Windows Server 2012: DNSSEC

Windows Server 2012: DNSSEC

// Server: Adatum.com
// DNS Server:  LON-DC1

1) [Server Manager} > Tools > DNS > Forward Lookup Zones > right-click Adatum.com > DNSSEC > Sign the Zone > (x) Customize zone signing parameters > (x) The DNS server LON-DC1 is the key master > under Key Signing Key (KSK), ADD > click OK > (x) NSEC3 > (x) Enable the distribution of Trust Anchors for this zone > next > Finish

2) [Server Manager} > Tools > Group Policy Management > Forest: Adatum.com > Domains > Adatum.com > right-click Default Domain Policy > Edit >

2) i) Group Managmenrt Policy Editor > Computer Configuration > Policies > Windows Settings > Name Resolution Policy > NRPT - Suffice: Adatum1.com > Enable  DNSSEC in this rule > (x) Require DNS clients to check that name and address data has been validated > Create

// Note: If you're using Windows Server 2012, the DNS server config dialogue: has an option "Enable DNSSEC validation for remote responses":

// Note: this option is missing in Windows Server 2016:
// Therefore, to enable DNSSEC validation on Windows Server 2016:
//                          DnsCmd.exe  /Config /enablednssec 1


Comments