Video – How to run Active Directory time synchronization using the w32tm command

Home > Blogs > Windows Server > Video – How to run Active Directory time synchronization using the w32tm command

Video – How to run Active Directory time synchronization using the w32tm command

Like This Blog 0 Interface
Added by October 31, 2011

In this DrillBit Video, Microsoft MVP Brian McCann shows how to utilize the w32tm command to run Active Directory time synchronization.

In Active Directory, we know that our clients need to be within five minutes of the Active Directory Domain Controller. Here is a quick solution using the w32tm command that will show you what your time differential is between your primary domain controller and your clients.

Use the name or IP address of the primary domain controller and add ‘samples’. The samples are the number of times this will run the AD time sync per client. Once activated, you can now begin to see that they are within a thousandth of a second of the primary domain controller. The chart shows that they’re in the middle which is good. If the chart displays the performance to the left, this would mean that the time synchronization is slow, if it displays on the right it would indicate fast clock.

Upcoming live Active Directory training at Interface Technical Training:
HH9108R2: HardHat™ Windows Server 2008 R2 Active Directory Domain Services Administration
HH9308R2: HardHat™ Windows Server 2008 R2 Advanced Active Directory Design and Implementation

Is there a DrillBit™ Video you would like to see?
Let us know in the comments section below. If it’s a popular technical problem, we’ll make a DrillBit™ video with the solution.

Videos You May Like

Creating Users and Managing Passwords in Microsoft Office 365

0 642 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

How to clone a Windows Server 2012 or 2012 R2 Domain Controller

3 1482 3

One of the coolest new features in Window Server 2012 and Windows Server 2012 R2 is the ability to clone a Domain Controller. In the past, if we had virtualized Domain Controllers and we actually took a snapshot of it and then rolled back to that snapshot, it would break the logon service on that … Continue reading How to clone a Windows Server 2012 or 2012 R2 Domain Controller

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.