Systems Admin

Step-by-Step Guide: Managing the DNS Server Role using Windows Admin Center

The DNS Manager MMC console (dnsmgmt.msc) has been the way to manage Windows DNS for two decades. It works fine, but it’s Windows-only, requires a domain-joined client to do anything useful, and forces an RDP-or-management-workstation workflow for anyone working remotely. Windows Admin Center’s DNS extension moves all of that into the browser. Install once into your WAC instance, connect to any DNS-enabled server, manage zones and records from a tablet, a Mac, a thin client — anywhere a modern browser runs.

This walkthrough installs the DNS extension, connects to a DNS server, walks through the day-to-day operations: view existing zones, create a new forward lookup zone with the right defaults (AD-integrated, secure-only updates), add a Host (A) record, edit it, and (optionally) create a reverse lookup zone. The extension is preview-grade like the AD extension — it covers the routine 80%, leaves the more obscure DNS operations (forwarding configuration, root hints, scavenging schedule, advanced delegation) to the classic tools.

What you need before starting

  • Windows Admin Center 2306 or newer (covered in installing Windows Admin Center on a domain-joined PC)
  • A reachable Windows Server with the DNS Server role installed and added to WAC as a managed server
  • The DNS PowerShell module on the target server (installed by default with the DNS role)
  • DnsAdmins or equivalent rights on the target DNS server

Step 1 — Install the DNS extension

  1. Open WAC in your browser (typically https://localhost:6516 for per-workstation installs, your gateway FQDN otherwise)
  2. Click the Settings gear in the top-right
  3. Under Gateway, click Extensions
  4. Switch to the Available Extensions tab
  5. Search for DNS
  6. Click the entry to see version, publisher, and description
  7. Click Install

WAC installs the extension and auto-refreshes the page when it’s done.

Windows Admin Center Settings page showing Available Extensions list with the DNS extension highlighted.
Available Extensions tab — search DNS, click the entry, click Install.
DNS extension details panel in Windows Admin Center with Install button visible.
Extension details before install — check the version and publisher first to confirm it’s the official Microsoft extension.

Step 2 — Verify the install

Switch from Available Extensions to Installed Extensions. Confirm DNS appears in the list. The Status column flags any updates available — install them when they appear.

Windows Admin Center Installed Extensions tab listing the DNS extension.
Confirm DNS shows as Installed — refresh and re-check if it’s missing.

Step 3 — Connect to the DNS server

The DNS tool only appears when you’re managing a server with the DNS role:

  1. From the WAC home page, click your DNS server (e.g. DC.smart.local)
  2. Wait for the connection to establish
  3. Scroll the Tools pane in the left nav, click DNS

If the DNS tool isn’t there, the most likely causes are: extension not installed (re-check Step 2), the target isn’t actually running the DNS role, or the DNS PowerShell module is missing on the target (install with Install-WindowsFeature -Name RSAT-DNS-Server).

WAC home page with the DNS server connection target selected.
Pick the DNS server from the WAC home — the DNS tool appears in the left pane after connection.
Windows Admin Center Tools pane scrolled to the DNS entry on a connected server.
The DNS tool option in the left Tools pane — only present on servers running the DNS role.

Step 4 — Survey existing zones

The DNS tool opens with the existing zones grouped:

  • Forward Lookup Zones — FQDN → IP resolution. The everyday stuff: www.company.com → 10.0.0.5.
  • Reverse Lookup Zones — IP → FQDN resolution. Used by tools that do reverse lookups (mail servers verifying senders, audit logs that want hostnames instead of just IPs).

Click any zone to see its records. From the records view you can edit, delete, or add new records.

Step 5 — Create a forward lookup zone

  1. Under Forward Lookup Zones, click + Create new DNS zone
  2. Pick the Zone Type:
    • Primary Zone — main writable zone; what you almost always want
    • Secondary Zone — read-only copy of a primary; used for redundancy when you can’t use AD-integrated zones (which are inherently multi-master)
    • Stub Zone — just the NS records pointing to a primary elsewhere; used as an alternative to conditional forwarders for some delegation scenarios
  3. Enter the Zone Name, e.g. kibria.me
  4. AD integration — if the DNS server is also a DC, you get the option to store the zone in AD. Always tick this on a DC. AD-integrated zones replicate via AD, get multi-master writes, and benefit from AD security. Non-integrated zones require manual zone-transfer configuration and only have one writable copy.
  5. Dynamic Update — pick Allow only secure updates. This is the right answer in any AD environment — only domain-joined computers with valid Kerberos tickets can register their names. The other options (allow all, none) leave you exposed to spoofed registrations or break AD’s automatic name registration.
  6. Click Create

Confirmation: “DNS zone created successfully.” The zone appears in the Forward Lookup Zones list.

