Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Read-only domain controllers

Posted on 2014-02-24
2
Medium Priority
?
175 Views
Last Modified: 2014-03-19
Hi guys,
i hope you are all well and can help.
We are going through the process of determining which of our AD sites should have a RODC or a RWDC.
I woukd love to know from your guys experience:

1) When would you use a RODC over a RWDC?

2) When would you use a RWDC instead ofa RODC?

Any help greatly appreciated.
0
Comment
Question by:Simon336697
2 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 1000 total points
ID: 39884435
I've been in a few shops with RODCs and generally we have used them in locations where the physical security wasn't great or we were not 100% confident in the security.  In those cases it was an site overseas.

Where I am we don't currently use them but to be fair I support a large military branch and if you got to our DCs physically then we have a lot of issues past a domain controller.

There are some other reasons listed here  http://technet.microsoft.com/en-us/library/cc732801(v=ws.10).aspx

Thanks

Mike
0
 
LVL 9

Assisted Solution

by:VirastaR
VirastaR earned 1000 total points
ID: 39885542
Hi,

When it comes to Understanding everything about RODC, i guess this article is quiet enough.

AD DS: Read-Only Domain Controllers

Let me highlight few points from the Article for ease.

What does an RODC do?

Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller.

Who will be interested in this feature?

RODC is designed primarily to be deployed in remote or branch office environments. Branch offices typically have the following characteristics:

    Relatively few users

    Poor physical security

    Relatively poor network bandwidth to a hub site

    Little knowledge of information technology (IT)

read more for complete details...

for all other scenarios go for RWDC.

Hope that helps :)
0

Featured Post

Ask an Anonymous Question!

Don't feel intimidated by what you don't know. Ask your question anonymously. It's easy! Learn more and upgrade.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question