TSF – Giải pháp IT toàn diện cho doanh nghiệp SMB | HCM

P12 - Configure Time Service And PDC Emulator in Windows Server 2025

WinServer2025 – P12 Configure Time Service And PDC Emulator in Windows Server 2025

Time synchronization in Active Directory is not optional — it is critical.
If the PDC Emulator in Windows Server is not configured properly, your domain can face Kerberos failures, login issues, replication errors, and unstable authentication behavior.

In this guide, you will learn how to correctly configure Windows Time Service and properly set up the PDC Emulator in Windows Server 2025 following Microsoft best practices.


1️⃣ Definition

🕒 What Is Windows Time Service?

Windows Time Service is the service responsible for time synchronization (time sync) in Windows environments.

🏢 What Is PDC Emulator?

PDC Emulator is an FSMO Role (Flexible Single Master Operation) in Active Directory.

Each domain has only one PDC Emulator.


🔎 What Does the PDC Emulator Do?

🔹 1. Time Master for the Entire Domain

  • Acts as the standard time source

  • All other DCs → sync time from the PDC

  • Clients → sync time from the nearest DC

🔹 2. Handles Password Changes Fastest

  • User changes password

  • Other DCs haven’t replicated yet

  • The DC will ask the PDC Emulator for authentication

🔹 3. Prioritizes Account Lockout Processing

  • Lock/unlock user accounts

🔹 4. Compatible with Legacy Systems

  • Supports legacy PDC behavior (NT4 era)


🕰 Important: Timezone vs Time Synchronization

Time only has logical significance.

Timezone does NOT sync time from the internet.

Timezone is just a way to display time (UTC+7, UTC+0…), not related to the time source.

Different timezones → only different display methods.

Example:

  • DC: UTC+7 → 09:00

  • Client: UTC+0 → 02:00

➡️ In reality, it’s the same time
➡️ Kerberos is still OK
➡️ Login is still OK


2️⃣ Why You Must Configure Time Service Correctly

If you DO NOT configure Time Service correctly in Active Directory:

❌ Domain Controller may:

  • Get time from BIOS

  • Get time from hypervisor

  • Drift automatically based on crystal clock

❌ Clients may:

  • Drift seconds → minutes → tens of minutes over time

📌 When internet is unstable or VM host syncs erratically:

➡️ Time between client and DC becomes misaligned
➡️ Kerberos fails
➡️ Login, GPO, and replication errors occur


✅ When PDC Emulator Is Configured Properly

You force the entire domain to use a single time source.

Think of it like this:

PDC Emulator = Company Standard Clock

  • 🟢 PDC Emulator

    • Syncs time from external NTP (Google, Cloudflare, etc.)

  • 🟡 Other DCs

    • Sync from PDC Emulator

  • 🔵 Clients

    • Sync from nearest DC

➡️ Even if the internet goes down, clients will NOT have time difference with DC
➡️ Everyone is “seeing the same clock”


3️⃣ Configuration – Microsoft Best Practice

🎯 Configuration Goals

  • All DCs & Clients: UTC+7 (Bangkok, Hanoi, Jakarta)

  • Only PDC Emulator syncs from Internet NTP

  • Other DCs & Clients sync automatically with AD

  • No Kerberos / GPO / login errors


1️⃣ Step 1 – Identify the PDC Emulator

On the Domain Controller, open PowerShell (Run as Administrator):

 
 
netdom query fsmo
 

👉 The server holding the PDC role → Proceed with configuration.

⚠️ Configure external NTP ONLY on this device.


2️⃣ Step 2 – Set the Correct Time Zone (All DCs + Clients)

Time zone only needs to be set once.

 
 
tzutil /s “SE Asia Standard Time”
 

Or via GUI:

Date & Time → Time zone
(Bangkok, Hanoi, Jakarta)

⚠️ Notes:

  • Timezone must be consistent across the domain

  • This affects display only, NOT synchronization


3️⃣ Step 3 – Configure NTP on PDC Emulator (MOST IMPORTANT)

🔹 Recommended NTP Servers

  • time.google.com

  • time.cloudflare.com

  • pool.ntp.org

🔹 Run on PDC Emulator:

 
 
w32tm /config /manualpeerlist:”time.google.com time.cloudflare.com” `
/syncfromflags:manual /reliable:yes /update
 

Restart Windows Time Service:

 
 
net stop w32time
net start w32time
 

4️⃣ Step 4 – Force Immediate Sync

 
 
w32tm /resync
 

Expected result:

 
 
The command completed successfully.
 

5️⃣ Step 5 – Verify PDC Status

 
 
w32tm /query /status
 

Check:

  • Source → must be time.google.com (or chosen NTP)

  • Stratum → usually 2–4

Check configuration:

 
 
w32tm /query /configuration
 

Must show:

 
 
Type: NTP
ReliableTimeSource: True
 

6️⃣ Step 6 – Secondary DC & Client Configuration

🚫 DO NOT configure external NTP on secondary DCs or clients.

Ensure:

  • Windows Time Service is running

  • No manual NTP configuration exists

When a machine joins the domain:

  • Windows switches to Domain Hierarchy mode (NT5DS)

  • Client requests time from nearest DC

Default sync cycle:

  • ~45 minutes

  • Earlier if large discrepancy detected

Quick check:

 
 
w32tm /query /status
 

Correct result:

 
 
Source: <DC or domain name>
 

If previously misconfigured, reset:

 
 
w32tm /config /syncfromflags:domhier /update
net stop w32time
net start w32time
 

✅ Conclusion

In an Active Directory environment, only the PDC Emulator in Windows Server is allowed to synchronize time with external NTP servers.

All other Domain Controllers and clients automatically follow the domain hierarchy.

Simply selecting a timezone is NOT enough.

Proper configuration ensures:

  • Stable Kerberos authentication

  • Correct GPO processing

  • Reliable replication

  • Consistent domain-wide time synchronization

If you are managing Windows Server 2025 in production, configuring the PDC Emulator correctly is not optional — it is foundational to domain stability.

See also related articles

P19 – Safely Demote Domain Controller: Critical FSMO Guide

P19 – Safely Demote Domain Controller: Critical FSMO Guide https://youtu.be/vLgyzgmxzPI WinServer 2025 – P19 Demote Domain Controller Holding All FSMO Roles Demoting Domain Controller holding all FSMO roles is a critical operation in any Active Directory infrastructure. If done incorrectly, it can break authentication, replication, and domain services across the...

Read More

P18 – Critical Fix Guide Delete ADC Died Server 2025

P18 – Critical Fix Guide Delete ADC Died Server 2025 https://youtu.be/82fvirmHZ2k WinServer2025 – P18 Critical Fix Remove Dead ADC from Active Directory (Server 2025) When an Additional Domain Controller (ADC) fails permanently, leaving it inside Active Directory can cause serious long-term issues. Replication errors, DNS conflicts, GC problems, and even...

Read More

P17 – Critical Guide Delete PDC Died in Server 2025

P17 – Critical Guide Delete PDC Died in Server 2025 https://youtu.be/ipF1EziL_C8 WinServer2025 – P17 How to Remove a Failed Domain Controller in Windows Server 2025 When a Primary Domain Controller (PDC) fails permanently and cannot be brought back online, simply shutting it down is not enough. The failed controller still...

Read More