Solved

checklist for RODC 2012 validation

Posted on 2015-02-12
1
79 Views
Last Modified: 2015-02-16
Hello,
How different is RODC from writable Domain Controller in terms of validating it is working as it is suppose to? WHat are the additional validation tasks that I need to add to my checklist for verifying that RODC 2012 was successfully installed and authenticating users in its remote site.  Thank you.
0
Comment
Question by:creative555
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 11

Accepted Solution

by:
loftyworm earned 500 total points
ID: 40606610
I don't think there are any really.  I would still use the command line, and run DCDIAG with maybe some additional switches.  Perhaps also look in the Sites and services and make sure it is being listed correctly.  Also your repadmin tools.

The best way I know to ground level check, is to login at a remote site computer, run the SET command and look for the LOGONSERVER=\\SUPERSECRETSERVERNAME.
Any problems, and check AD Sites and Services.
Also, the ground level check the RO part, use your ADUC MMC, and connect directly to the RODC.  It should let you view, but not change.
0

Featured Post

The Ultimate Checklist to Optimize Your Website

Websites are getting bigger and complicated by the day. Video, images, custom fonts are all great for showcasing your product/service. But the price to pay in terms of reduced page load times and ultimately, decreased sales, can lead to some difficult decisions about what to cut.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question