Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Replicate in one direction from Primary DC to secondary DC's

Posted on 2011-03-15
3
Medium Priority
?
507 Views
Last Modified: 2012-05-11
I have DC's at multiple locations around the state. I need them at all locations because if we loose connectivity to these locations then the end users would still have to be able to authenticate. In the past I've had problems with DC's dying and corrupting AD and DNS and it spreads all over the state and I have a huge problem to clean up. I was wondering if I could keep all my DC's and just make any needed changes on my primary DC at HQ and have it push the changes to the secondary DC's without pulling any info from them.
0
Comment
Question by:DOCDGA
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Expert Comment

by:Felix Leven
ID: 35142232
With server 2008 R2 you could deploy Read Only Domain Controllers to your "Branches". Changes can only be made on the HQ DC's.
0
 

Author Comment

by:DOCDGA
ID: 35142248
Would they all have to be Server 2008?
0
 
LVL 13

Accepted Solution

by:
Felix Leven earned 2000 total points
ID: 35142369
To deploy an RODC, at least one writable domain controller in the domain must be running Windows Server 2008. In addition, the functional level for the domain and forest must be Windows Server 2003 or higher.

Of cause only 2008 DC's cann be RODC's.

Full info:
http://technet.microsoft.com/en-us/library/cc732801(WS.10).aspx
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question