Forward Lookup Zone creation dialog in the Windows Admin Center DNS extension.
New zone dialog — Primary + AD-integrated + secure-only updates is the right combination for almost every AD scenario.

Step 6 — Add a Host (A) record

The most common DNS record type. Maps a name to an IPv4 address (AAAA records do the same for IPv6).

  1. Click the new zone (e.g. kibria.me)
  2. Click + Create new DNS record
  3. Pick Record Type: Host (A)
  4. Fill in:
    • Record Name: the hostname (e.g. www)
    • IP Address: the target IP (e.g. 10.10.10.123)
  5. The FQDN auto-populates as www.kibria.me
  6. Click Create
Create new DNS record dialog with Host (A) record fields populated.
Host (A) record creation — record name, IP address, FQDN auto-populated.

Step 7 — Edit a record

Click the record > Edit. You can change the IP address, TTL (default is 1 hour for AD-integrated zones; lower it temporarily to e.g. 60 seconds before a planned IP change so the change propagates faster), or the name itself. Save commits.

Edit DNS record dialog showing IP, TTL, and Name fields.
Edit dialog covers IP, TTL, and name — the fields you actually change in day-to-day DNS work.

Step 8 — Reverse lookup zones (optional but recommended)

Reverse zones let DNS resolve IPs back to names. Email servers verify sender legitimacy via reverse DNS; audit logs become much more useful with hostnames instead of just IPs; some monitoring tools require reverse DNS to identify hosts. The setup pattern is the same as forward zones — type, AD integration, dynamic updates — but you specify a network range instead of a domain name.

  1. Click Reverse Lookup Zones in the left menu
  2. + Create new DNS zone
  3. Same Zone Type, AD integration, and dynamic update options as forward zones
  4. Define the network range (e.g. 192.168.1.x)
  5. Click Create

You can now add PTR records that map IPs back to FQDNs. For deeper coverage of reverse zones and PTR records specifically see DNS reverse lookup zones and PTR records.

Step 9 — Verify with ping

Quickest sanity check: open PowerShell, ping the new record:

ping www.kibria.me

The first line of output should show the IP your record resolves to. The subsequent lines show whether the target is actually reachable — success there means the record is in place AND the target is up; failure with the right IP shown means the record is in place but the target itself is unreachable (a network or host problem, not a DNS problem). For more thorough DNS verification use nslookup or Resolve-DnsName in PowerShell.

Things that bite people in production

Always pick AD-integrated when available

The default file-based zone storage works, but AD-integrated zones get multi-master replication for free, simpler delegation through AD security, and resilience against single-DNS-server failure. The only reasons to skip AD integration: the DNS server isn’t a DC, or you’re building a DMZ DNS server that intentionally shouldn’t replicate to AD.

Secure-only dynamic updates is non-negotiable in AD

The other options — “Allow all updates” or “None” — either let any random network device register a name (spoofing risk) or break AD’s automatic A-record registration for domain-joined computers (operational nightmare). Secure-only is the right answer for AD-integrated zones.

The extension is preview — know what it can’t do

The DNS extension covers zone and record CRUD well. What it doesn’t expose: forwarding configuration (regular and conditional), root hints management, scavenging schedule tuning, zone delegation editing, DNSSEC operations, server-level options (debug logging, recursion settings). For those you still need the DNS Manager MMC or PowerShell DNS cmdlets. The extension complements the classic tools; it doesn’t fully replace them.

Mind your TTL when planning IP changes

The default TTL for AD-integrated zones is 3600 seconds (1 hour). Clients cache resolved names for that long — so an IP change takes up to an hour to propagate to existing clients even after you update the record. For planned IP changes, lower the TTL to 60–300 seconds at least 24 hours before the change so cached records expire quickly during the cutover, then bump it back up afterward.

Reverse zones often get forgotten

Forward zones are obvious — everyone knows they need DNS to reach the file server. Reverse zones tend to be missing or stale, and you only notice when an email server starts rejecting your outgoing mail because your domain has no reverse DNS. Set them up with the forward zones, keep them updated, and verify with nslookup <ip> from time to time.

Audit who has DnsAdmins

The DnsAdmins group is the local admin group on each DNS server — members can configure DNS broadly. In AD environments, DnsAdmins is also part of the “protected groups” family that AdminSDHolder governs. Audit membership periodically; service accounts and helpdesk staff who don’t actually need DnsAdmins shouldn’t have it.

Where this fits

The DNS extension is one of several WAC management surfaces. Companion pieces: installing Windows Admin Center, managing Active Directory through WAC, and enabling Remote Desktop using WAC. For DNS-specific deeper work see configuring DNS forwarding (regular and conditional), DNS reverse lookup zones and PTR records, DNSSEC implementation, and the broader DNS, DHCP & Networking pathway. For DHCP-IPAM-DNS aggregation across many servers, IPAM centralizes the management view.

Leave a Reply