Solved

Active Directory Trust Question on 2008 R2 OS

Posted on 2016-10-28
3
19 Views
Last Modified: 2016-11-16
Hi Experts,
In AD trust properties, there is a box that can be checked off called "The other domain supports Kerberos AES Encryption"...what does this actually do and what is the expected behavior if this option is checked? Please advise.

Thank you!
0
Comment
Question by:IT_Admin XXXX
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Assisted Solution

by:sAMAccountName
sAMAccountName earned 250 total points (awarded by participants)
ID: 41864239
As I understand it by checking that option, you are adding AES as an accepted encryption cipher which can be used to secure the trust.  I'll let others expand if they have more information
0
 
LVL 13

Accepted Solution

by:
Dustin Saunders earned 250 total points (awarded by participants)
ID: 41864257
The technet page is here: https://technet.microsoft.com/en-us/library/dd145414.aspx

Essentially, just says whether or not the other domain can use the AES encryption, then uses it.  As long as you are on 2008 or newer and Win7 or newer on workstations you should have no issue.  

This blog post ( https://blogs.technet.microsoft.com/enterprisemobility/2007/11/02/server-2008-and-windows-vista-encryption-better-together/ ) has some more detailed information.
1
 
LVL 13

Expert Comment

by:Dustin Saunders
ID: 41889426
Both correct answers to the question, with links to supporting documentation.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article runs through the process of deploying a single EXE application selectively to a group of user.
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question