Understanding Configuring Sites in Windows Server 2025

Understanding & Configuring
Sites and Site Components
in Windows Server 2025

Every Active Directory deployment has a physical reality — servers in multiple buildings, cities, or data centers, linked together by connections of wildly different speeds and reliability. Without Active Directory Sites, Windows has absolutely no way to respect that reality. It treats a domain controller sitting two feet away in the same server rack the same as one sitting behind a 10 Mbps satellite link on the other side of the world. AD Sites give the directory a precise map of your network topology, and every decision AD makes — from who authenticates a user to which DC gets replicated first to where Group Policy downloads from — flows directly from that map. This guide builds that map from the ground up for the vmorecloud.com domain running on server.vmorecloud.com at 192.168.91.129.

Quick Reference
01
Foundation Concepts

What Are Active Directory Sites?

An Active Directory Site is a logical container object — stored in AD’s Configuration naming context — that represents one or more IP subnets sharing fast, reliable, low-latency connectivity. The word “logical” is doing real work here: a site doesn’t inherently represent a building, city, or data center. But it is specifically designed to mirror physical network reality closely enough that Active Directory can make intelligent, network-aware decisions based on it.

“Without AD Sites, every domain controller looks equally close. With them, Active Directory knows your network as well as your routing table does.”

Three core functions flow directly from correct site configuration:

  1. Replication scheduling and bandwidth management — Intra-site replication (between DCs in the same site) is automatic, frequent, and unscheduled — changes propagate within minutes via the KCC-built topology. Inter-site replication follows the cost, schedule, and interval you define on site links, preventing AD traffic from competing with business applications on limited WAN connections.
  2. Client-to-DC affinity via DC Locator — When a user authenticates, Windows matches their IP address to a subnet, finds the associated site, and directs the login to the closest DC in that site. Incorrect sites = branch users authenticating over the WAN instead of against a local DC = every login is noticeably slower than it should be.
  3. Service location for AD-integrated workloads — DFS namespace referrals, SYSVOL access, Group Policy downloads, Kerberos ticket renewal, and DNS service discovery all use site membership to route clients toward the nearest resource. Sites make “local” genuinely mean local across every one of these services.
ℹ — The Default-First-Site-Name Problem

Every new Active Directory forest starts with a single site: Default-First-Site-Name. Every DC you promote lands in this site unless you’ve configured subnets and site assignments beforehand. In a single-building deployment, this is harmless. In any multi-location environment, leaving all DCs in the default site is one of the most common and consequential AD misconfigurations — because AD assumes all DCs in the same site are equally fast, and replicates them as such.

02
Architecture

The Six Site Components Explained

AD Sites and Services is built from six distinct object types. Each does a specific job, and the whole topology only works when all six are correctly configured and working together.

Component · 01 Sites

Named AD containers representing a physical network location. DCs and clients derive their site membership from subnet matching. The fundamental unit of all AD topology decisions.

Component · 02 Subnets

IP address ranges mapped to specific sites. AD matches each machine’s IP against subnet objects at connection time to determine site membership. Missing subnets = silent misbehavior.

Component · 03 Site Links

Objects that define replication connections between two or more sites. Each carries a cost (routing preference), interval (check frequency), and schedule (permitted replication hours).

Component · 04 Site Link Bridges

Groups multiple site links into an explicit transitive replication path. Required when automatic site link transitivity is disabled and you need manual control over multi-hop replication routing.

Component · 05 Bridgehead Servers

The designated DC in each site that handles all inter-site replication traffic. Auto-selected by the ISTG or manually designated. Every inter-site AD change passes through the bridgehead.

Component · 06 KCC & ISTG

The Knowledge Consistency Checker (intra-site) and Inter-Site Topology Generator (inter-site) automatically build and continuously maintain optimal replication connection objects. They run silently in the background.

03
Reference Architecture

Site Topology for Domain

Throughout this guide, we build and configure a three-site hub-and-spoke architecture. server.vmorecloud.com at 192.168.91.129 anchors the central HQ datacenter site. Two branch offices connect via site links of different quality — East over fiber, West over a VPN tunnel.

