Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
The Global Catalog (GC) is a distributed data repository — a special, read-only data store hosted by one or more domain controllers — that contains a partial replica of every object in every domain across the entire Active Directory forest. Unlike a standard domain controller, which only knows about objects in its own domain, a GC server knows about everything, everywhere in the forest.
The GC stores a complete, writable copy of every object in its own domain, plus a read-only, partial copy of every object in all other domains in the forest. That “partial” copy includes the attributes most commonly searched for — display name, email address, SamAccountName, group membership — making the GC the forest-wide search engine for Active Directory.

The GC enables searches that span multiple domains without requiring inter-domain referrals for every query. Applications like Exchange, Outlook, and SharePoint use the GC to resolve email addresses and find users across the entire organization.
Every time a user logs in, Windows must enumerate all universal groups that user belongs to — across all domains — to build the complete access token. The GC is the only place that stores this universal group membership data for the entire forest.
When a user logs in with a UPN (user@vmorecloud.com), the authenticating DC uses the GC to locate which domain contains that UPN suffix — essential in multi-domain forests where the login domain differs from the user’s home domain.
Exchange Server, Microsoft Teams, SharePoint, and many third-party enterprise applications make GC queries on port 3268 (or 3269 for TLS) for address book lookups, resource discovery, and identity resolution across domain boundaries.
Standard LDAP queries go to port 389. GC queries use port 3268 for standard LDAP and port 3269 for LDAP over TLS. When an application fails to find a user in another domain, the first diagnostic question is always: can the app reach port 3268 on a GC server?
In a single-domain forest like vmorecloud.com, every domain controller that is designated as a GC server holds a complete, writable replica of all objects in that domain. In multi-domain forests, the GC additionally holds partial replicas from all other domains.
server.vmorecloud.com) on port 3268 and queries for the user’s universal group memberships.When a branch WAN link goes down and there’s no GC server or UGMC cache available locally, domain users cannot log in — even though a local domain controller is running and healthy. Understanding this failure mode is the reason GC placement and UGMC configuration are critical design decisions for every multi-site AD deployment.
Universal Group Membership Caching (UGMC) is a feature that allows a branch domain controller to cache a user’s universal group memberships locally — so that subsequent logins by the same user do not require a WAN query to a GC server. It was introduced in Windows Server 2003 R2 and has been refined in every server version since.
The first time a user logs in at a branch with UGMC enabled, the local DC queries a GC server (over the WAN if necessary) to get that user’s universal group memberships. It then caches this information locally. The cache is refreshed every 8 hours by default (configurable). On subsequent logins, the DC reads from its local cache instead of querying the GC — meaning logins succeed even when the WAN link to the GC server is down.
UGMC stores the universal group memberships for each user that has logged in through the DC. The cache lives in the domain controller’s copy of the AD database. It is not replicated to other DCs — it’s per-DC and per-user.
By default, cached memberships are refreshed every 8 hours. This means if a user is added to or removed from a universal group, the change takes up to 8 hours to be reflected at cached branch DCs. This is a trade-off to understand before deployment.
UGMC is the right choice for branch offices where: the site has a constrained or unreliable WAN link, the branch has limited server resources (no need to host the full GC data set), users at the branch are in a single domain, and no Exchange or other GC-dependent applications run at the branch. It solves the login resilience problem with minimum resource overhead.
| Scenario / Requirement | Use GC Server | Use UGMC |
|---|---|---|
| Exchange Server at branch | Required — GC port 3268 | Insufficient — GC needed |
| Multi-domain forest users logging in | Full support | Supported (universal groups cached) |
| Forest-wide LDAP directory searches | Full support | Not supported |
| Constrained WAN link at branch | Reduces WAN dependency | Best choice — minimal WAN usage |
| Limited server resources at branch | Higher storage/memory overhead | Very low overhead |
| UPN suffix routing (non-default domains) | Required | Not supported |
| WAN resilience for logins | Full — no WAN needed once local | Full for cached users after first login |
| Single-domain forest | Works perfectly | Ideal — simpler, lighter weight |
| Immediate group membership changes | Immediate via AD replication | Up to 8hr delay (configurable) |
WS2025 improves the speed at which GC attribute changes (partial attribute set updates) propagate to all GC servers across the forest — shrinking the window where GC data is stale after a change.
Windows Server 2025 adds per-user cache refresh controls via Group Policy, allowing administrators to set different refresh intervals for privileged accounts vs standard users — a significant security improvement.
GC LDAP connections on port 3269 now default to TLS 1.3 in WS2025, replacing TLS 1.2. This affects Exchange, directory-enabled apps, and any client querying the GC over an encrypted channel.
WS2025 deepens the integration between on-premises GC data and Microsoft Entra ID via the updated Entra Connect Sync engine — GC-level attributes now sync more reliably to cloud identity for hybrid deployments.
The GC holds a partial replica of every object in every domain across the forest. It is the only place where universal group memberships for the entire forest are stored and resolvable at login time.
