Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

VMware Snapshot Rollback Loses Domain Identity

Posted on 2011-09-23
7
Medium Priority
?
484 Views
Last Modified: 2012-06-27
I have a server running VMware ESXi 4.1.0 (free version).  On this server, I have 25 Virtual PCs created with various Operating Systems.  (Windows XP SP3, Vista SP2 32 & 64-Bit, and Windows 7 SP1 32 & 64-Bit).  These PCs are used for loading and testing software that our developers write.  The testers will take an initial Baseline snapshot of the PCs, load the software perform their testing, and then roll the snapshot back once they are ready to try another product out.  This way they have a clean slate for testing.

The problem I am experiencing is that when they roll the software back, the Virtual PCs somehow lose their Active Directory Domain identity.  You can no longer log them in with the AD usernames & passwords.  To solve the problem, I have to log in as a local admin, add the PC back to the WORKGROUP, reboot, then re-add it to AD.  Should the Snapshot not be retaining this information so I don't have to do this?
0
Comment
Question by:neptuneit
  • 5
  • 2
7 Comments
 
LVL 124
ID: 36587545
This is normal for an old snapshot.

The issues is not with the snapshot, it's with Active Directory.

0
 
LVL 124

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 2000 total points
ID: 36587816
The issue is similar to a VMware View Desktop issues

The machine password is stored in the Virtual Machine, It changes in Windows performs every 30 days as per policy setting and stores the machine account password retrieved from Active Directory in this virtual disk.

So you have a VM running, the machine password changes, and then you ROLLBACK the VM, which has a different machine password, and Hey Presto the passwords do not match, so the trust is broken.

See here

http://www.experts-exchange.com/Software/VMWare/Q_27116503.html
http://www.experts-exchange.com/Software/VMWare/Q_27320237.html
0
 
LVL 124
ID: 36587831
It may be better to remove these workstations from the Domain, and add to Domain when using them.

or Check the other Articles for GPO Policies, which could be applied to a Container.
0
Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

 
LVL 1

Author Comment

by:neptuneit
ID: 36587889
The passwords on the accounts used to log into these machines are set to never change.  So would that still apply?
0
 
LVL 124
ID: 36587969
I'm sorry I'm not discussing User Accounts.

When you Add a Workstation to a Domain, at the time it's joined, a Machine Account Password is Exchanged with the Machine. This expires every x days, set by AD!

No MACHINE ACCOUNT PASSWORD (internal on machine!).

Not user Accounts.
0
 
LVL 1

Author Comment

by:neptuneit
ID: 36587979
Okay.  I misunderstood.  That makes perfect sense.  Thanks for the feedback.
0
 
LVL 124
ID: 36588000
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question