Site — Branch East
EastDC01
10.10.20.0/24
Fiber · Cost 50
Hub — HQ DataCenter
server.vmorecloud.com
192.168.91.129
Primary DC · Writable
Site — Branch West
WestDC01
10.10.30.0/24
VPN · Cost 100

All inter-site replication flows through server.vmorecloud.com as the designated bridgehead for the HQ site. Branch-East gets a 15-minute replication interval on an unrestricted schedule; Branch-West is restricted to off-peak hours to protect shared VPN bandwidth during business hours.

04
Platform Improvements

What Windows Server 2025 Changes

Windows Server 2025 brings six meaningful upgrades to how AD Sites and replication work — each worth understanding before deployment:

New · 01 Faster KCC Convergence

The KCC and ISTG in WS2025 recalculate topology changes after a DC failure, site addition, or link reconfiguration significantly faster than in WS2022 — shrinking the window where stale replication paths persist.

New · 02 TLS 1.3 Inter-Site Replication

All inter-site RPC replication traffic between bridgehead servers defaults to TLS 1.3 in WS2025. Previous versions maxed out at TLS 1.2. Significant for environments with compliance requirements around data-in-transit encryption.

New · 03 Smarter ISTG Bridgehead Selection

The ISTG in WS2025 evaluates candidate DCs on available memory and current replication queue depth — not just uptime — when choosing bridgehead servers. Results in fewer overloaded bridgeheads in busy environments.

New · 04 Azure Arc Site Awareness

Azure Arc-managed hybrid workloads can now consume on-premises AD site membership as a proximity signal for cloud resource routing decisions — finally bridging on-prem network topology and hybrid cloud placement.

New · 05 Expanded Topology Diagnostics

New event log entries and richer repadmin output in WS2025 expose ISTG decision logic, site link cost calculations, and replication queue detail at a level of granularity not available in previous server versions.

New · 06 Updated PowerShell AD Module

PowerShell 7 with the refreshed ActiveDirectory module adds bulk subnet assignment cmdlets, improved pipeline support for site object management, and new health reporting commands purpose-built for large topologies.

05
Hands-On Configuration

Configuring Sites and Subnets

All commands in this section run on the primary DC — server.vmorecloud.com at 192.168.91.129 — as a Domain Administrator. Open PowerShell elevated and import the AD module first.

Step 1 — Rename the Default Site

PowerShell server.vmorecloud.com · 192.168.91.129
# Rename Default-First-Site-Name to your actual HQ site name Get-ADReplicationSite “Default-First-Site-Name” | Rename-ADObject -NewName “HQ-DataCenter” # Confirm the rename succeeded Get-ADReplicationSite “HQ-DataCenter” | Select Name, DistinguishedName

Step 2 — Create Branch Office Sites

PowerShell server.vmorecloud.com
# Create the East and West branch sites for vmorecloud.com New-ADReplicationSite -Name “Branch-East” -Description “Eastern branch — 1Gbps fiber connected” New-ADReplicationSite -Name “Branch-West” -Description “Western branch — VPN 50Mbps connected” # List all sites in the forest to confirm creation Get-ADReplicationSite -Filter * | Select Name, Description | Format-Table -AutoSize

Step 3 — Create and Assign Subnet Objects

PowerShell Assign all network ranges — no gaps permitted
# HQ site — covers server.vmorecloud.com (192.168.91.129) New-ADReplicationSubnet -Name “192.168.91.0/24” -Site “HQ-DataCenter” ` -Description “HQ datacenter — server.vmorecloud.com [192.168.91.129]” # Branch subnets New-ADReplicationSubnet -Name “10.10.20.0/24” -Site “Branch-East” -Description “East branch LAN” New-ADReplicationSubnet -Name “10.10.30.0/24” -Site “Branch-West” -Description “West branch LAN” # Verify all subnets and their site mappings Get-ADReplicationSubnet -Filter * | Select Name, Site | Format-Table -AutoSize
⚠ — Never leave a subnet uncovered

If a client or DC IP address doesn’t match any defined subnet object, AD logs Event ID 5807 and assigns the machine to a random site. This breaks DC Locator, causes incorrect Group Policy application, degrades DFS referrals, and produces erratic replication behavior — all silently. Always define subnet objects for every network range in your environment: LAN segments, Wi-Fi VLANs, VPN client pools, Azure hybrid connections, and management networks.