Windows cannot build a complete access token without knowing all universal groups the user belongs to — across all domains. Without a reachable GC or a UGMC cache, domain logins fail entirely.
UGMC caches universal group memberships locally after the first login, eliminating WAN dependency for subsequent logins. It adds almost no storage overhead and is the recommended solution for resource-constrained branch offices.
UGMC only solves the login resilience problem. Any application that needs to search the forest-wide directory — Exchange Server, SharePoint, Teams — still requires a real GC server accessible on port 3268/3269.
Cached group memberships refresh every 8 hours by default. If a user is added to or removed from a universal group that controls critical access, that change may take up to 8 hours to reflect at branch offices using UGMC.
Windows Server 2025 allows different UGMC refresh intervals for different user types via Group Policy — a major improvement for privileged account security that wasn’t available in previous server versions.
Before making changes, check which DCs in your domain are currently GC servers.
Open Active Directory Sites and Services → expand Sites → Default-First-Site-Name → Servers → SERVER → right-click NTDS Settings → Properties → check “Global Catalog” → OK.
Use UGMC when you have a branch DC (not the primary server.vmorecloud.com) in a site where hosting a full GC is impractical due to storage, bandwidth, or resource constraints. UGMC is enabled per-site in AD Sites and Services, not per-DC.
Open Active Directory Sites and Services → expand Sites → Branch-East → right-click “NTDS Site Settings” → Properties → check “Enable Universal Group Membership Caching” → optionally set “Refresh cache from” to specify which GC server to cache from → OK.
| Event ID | Log | Meaning |
|---|---|---|
1119 | Directory Service | DC is now advertising itself as a GC server — promotion complete |
1120 | Directory Service | DC stopped advertising as GC — GC role removed or replication issue |
1655 | Directory Service | GC is unresponsive — logon failures may occur if UGMC not configured |
1125 | Directory Service | Active Directory could not contact a GC — check network connectivity |
1645 | Directory Service | UGMC refresh occurred — normal operational event |
1863 | Directory Service | UGMC cache expired and refresh is pending — WAN issue may delay this |
After enabling or disabling GC on any DC, or enabling UGMC on a new site, run dcdiag /test:advertising on the affected DC and dcdiag /test:replications on the primary DC. These two tests catch 90% of GC and UGMC configuration problems before they impact users.
Every domain login that involves universal groups — which means every login in any forest with universal groups configured — will fail if a GC server or UGMC cache is not reachable. This isn’t a subtle performance problem: it’s a hard failure. Users see “No logon servers available” and cannot work. Correct GC placement and UGMC configuration are the primary defenses against this failure mode at branch offices.
Microsoft Exchange Server uses the Global Catalog for virtually every operation: sending email (address lookups), receiving email (recipient resolution), managing mailboxes (user attribute queries), and processing calendar requests (free/busy lookups). An Exchange environment without reliable GC access on port 3268 will produce cascading failures across every Exchange service — making GC placement a prerequisite for any Exchange deployment, not an afterthought.
Deploying a full GC server at every branch site requires that site to host a complete copy of the partial attribute set for the entire forest — which grows as the forest grows. For a branch office with 20 users and a 50 Mbps VPN link, that’s a poor use of resources. UGMC achieves the same login resilience benefit with a fraction of the storage and bandwidth overhead: it only caches the specific universal group memberships of users who actually log in at that site — nothing more.
GDPR, ISO 27001, and SOC 2 all require that access control decisions be based on current, accurate group memberships. The 8-hour UGMC cache window means a user removed from a security-critical universal group may retain access at a branch office for up to 8 hours after revocation. Understanding, documenting, and configuring this refresh window appropriately is a compliance requirement — not just a best practice — in regulated environments.
Microsoft Entra Connect Sync reads GC attributes when synchronizing on-premises identities to Azure AD / Microsoft Entra ID. If GC data is incomplete, stale, or missing attributes due to misconfiguration, hybrid identity objects in the cloud will be incomplete — breaking Entra ID conditional access policies, Teams presence, Exchange Online hybrid flows, and Azure AD application registrations. Getting the GC right on-premises is foundational to every hybrid identity scenario.
The Global Catalog and Universal Group Membership Caching are two solutions to the same fundamental problem: how do you give every domain controller in every location the information it needs to authenticate users and build correct access tokens — without routing every login through a central server over a WAN link that might fail? The GC solves it comprehensively, with full forest-wide directory search capabilities but higher resource overhead. UGMC solves it efficiently, with minimal overhead but scope limited to login resilience only.
The primary DC at the HQ datacenter carries the GC role (and should always have), and branch sites without Exchange deployments should have UGMC enabled to provide login resilience without the overhead of a full GC replica. That combination — GC at HQ, UGMC at branches — is the textbook Windows Server 2025 design for exactly this kind of hub-and-spoke Active Directory topology.
Windows Server 2025 makes both features more capable than ever — with per-user cache refresh controls in UGMC, TLS 1.3 GC connections, and tighter Azure Entra integration. The five labs in this guide give you everything you need to deploy, verify, and monitor both features confidently in a production environment.
