You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/sts-recommendations-for-windows-server.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ We received several customer incident reports of large and erroneous transient t
78
78
79
79
Since these incidents occurred only when the STS feature was enabled, they may have been caused due to matching anomalous time metadata presented to STS feature from outbound SSL/TLS connections to different services on each of the affected machines. Such incidents indicate a potential incompatibility between STS feature and the applications/services deployed on the specific machines and/or in specific deployment environments.
80
80
81
-
We also received reports of customer incidents that involved large persistent time errors occurring on Windows Server OS machines with the STS feature enabled. In those timekeeping incidents, the time errors didn't self-correct within a reasonable time, and were resolved after disabling the STS feature on the affected machines. This led to those customers discovering the incompatibility between the STS feature on the affected machines with applications running on the machine or with the specific deployment environment, and aided their decision to disable STS feature in the affected deployments.
81
+
We also received reports of customer incidents that involved large persistent time errors occurring on Windows Server machines with the STS feature enabled. In those timekeeping incidents, the time errors didn't self-correct within a reasonable time, and were resolved after disabling the STS feature on the affected machines. This led to those customers discovering the incompatibility between the STS feature on the affected machines with applications running on the machine or with the specific deployment environment, and aided their decision to disable STS feature in the affected deployments.
82
82
83
83
STS was designed to function with the SSL/TLS metadata available in generic Windows OS deployments. All the customer reports about STS indicate to us that certain customer deployments of Windows Server OS may be incompatible with STS design heuristics, and the feature may not perform as expected in such scenarios.
84
84
@@ -104,9 +104,9 @@ We're advising all enterprise customers who have deployed Windows Server OS (Win
104
104
105
105
- VM hosts
106
106
107
-
- We recommend you consider disabling the STS feature by default in Windows Server OS machines in your deployment, even if these machines don't host time-sensitive workloads and even if you never experienced STS related time issues on these machines.
107
+
- We recommend you consider disabling the STS feature by default in Windows Server machines in your deployment, even if these machines don't host time-sensitive workloads and even if you never experienced STS related time issues on these machines.
108
108
109
-
- If you have never experienced STS issues in Windows Server OS machines in your environment and/or choose to continue using STS on those machines, be advised of the issues in timekeeping potentially caused by this feature. We recommend that you take note of the STS issues in Windows Server OS and the guidance discussed in this article and plan for eventually disabling the STS feature on those machines in your deployment.
109
+
- If you have never experienced STS issues in Windows Server machines in your environment and/or choose to continue using STS on those machines, be advised of the issues in timekeeping potentially caused by this feature. We recommend that you take note of the STS issues in Windows Server OS and the guidance discussed in this article and plan for eventually disabling the STS feature on those machines in your deployment.
110
110
111
111
Settings to disable Secure Time Seeding:
112
112
@@ -228,28 +228,28 @@ Timekeeping and time synchronization are complex topics that are subjects of sev
228
228
229
229
- Active Directory Domain Services (ADDS) uses NTP augmented with ADDS security extensions within the AD domain/forest and it's typically bridged outside the AD forest though standard plaintext NTP. Time distribution within ADDS uses available domain controllers as primary or intermediate time servers. Most ADDS machines dynamically discover their time server, except the DCs marked "Good Time Server" (forest root primary domain controller defaults to this role) that are either accurate sources of time or are explicitly configured to synchronize from an external time source.
230
230
231
-
- Customers must first determine whether their Windows Server OS machine is deployed in a private network or a public network and then make choices about the specific Windows timekeeping settings they're going to use in that deployment.
231
+
- Customers must first determine whether their Windows Server machines are deployed in a private network or a public network and then make choices about the specific Windows timekeeping settings they're going to use in that deployment.
232
232
233
-
- Some deployments may need redundancy of time servers to avoid any loss of availability. Relying on an odd number of comparable time servers (>1) can help meet this goal.
233
+
- Some deployments may need redundancy of time servers to avoid any loss of availability. Relying on an odd number of comparable time servers (more than one) can help meet this goal.
234
234
235
235
- Customers hosting time sensitive workloads should ensure their time distribution and monitoring in those environments meet their needs.
236
236
237
237
- Once you have sufficient information about machines that host time sensitive workloads, time distribution topology and monitoring (including time monitoring) in your deployment, we suggest you gradually roll out disabling STS on Windows Server OS SKUs (various versions/editions), starting with the least significant machine to the most significant machine.
238
238
239
239
With this background on timekeeping and time synchronization, below is a set of suggested actions to review your deployment and change it, including disabling STS as previously recommended. This sample list must be tailored to suit your specific deployments.
240
240
241
-
- Review the time distribution/synchronization mechanisms you're using for timekeeping on your Windows Server OS machines.
241
+
- Review the time distribution/synchronization mechanisms you're using for timekeeping on your Windows Server machines.
242
242
243
243
- Determine if your deployment has time-sensitive workloads and determine the margin of acceptable time error. In general, larger time errors are easier to detect than smaller time errors.
244
244
245
245
- Determine if you have a time monitoring mechanism in place on these machines to meet your timekeeping requirements. This could be an exclusive time monitoring system or a general monitoring solution that is deployed on each machine in this deployment.
246
246
247
-
- We suggest deploying time monitoring mechanisms if they're running time-sensitive workloads. Monitoring the System Event logs on a target machine for Kernel-General Event #1 is one possible way to sudden/large time changes (>1 second) or corrections. There are other ways of monitoring time, all of which are beyond the scope of this document. The higher the time accuracy your deployment needs, the more acute the need to deploy a monitoring solution.
247
+
- We suggest deploying time monitoring mechanisms if they're running time-sensitive workloads. Monitoring the System Event logs on a target machine for Kernel-General Event #1 is one possible way to sudden/large time changes (more than one second) or corrections. There are other ways of monitoring time, all of which are beyond the scope of this document. The higher the time accuracy your deployment needs, the more acute the need to deploy a monitoring solution.
248
248
249
249
- Familiarize yourself with the STS feature and the recommendations in this document to disable STS.
250
250
251
251
- If you have a test environment available, test your new settings with STS disabled in that environment to ensure they work as intended. We also recommend you test your time monitoring solution in this test environment as well.
252
252
253
-
- Gradually disable STS feature on Windows Server OS machines either via a registry setting change or via the Group Policy setting on ADDS-joined machines and schedule a restart to fully apply the change.
253
+
- Gradually disable STS feature on Windows Server machines either via a registry setting change or via the Group Policy setting on ADDS-joined machines and schedule a restart to fully apply the change.
254
254
255
255
- Validate that the W32time service is now running with STS disabled.
0 commit comments