Step 4 — Move DCs into Their Correct Sites

PowerShell server.vmorecloud.com
# Place the primary DC in HQ-DataCenter Move-ADDirectoryServer -Identity “SERVER” -Site “HQ-DataCenter” # Move branch DCs to their assigned sites Move-ADDirectoryServer -Identity “EASTDC01” -Site “Branch-East” Move-ADDirectoryServer -Identity “WESTDC01” -Site “Branch-West” # Confirm final DC-to-site assignments Get-ADDomainController -Filter * | Select Name, Site, IPv4Address | Format-Table -AutoSize
06
Replication Topology Control

Site Links, Costs & Schedules

Site links define the replication pathways between sites. Each link has three parameters that together determine when and how replication happens: cost (route preference — lower wins), interval (how often AD checks for changes within the permitted window, minimum 15 minutes), and schedule (which hours replication is permitted at all).

Site Link Cost Reference

Fiber / 1 Gbps
50

Lowest cost — always the preferred replication route.

MPLS / 100 Mbps
75

Reliable leased line — secondary preference after fiber.

VPN / 50 Mbps
100

Acceptable but variable — higher cost reflects overhead.

Satellite / 5 Mbps
250

High-latency failover only — never a primary replication path.

Create the Site Links

PowerShell server.vmorecloud.com · 192.168.91.129
# HQ ↔ East branch — fiber link, cost 50, 15-minute replication interval New-ADReplicationSiteLink ` -Name “SL-HQ-BranchEast” ` -SitesIncluded “HQ-DataCenter”,”Branch-East” ` -Cost 50 ` -ReplicationFrequencyInMinutes 15 ` -Description “HQ to East — 1Gbps fiber” # HQ ↔ West branch — VPN link, cost 100, 30-minute replication interval New-ADReplicationSiteLink ` -Name “SL-HQ-BranchWest” ` -SitesIncluded “HQ-DataCenter”,”Branch-West” ` -Cost 100 ` -ReplicationFrequencyInMinutes 30 ` -Description “HQ to West — VPN 50Mbps” # Verify all site links Get-ADReplicationSiteLink -Filter * | Select Name, Cost, ReplicationFrequencyInMinutes

Apply an Off-Peak Replication Schedule to West Branch

PowerShell Restrict West VPN link to 20:00–06:00 weekdays
# Create schedule object — replication permitted 20:00–06:00 only $schedule = New-Object -TypeName System.DirectoryServices.ActiveDirectory.ActiveDirectorySchedule $schedule.SetDailySchedule(“Twenty”, “Zero”, “Six”, “Zero”) # Apply schedule to the West branch site link Set-ADReplicationSiteLink “SL-HQ-BranchWest” -ReplicationSchedule $schedule # Confirm schedule applied Get-ADReplicationSiteLink “SL-HQ-BranchWest” | Select Name, ReplicationSchedule
07
Replication Gateway

Configuring Bridgehead Servers

The bridgehead server is the DC in each site that handles all inter-site replication traffic. It’s the replication gateway — every change that needs to cross a site link flows through it. By default, the ISTG selects the bridgehead automatically based on DC availability. You can override this with a manual preferred bridgehead designation.

In the vmorecloud.com topology, server.vmorecloud.com at 192.168.91.129 is the natural bridgehead for HQ-DataCenter — it’s the writable primary DC with the most resources and the lowest replication queue depth.

Designate a Preferred Bridgehead Server

PowerShell Designate server.vmorecloud.com as preferred bridgehead
# Add server.vmorecloud.com as preferred bridgehead for IP transport in HQ site Set-ADObject ` -Identity “CN=SERVER,CN=Servers,CN=HQ-DataCenter,CN=Sites,CN=Configuration,DC=vmorecloud,DC=com” ` -Add @{bridgeheadTransportList = “CN=IP,CN=Inter-Site Transports,CN=Sites,CN=Configuration,DC=vmorecloud,DC=com”} # Verify the preferred bridgehead designation Get-ADObject -SearchBase “CN=HQ-DataCenter,CN=Sites,CN=Configuration,DC=vmorecloud,DC=com” ` -Filter * -Properties bridgeheadTransportList | Where-Object { $_.bridgeheadTransportList } | Select Name, bridgeheadTransportList # Find the current ISTG-selected bridgehead from nTDSSiteSettings Get-ADObject -SearchBase “CN=HQ-DataCenter,CN=Sites,CN=Configuration,DC=vmorecloud,DC=com” ` -Filter {objectClass -eq “nTDSSiteSettings”} -Properties interSiteTopologyGenerator | Select interSiteTopologyGenerator
⚠ — Manual bridgehead eliminates automatic failover

