored locally where dMSAs are used
      • FiRem002295's avatar
        FiRem002295
        Copper Contributor

        How are dMSA's any different to the original MSA's (pre-cursor to gMSA's), if these are regressing from multiple computes back to singular?

  • CraigDK's avatar
    CraigDK
    Iron Contributor
    • Not everyone can move to cloud based solutions (Azure AD / Entra / Intune) and need to run an on prem AD platform.
    • With MDOP deprecation early 2026, AGPM (Advanced Group Policy Management) will go with it leaving a capability gap for on prem GPO management without moving to 3rd party offerings.
    • Can Microsoft / the team responsible for Active Directory consider provision of an integrated AGPM like capability or formal adoption of AGPM itself to ensure continuity of Advanced GPO management capability within on prem AD environments.
    • Lindakup's avatar
      Lindakup
      Icon for Microsoft rankMicrosoft
      Thanks for this feedback Craig. I will share it to the group policy team.
      • sukhdeep_grewal's avatar
        sukhdeep_grewal
        Former Employee
        Hi Linda, I have a few large customers in the UK that are asking the same question. Is there a contact in the GPO team I can reach out to please. Thanks
Date and Time
Nov 28, 202310:00 AM - 10:30 AM PST