Yes ^ this. The other thing about the primary, secondary, tertiary DNS servers in Windows is that as long as the client DNS gets a proper response (i.e. a response on port 53), the client will never check the secondary or tertiary servers. This is a Windows thing. It’s kinda dumb, but that’s the way it is.

Check DHCP scope settings; or if they’re static addresses, look at the primary/secondary DNS servers at the client level (on the NIC properties). In typical domain environments, the domain controllers also serve as your DNS servers for AD. So, your client NIC properties should point to one (or both, etc.) of your domain controllers. Next, you need to make sure that whatever primary DNS server your clients are pointing to, that DNS server should have forwarders configured (i.e. “where to look when it can’t resolve DNS addresses internally” - this could be configured to point to Google at 8.8.8.8/8.8.4.4, OpenDNS, Comcast, or your local ISP).

Also, to help facilitate a healthy AD environment and internal DNS in general - - take a look at this. Assuming your DCs are also your DNS servers (let’s assume you have three):

Server 1 IP: 192.168.0.1

  • Primary DNS: 192.168.0.2
  • Secondary DNS: 192.168.0.3
  • Tertiary DNS: 127.0.0.1

Server 2 IP: 192.168.0.2

  • Primary DNS: 192.168.0.3
  • Secondary DNS: 192.168.0.1
  • Tertiary DNS: 127.0.0.1

Server 3 IP: 192.168.0.3

  • Primary DNS: 192.168.0.1
  • Secondary DNS: 192.168.0.2
  • Tertiary DNS: 127.0.0.1

Configure forwarders on each of them to ensure that you don’t have an interruption in external Internet access.

2 Spice ups