When you designate a preferred bridgehead, the ISTG will not automatically select a replacement if that server goes offline. Inter-site replication for that site halts entirely until the designated server comes back. If uptime matters, either designate two preferred bridgehead servers for the same site (AD will use both), or leave bridgehead selection fully automatic and let the ISTG manage failover without intervention.

08
Transitive Routing

Site Link Bridges & Transitivity

By default, all AD site links are transitive — meaning replication can route through intermediate sites to reach a destination even without a direct site link between them. This is controlled by the Bridge all site links option on the IP transport object, which is enabled by default.

Aspect “Bridge all site links” ON (default) “Bridge all site links” OFF
A → B → C replicationAutomatic — ISTG routes through BRequires explicit site link bridge object
Admin overheadLow — ISTG manages routingHigh — manual bridge objects required
Routing controlAutomatic (ISTG decides)Fully manual (you decide every hop)
Best use caseMost enterprise environmentsStrict hub-spoke with controlled routing policy

Create a Manual Site Link Bridge

PowerShell Only needed if “Bridge all site links” is disabled
# Explicit transitive bridge: East ↔ West must replicate via HQ New-ADReplicationSiteLinkBridge ` -Name “Bridge-EW-viaHQ” ` -SiteLinksIncluded “SL-HQ-BranchEast”,”SL-HQ-BranchWest” ` -Description “East↔West transitive path through HQ-DataCenter” # Verify the bridge object was created Get-ADReplicationSiteLinkBridge -Filter *
09
Operations

Verify, Monitor & Troubleshoot

Core Health Commands

Repadmin + nltest + PowerShell Run from server.vmorecloud.com or branch DCs
# Full replication health summary across all sites and DCs repadmin /replsummary # Show current connection objects built by KCC/ISTG repadmin /showrepl # Which site does server.vmorecloud.com think it belongs to? nltest /dsgetsite # Which DC did the last user login use? (run on the client) echo %LOGONSERVER% # Discover the nearest DC for Branch-East site explicitly (Get-ADDomainController -Discover -SiteName “Branch-East”).Name # Force client to re-evaluate site membership (after subnet changes) nltest /sc_reset:vmorecloud.com # Force KCC to immediately recalculate topology on all DCs repadmin /kcc * # Force inter-site replication NOW — bypass the schedule repadmin /syncall SERVER /AdeP # Full AD health check including topology and replication dcdiag /test:topology /v dcdiag /test:replications /v

Key Event IDs — Site Troubleshooting Reference

Event IDSourceMeaning & Action
1311NTDS ReplicationKCC cannot calculate a valid inter-site replication path. Check site links exist and connect the right sites.
1566NTDS ReplicationISTG selected a new bridgehead server. Informational — review if unexpected.
5807NetLogonClient connected from a subnet not mapped to any site. Add the missing subnet object immediately.
1388NTDS ReplicationInter-site replication failure — bridgehead server unreachable. Check network and firewall rules.
2088NTDS ReplicationBridgehead cannot resolve partner DC FQDN. Check DNS resolution between sites.
1126NTDS GeneralDC cannot contact AD. Often caused by a missing subnet → wrong site assignment.
✔ — Run dcdiag after every topology change

dcdiag /test:topology /v validates your entire site topology in a single pass — it checks for orphaned connection objects, DCs not assigned to sites, misconfigured site links, and replication path failures. Make it standard practice after any site, subnet, or site link change before marking the task complete.

10
Summary

Key Highlights

1 Sites Are AD’s Physical Network Map

Without defined sites, AD treats all domain controllers as equally close and routes replication, authentication, and service requests with zero awareness of real network topology. Sites translate physical reality into AD intelligence.

2 Subnets Are the Load-Bearing Structure

Subnet-to-site mappings are the mechanism that assigns machines to sites based on IP address. One uncovered subnet — a Wi-Fi VLAN, VPN pool, Azure hybrid range — silently breaks DC affinity for every machine in that range.

