AD integrated zones in the real world

I am wondering how common these are. In my opinion, I would never design a network that didn't use these. There are just too many benefits.
But is that how the general population sees it too? Not every company uses AD, so what do they do? The secure dynamic updates alone is a killer. I'm not leaving a gaping hole in my network, nor am I going to manually enter everything.
But is that how the general population sees it too? Not every company uses AD, so what do they do? The secure dynamic updates alone is a killer. I'm not leaving a gaping hole in my network, nor am I going to manually enter everything.
Decide what to be and go be it.
Comments
I have, but for non-valid reasons including a Sys Admin who thought he knew best because that's how he had always done it and wouldn't consider change ( not a good trait for a person working in IT......)
For me, the multimaster update and security features of AD Integrated Zones make them a winner in my book.
Unless you have a very good reason not to of course.
So what do non AD networks do? For example, the college I go to now uses Novell Directory services. How do they keep their DNS servers secure?
they thought they highlighted the host to remove and, got it wrong... was unable to convince folks that having too many domain admin users was not good.
Most would go with BIND I would imagine, NON MS Shops would be unlikely to choose an MS solution for DNS. Afaik Bind supports secure updates but it has had some issues, but I am no Bind expert.
Yet so many companies still give domain admin rights to anyone working in IT, even if they have only just started.
There is only one Chief in my Domain and that is me, I delegate admin rights and use the admin groups for what they were designed for.
I twitch at the concept of exposing my DNS (and AD) infrastructure to the outside world, though.
What do you guys do for outside DNS requests so the world can find your web and email services?
I was imagining setting up a Bind server as a secondary on the outside via IPSec, but I wondered if there are easier ways.
JNCIA Firewall
CCNA:Security
CCNP
More security exams and then the world.
bind 9 on freebsd... totally sep zones for internal vs external.
You lose some other features, but it should certainly work.
Oh yeah, I forgot about that feature - Split-horizon DNS
Easy as pie.
I still shudder about those that open port 53 on their firewall to their Active Directory controllers.
JNCIA Firewall
CCNA:Security
CCNP
More security exams and then the world.