?
Solved

Windows AD Users

Posted on 2014-10-01
3
Medium Priority
?
249 Views
Last Modified: 2014-10-02
There was a domain called ABC.com (local domain), there were several users joined to this domain's AD. so they login to there windows machines using domain credentials.

Now those users were transferred together with there PCs, but without their Domain controller. So, they don't connect to AD server anymore to authenticate their login, but still use domain credentials to login.

Scenario is; this new PCs once connected to the ABC.com domain are needed to be connected to a new domain called XYZ.com (local domain). this new domain doesn't have any connection with ABC.com. I already added all the users details in to new AD (XYZ.com), but PCs are not yet joined.

I want to join these ABC.com previous domain PCs to XYZ.com domain simplest way and still want to retain the user data.

Example: John once worked for ABC.company so his login was;
                 user name: JohnD   -----------}        User Name: JohnDR (user loginname varies in the new AD, but same user)
                 Password  : S3cr3t  -----------} TO  Password   : n3ws3cr3t
                 Domain     : ABC.com --------}        Domain      : XYZ.com

so, when John comes tomorrow morning and logs into XYZ.com and should see no difference. he should not see any difference at all, except he is log into XYZ.com domain. he should have his familiar desktop, all the apps, and docs.

How can I achieve this task?

One more thing;
I have setup a web proxy (cache). it's 192.168.1.1:8080. I need to enforce proxy settings in internet browsers (IE, firefox, chrome, safari) from the windows 2012 server GPO.

How Can I do this?
0
Comment
Question by:Roshan Liyanabadu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 22

Accepted Solution

by:
Larry Struckmeyer MVP earned 2000 total points
ID: 40356038
Safest way is to either safeguard the users data by backup of copying out of the existing profile, then be certain you have the local admin user name and password or some way to reset it, then disjoin from the old domain, join the new domain, then copy the user data back into the new profile.

There are various third party migration assistance utilities available.  One of the most frequently referenced is from Forensit, and for a limited number the utility is free.

http://www.forensit.com/
0
 
LVL 14

Expert Comment

by:Natty Greg
ID: 40356327
What Larry said, however if you had users with roaming profile you could transferred all there profiles in one go to the new server, so when they joined and log in there profiles would already be there
0
 

Author Closing Comment

by:Roshan Liyanabadu
ID: 40356502
Your are correct, I had used this software before, but didn't think it would work in this scenario. but it worked.
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month12 days, 6 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question