3 Site Link Cost Controls Replication Preference

Lower cost = preferred replication path. The ISTG runs Dijkstra’s shortest-path algorithm across your cost assignments. Assign costs that genuinely reflect link bandwidth and reliability — not arbitrary numbers.

4 Bridgehead Servers Are Single Points of Accountability

Every inter-site replication byte flows through one DC per site. Manual designation gives control but removes automatic failover. Know this trade-off before you override the ISTG’s automatic selection.

5 KCC and ISTG Are Your Best Automation Tools

The automatic topology generators respond to DC failures, site additions, and link changes without any admin intervention. Only create manual connection objects when you have a specific requirement they genuinely cannot satisfy.

6 Windows Server 2025 Raises the Baseline

Faster KCC convergence, TLS 1.3 inter-site encryption, smarter ISTG bridgehead selection, and Azure Arc site awareness make WS2025 the strongest AD sites platform Microsoft has shipped. Use its diagnostics tools actively.

11
Business & Technical Impact

Why Sites and Site Components Matter

1
Every branch login is directly affected by site accuracy

The DC Locator service runs at every single user login — and it uses subnet-to-site mapping to find the nearest domain controller. Incorrect or missing sites force branch users to authenticate over the WAN instead of against a local DC. The result is measurable: 2–5 additional seconds per login, multiplied by every user, every working day, at every branch location. Fix your site configuration once and every login at every branch gets permanently faster.

2
Misconfigured sites silently drain WAN budgets

Without site-aware replication, AD replicates changes to every DC as fast as it can, treating a satellite link the same as a local Gigabit LAN. Correct site link costs and replication schedules can reduce inter-site AD replication bandwidth consumption by 60–80% in multi-site organizations. That’s a real and measurable reduction in monthly MPLS and VPN circuit costs, achievable through configuration alone.

3
Group Policy, DFS, and SYSVOL all depend on site accuracy

Every AD-integrated service that has a “nearest server” concept uses site affinity for client routing — DFS namespace referrals, SYSVOL access, Group Policy downloads. Without correct site configuration, workstations at a branch may download their Group Policy from a DC on the other side of a constrained WAN link at every single login. Sites make local resources genuinely local for every one of these services, not just authentication.

4
Replication scheduling protects business-hour performance

Restricting AD replication on bandwidth-constrained links to off-peak hours ensures that VoIP calls, ERP queries, and video conferences get the bandwidth they need during working hours, without competing with AD directory sync. AD replication doesn’t need to be real-time to be reliable — it needs to be scheduled, predictable, and invisible to business users during peak hours.

5
Sites are the foundation for reliable hybrid identity

Microsoft Entra Connect Sync, Azure Arc, and Microsoft Entra Domain Services all consume on-premises AD site topology as a signal for sync source selection, replication routing, and proximity-based resource placement. An AD environment without correct site configuration produces broken hybrid behavior — incorrect Entra Connect server placement, degraded Azure Arc routing, and suboptimal sync scheduling. Get on-premises sites right first, and hybrid services inherit that accuracy automatically at no additional cost.

Conclusion

Active Directory Sites and Site Components are not an advanced feature you get to eventually — they are the core infrastructure layer that every other AD-dependent service builds on top of. A domain with unconfigured or incorrectly configured sites is one where branch users experience unnecessary latency at every login, replication traffic crosses WAN links it shouldn’t, Group Policy downloads from the wrong server, and no one can pinpoint why AD-related performance degrades as the network grows.

For the vmorecloud.com domain running on server.vmorecloud.com at 192.168.91.129, the three-site hub-and-spoke topology built in this guide gives AD a precise, accurate map of the network — one that scales cleanly as new branches are added, costs traffic intelligently across different link qualities, and lets the KCC and ISTG automate the replication topology without constant admin intervention. Windows Server 2025 makes this stronger still: TLS 1.3 inter-site replication, faster KCC convergence, smarter bridgehead selection, and Azure Arc awareness make the platform genuinely better for modern hybrid environments.

One afternoon of deliberate configuration. Permanent improvements to authentication speed, replication efficiency, WAN costs, and service reliability at every location. There is no better return-on-effort investment in your Active Directory environment.

Leave a Reply

Your email address will not be published. Required fields are marked *