This article describes the naming conventions for computer accounts in Windows, NetBIOS domain names, DNS domain names, Active Directory sites, and organizational units (OUs) that are defined in Active Directory Domain Services (AD DS).
Original KB number: 909264
This article discusses the following topics:
All objects that are named within AD DS, Active Directory Application Mode (ADAM), or Active Directory Lightweight Directory Services (AD LDS) are subject to a name matching process that's based on the algorithm that's described in the following article:
In that article, this naming convention applies to computer names, OU names, and site names.
Note Microsoft Windows NT allows non-DNS names to have period. Periods shouldn't be used in Windows. If you're upgrading a computer whose NetBIOS name contains a period, change the computer name. For more information, see Special characters later in this section.
For more information about the NetBIOS name syntax, see NetBIOS name syntax.
Note The 16th character of a NetBIOS computer name is reserved for identifying the functionality that is installed on the registered network device.
The following sections describe NetBIOS domain names and DNS domain names.
Note Microsoft Windows NT allows non-DNS names to have period. Periods shouldn't be used in Active Directory NetBIOS domain names. If you're upgrading a computer whose NetBIOS name contains a period, change the name by migrating the domain to a new domain structure. Don't use periods in new NetBIOS domain names. The ampersand (&) character in NetBIOS domain names was allowed previously and is supported for historical purposes only. Don't create new Active Directory domains whose NetBIOS domain names contain ampersand (&) characters.
Note Computers that are members of an Active Directory domain can't have names that contain only numeral. This is a DNS restriction.
Note The 16th character of the name is reserved for identifying the functionality that is installed on the registered network device.
Important The use of NetBIOS scopes in names is a legacy configuration. It shouldn't be used in Active Directory forests. This is not an inherent problem. However, some applications might filter the name and assume a DNS name if a period is found.
Note The underscore has a special role. It's permitted for the first character in SRV records by RFC definition. But newer DNS servers might also allow it anywhere in a name. When you create a domain, you receive a warning message that states that an underscore character might cause problems for some DNS servers. However, you can still create the domain. For more information, see Complying with Name Restrictions for Hosts and Domains.
Note If you use UTF-8 (Unicode) characters, remember that some UTF-8 characters exceed one octet in length. In that case, you can't determine the size of a name by counting the characters. The maximum size of the host name and of the FQDN is 63 bytes per label and 255 bytes per FQDN.
\\\sysvol\\policies\>\[user|machine]\
A disjointed namespace occurs if a computer's primary DNS suffix doesn't match the DNS domain of which it's a member. For example, a disjointed namespace occurs if a computer that has the DNS name of dc1.contosocorp.com is in a domain that has the DNS name of contoso.com .
How disjointed namespaces occur:
Effects of a disjointed namespace:
Suppose a domain controller that's named DC1 resides in a Windows NT 4.0 domain whose NetBIOS domain name is contoso . This domain controller is upgraded to Windows 2000 Server. When this upgrade occurs, the DNS domain is renamed contoso.com . In the original release version of Windows 2000 Server, the upgrade routine clears the checkbox that links the primary DNS suffix of the domain controller to its DNS domain name. Therefore, the primary DNS suffix of the domain controller is the Windows NT 4.0 DNS suffix that was defined in the Windows NT 4.0 suffix search list. In this example, the DNS name is DC1.northamerica.contoso.com .
The domain controller dynamically registers its service location (SRV) records in the DNS zone that corresponds to its DNS domain name. However, the domain controller registers its host records in the DNS zone that corresponds to its primary DNS suffix.
For more information about disjointed namespaces, see the following articles:
We recommend that you use a valid DNS name when you create a new site name. Otherwise, your site will be available only where a Microsoft DNS server is used. For more information about valid DNS names, see the DNS host names section.
Note The underscore has a special role. It's permitted for the first character in SRV records by RFC definition. But newer DNS servers might also allow it anywhere in a name. For more information, see Complying with Name Restrictions for Hosts and Domains.
Note If you use UTF-8 (Unicode) characters, remember that some UTF-8 characters exceed one octet in length. In that case, you can't determine the size of a name by counting the characters. The maximum length of the DNS name is 63 bytes per label.
When the OU at the domain root level has the same name as a future child domain, you might experience database problems. Consider a scenario in which you delete an OU named marketing to create a child domain that has the same name. For example, marketing.contoso.com (leftmost label of the child domain FQDN name has the same name).
You delete the OU. During the tombstone lifetime of the deleted OU, you create a child domain that has the same name. Then, you delete the child domain, and then create it a second time. In this scenario, a duplicate record name in the ESE database causes a phantom-phantom name collision when the child domain is re-created. This problem prevents the Active Directory Configuration container from replicating.
This problem is not restricted to DC and OU name types. A similar name conflict might also occur for other RDN name types under certain conditions.
Reserved words for names | Windows NT 4.0 | Windows 2000 | Windows Server 2003 | Windows Server 2008 and later |
---|---|---|---|---|
ANONYMOUS | X | X | X | X |
AUTHENTICATED USER | X | X | X | |
BATCH | X | X | X | X |
BUILTIN | X | X | X | X |
CREATOR GROUP | X | X | X | X |
CREATOR GROUP SERVER | X | X | X | X |
CREATOR OWNER | X | X | X | X |
CREATOR OWNER SERVER | X | X | X | X |
DIALUP | X | X | X | X |
DIGEST AUTH | X | X | ||
DOMAIN | X | |||
ENTERPRISE | X | |||
INTERACTIVE | X | X | X | X |
INTERNET | X | X | X | |
LOCAL | X | X | X | X |
LOCAL SYSTEM | X | X | ||
NETWORK | X | X | X | X |
NETWORK SERVICE | X | X | ||
NT AUTHORITY | X | X | X | X |
NT DOMAIN | X | X | X | X |
NTLM AUTH | X | X | ||
NULL | X | X | X | X |
PROXY | X | X | X | |
REMOTE INTERACTIVE | X | X | ||
RESTRICTED | X | X | X | |
SCHANNEL AUTH | X | X | ||
SELF | X | X | X | |
SERVER | X | X | X | |
SERVICE | X | X | X | X |
SYSTEM | X | X | X | X |
TERMINAL SERVER | X | X | X | |
THIS ORGANIZATION | X | X | ||
USERS | X | X | ||
WORLD | X | X | X | X |