Windows Active Directory

What are Domain Functional Levels and how do you raise them?

Domain Functional Levels – An overview

Domain functional level (DFL) determines the features of a Domain Controller (DC) based on the Windows Server Operating System (OS) it runs on. A feature set of a particular DFL will be available for a DC if it runs on the operating system version that is compatible with the functional level. Note that, the OS version constraint is only for the domain controller and not applicable for the member servers or the workstations in the domain. Thus larger organizations need not worry about upgrading every single workstation in their network to the specific OS for availing features of a particular DFLs.

Choosing Domain Functional Level   

When AD DS is deployed, you can choose the functional level of the forest. DFL should always be chosen at the same level or higher level than the Forest Functional Level (FFL). Further, by default, the DFL for any new domain added to the forest will take the same level as the FFL. For instance, if the FFL is Windows Server 2008, then the DFL can be set as the same or higher level. It’s highly recommended to always set the latest version of the Windows Server as the functional level. This helps in leveraging all the latest AD DS features that are available.

Prerequisites to raise the domain functional level

The process of raising the DFL is done to increase the capabilities and enhance the security of the domain. The  Windows DFL has a new and upgraded set of features in every succeeding OS version. It is advisable to upgrade the functional level once the prerequisites are met.

Domain Functional Levels and their features

The following table lists the Windows Server version and its DFL features.

Things to keep in mind:

Domain Functional LevelAvailable Features
Windows 2000 nativeUniversal groups for both distribution and security groups.Group nestingGroup conversion between security and distribution groups.Security identifier (SID) history
Windows Server 2003.NET technologies supportWindows XP integrationIncreased security and built-in firewall.Improved disk management.Provides a backup system to restore lost files.Internet Information Services (IIS) v6.0
Windows Server 2008Last Interactive Logon InformationFine-grained password policiesPersonal Virtual DesktopsSupports Advanced Encryption for the validation in Kerberos protocol.
Windows Server 2008 R2Active Directory Administrative CenterPowerShell 2.0Support for the .NET Framework in Server CoreEnhancements to authentication mechanism. Using this feature the information in the token can be extracted whenever a user attempts to access any of the claims-aware application that has been developed to determine authorization based on a user’s logon method.Live MigrationAutomatic Service Principal Name management. This feature is specifically for services running on a computer under the context of a Managed Service Account.
Windows Server 2012Improvements to reduce authentication failures due to large service tickets.User Access LoggingKDC resource group compression.Increase in the Kerberos Security Support Provider Interface (SSPI) context token buffer size.Group Policy to set a maximum for the Kerberos SSPI context token buffer size.KDC with warning events for large Kerberos tickets.Windows Management InfrastructureSupport for claims, compound authentication, and Kerberos armoring.
Windows Server 2012 R2Software Inventory LoggingMobile Device Management RegistrationTiered Storage Spaces provides greater performance and scalabilitySite-to-site VPN Gateway

How to check the Domain Functional Level

Before raising the domain functional level, it is necessary to check the existing domain functional level. Follow these steps:

How to view Domain Functional Level from Active Directory Users and Computers (ADUC)
Checking the Domain Functional Level from Active Directory Users & Computers (ADUC)

Raising the Domain Functional Level

How to raise your domain functional level

Security impact of Domain Functional Levels

Each version of the Windows Server comes with a list of updates, and these updates bring major improvements on the security front. Hence, it is important to upgrade your domain functional level to the appropriate level that contains the necessary security functionalities for your organization. Here are some major security upgrades from each Windows Server version:

  1. Windows Server 2008: Fine-grained Password Policies.
  2. Windows Server 2012 R2: Restricted Admin mode for Remote Desktop Connection, LSA protection, and Protected Users Security Group.
  3. Windows Server 2016: Enhanced credential management functionalities.

Exit mobile version