I am trying to migrate my domain and am encountering a problem with the ADMT PES account migration. When I try to migrate a user password it fails with the above listed message. I have the PES server on a different DC than the one I'm targetting for migration, and i have my ADMT server on a different server than the 1 DC in our target domain. Everything is virtualized with ESX 4.0.
When I skip the PES password migration to see if I can migrate without bringing over the password it gives me a different error on the "Account Transition Options" page saying "Could not verify auditing and TcpipClientSupport on domains. Will not be able to migrate SIDs. Access is denied."
I can ping FQDNs and host names via each server involved in this process. This is a Inter-Forest migration (between 2 seperate forests) and the trust is setup already and is working. I have a user called PES that is a Domain Admin in the source domain and a member of the built-in Administrators group in the target domain. I have an ADMT user that is in the Domain Admins of the target domain and is a member of the built-in Administrators group of the source domain. The trust is working. Auditing has been enabled and is showing up on the servers it should be when I run rsop.msc. The following registry keys have been updated to show the following: On PES: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\AllowPasswordExport = 1
On Target DC: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\RestrictAnonymous = 0
Any ideas as to why this might not still be working?
Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders.
Click on Start and then select Computer to view the available drives on the se…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …