Phone Get Quote
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

How to check the health of your Active Directory

IT administrators should constantly monitor the health of their Active Directory environment. This proactive step is important for ensuring that AD performance is optimized, and the IT team is not flooded with help desk calls.

This article looks at just four ways in which IT teams can assess and check their AD health, and take remedial actions, if necessary. This is not an exhaustive list.

  • Make sure that domain controllers are in sync and that replication is ongoing.

    The command Repadmin /replsummary summarizes the replication status of all the domain controllers in all the domains in the forest. You will also get to know the last time a DC replicated, and why it stopped replicating.

    Here's a sample output:
  • Make sure that all the dependency services are running properly.

    There are four system components that are critical for the efficient running of Active Directory Domain Services: 1) DFS Replication, 2) DNS Server, 3) Intersite Messaging, and 4) Kerberos Key Distribution Center (See the screenshot below).


    Make sure that these components are running properly by executing the following command:

    $Services='DNS','DFS Replication','Intersite Messaging','Kerberos Key Distribution Center','NetLogon',’Active Directory Domain Services’
    ForEach ($Service in $Services) {Get-Service $Service | Select-Object Name, Status}

    A sample output after executing this command is shown below. Note that we're also checking the health of the NetLogon service, and Active Directory Domain Services (denoted by NTDS) as a whole. The sample status here shows that all services are running.

  • Use the Domain Controller Diagnostic tool (DCDiag) to check various aspects of a domain controller.

    The DCDiag tool can be used by IT administrators to test several aspects of a domain controller including DNS. One of the most common reasons for the non-performance of AD is DNS. DNS failure can in turn lead to replication failure. Executing DCDiag for DNS will enable IT administrators to check the health of DNS forwarders, DNS delegation, and DNS record registration.

    Here's the command to run this:
    DCDiag /Test:DNS /e /v
    Here's the sample output:
  • Detect unsecure LDAP binds.

    The first step towards mitigating the vulnerability of unsecure LDAP binds is to identify whether you are affected, which you can do by looking through event ID 2887. Event 2887 is logged by default in the DC once every 24 hours, and it shows the number of unsigned and cleartext binds to the DC. Any number greater than zero indicates your DC is allowing unsecure LDAP binds.

    Next, you need to detect all devices and applications using unsecure binds by looking through event ID 2889. Event 2889 is logged in the DC each time a client computer attempts an unsigned LDAP bind. It displays the IP address and account name of the computer that attempted to authenticate over an unsigned LDAP bind.

    The PowerShell cmdlet for getting this is as follows:
    Get-WinEvent -FilterHashtable @{
                    LogName = 'Security'
                        ID = 2889
    Here's a sample output.

    In this sample output, we don't see any unsecure binds.

  • Avoid complex PowerShell-scripting, and simplify AD change auditing with ADAudit Plus.
  • By clicking 'Get Your Free Trial', you agree to processing of personal data according to the Privacy Policy.
  • Thanks!
  • Your download is in progress and it will be completed in just a few seconds! If you face any issues, download manually here.

Related Resources

ADAudit Plus Trusted By