Improve company productivity with a Business Account.Sign Up

x
?
Solved

Read-only domain controllers

Posted on 2014-02-24
2
Medium Priority
?
179 Views
Last Modified: 2014-03-19
Hi guys,
i hope you are all well and can help.
We are going through the process of determining which of our AD sites should have a RODC or a RWDC.
I woukd love to know from your guys experience:

1) When would you use a RODC over a RWDC?

2) When would you use a RWDC instead ofa RODC?

Any help greatly appreciated.
0
Comment
Question by:Simon336697
2 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 1000 total points
ID: 39884435
I've been in a few shops with RODCs and generally we have used them in locations where the physical security wasn't great or we were not 100% confident in the security.  In those cases it was an site overseas.

Where I am we don't currently use them but to be fair I support a large military branch and if you got to our DCs physically then we have a lot of issues past a domain controller.

There are some other reasons listed here  http://technet.microsoft.com/en-us/library/cc732801(v=ws.10).aspx

Thanks

Mike
0
 
LVL 9

Assisted Solution

by:VirastaR
VirastaR earned 1000 total points
ID: 39885542
Hi,

When it comes to Understanding everything about RODC, i guess this article is quiet enough.

AD DS: Read-Only Domain Controllers

Let me highlight few points from the Article for ease.

What does an RODC do?

Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller.

Who will be interested in this feature?

RODC is designed primarily to be deployed in remote or branch office environments. Branch offices typically have the following characteristics:

    Relatively few users

    Poor physical security

    Relatively poor network bandwidth to a hub site

    Little knowledge of information technology (IT)

read more for complete details...

for all other scenarios go for RWDC.

Hope that helps :)
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
Sometimes it necessary to set special permissions on user objects.  For instance when using a Blackberry server, the SendAs permission needs to be set. I see many admins struggle with the setting that permission only to see it disappear within a few…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

584 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question