?
Solved

checklist for RODC 2012 validation

Posted on 2015-02-12
1
Medium Priority
?
84 Views
Last Modified: 2015-02-16
Hello,
How different is RODC from writable Domain Controller in terms of validating it is working as it is suppose to? WHat are the additional validation tasks that I need to add to my checklist for verifying that RODC 2012 was successfully installed and authenticating users in its remote site.  Thank you.
0
Comment
Question by:creative555
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 11

Accepted Solution

by:
loftyworm earned 2000 total points
ID: 40606610
I don't think there are any really.  I would still use the command line, and run DCDIAG with maybe some additional switches.  Perhaps also look in the Sites and services and make sure it is being listed correctly.  Also your repadmin tools.

The best way I know to ground level check, is to login at a remote site computer, run the SET command and look for the LOGONSERVER=\\SUPERSECRETSERVERNAME.
Any problems, and check AD Sites and Services.
Also, the ground level check the RO part, use your ADUC MMC, and connect directly to the RODC.  It should let you view, but not change.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Resolving an irritating Remote Desktop connection that stops your saved credentials from being used.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses
Course of the Month8 days, 20 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question