How to Configure Credential Caching on Read-Only Domain Controller Windows Server 2016

By default when users attempt to login to a computer at a branch site, a read-only domain controller contacts the writeable DC for their authentication as it doesn't store user passwords. This happens every time when users log in. However,  a read-only domain controller can be configured to cache user passwords using Password Replication Policy (PRP). With PRP, ... Read more

How to Prepopulate Passwords Cache on Read-Only Domain Controller Windows Server 2016

When a Password Replication Policy is enabled and a user or computer account is in the allowed RODC password replication group, a password is replicated and cached on Read-Only Domain Controller when a branch user login for the first time. The RODC authenticates the branch users and computers for subsequent logins without forwarding requests to the main ... Read more

How to Remove Active Directory Domain Services Using Server Manager

In one of earlier articles, we removed active directory domain services using PowerShell. In this guide, I'll focus on removing active directory domain services using server manager. Remove Active Directory Domain Services Using Server Manager Step 1. Open server manager dashboard. Click: Manage -> Remove roles and features. Step 2. Verify the tasks and then click Next. ... Read more

How to Migrate AD Users in a Forest Using ADMT v3.2

When you have multiple domains in a forest, migrating Active Directory objects between two domains is a day to day task of system engineers. Reasons can be that companies are sold or merged or employees are transferred. Type of AD Migration There are two types of AD migrations: Inter forest migration - In inter forest migration, AD objects ... Read more

How to Deploy a Read-Only Domain Controller in Windows Server 2016

An RODC holds a read-only copy of the Active Directory database and doesn't allow any changes in AD data. It is mostly deployed in branch offices due to poor physical security. If some one gets access to the RODC, he won't be able to change the global data. If an intruder somehow manages to change the data on ... Read more