Question: Task 3: Read-only Domain Controllers Case Study: Toyota Company had a remote office with about 15 users. They were separated from their main office by

Task 3: Read-only Domain Controllers Case Study: Toyota Company had a remote office with about 15 users. They were separated from their main office by railroad tracks, and the railroad company would not allow cables to be run beneath the tracks. Users connected using a 256 Kbps dial-up modem that created a VPN between the main office and the remote office. Not surprisingly, the users often complained that the logons were taking too long. Eventually, domain administrators created a domain controller and placed it in the remote office. Unfortunately, the remote office had very poor physical security. About a month after they placed the DC in the remote office, it disappeared. Users werent even sure exactly when it disappeared, though administrators were able to narrow down the time frame using logs. A lot of circumstantial evidence pointed to an employee who had access to the office after hours, but nothing was ever proven. Since the DC had a full copy of Active Directory, including all the administrative accounts and their passwords, the IT department was soon in panic mode. They spent a great deal of time changing passwords and renaming accounts. They even seriously considered deleting their one-domain forest and starting over. Management spent a lot of time evaluating the risk of not rebuilding the forest and weighing it against the business impact of deleting the forest and rebuilding it from scratch. Eventually they accepted the risk. It paid off. They never saw any evidence that anything was compromised from this theft. If the DC were an RODC instead, the company would have lost the cost of the server, but the added risks that caused so much administrative and managerial headaches could have been avoided. In this situation, An RODC holds all the Active Directory accounts and most of the attributes that can be found on a writable DC. A significant difference between an RODC and a writable DC is that an RODC holds very few passwords. More specifically, the RODC will typically only hold the passwords of no administrator users who log on in the remote office. Other passwords are specifically blocked from being stored on the RODC. Figure shows the process if an RODC is placed in a remote office. Imagine Sally is logging onto the RODC for the first time. Her system will contact the RODC. The RODC doesnt have her account cached, so it will query the DC at the headquarters location.

Task 3: Read-only Domain Controllers Case Study: Toyota Company had a remote

To configure the RODC, please perform the following tasks.

Prepare a forest and a domain for RODCs

Prepare the domain

Allow passwords on any RODC

Allow passwords on a single RODC

Perform RODC password replication policy

Allowed RODC Password Replication Group

Delegating Administration for an RODC

Modifying the Allowed List

Connectivity between RODC and Main server

RODC Headquarters Primary DC RODC Queries DC Remote Office DC Provides Authentication Computer Domain Controller Domain Controller 2022/1/26 10:38 RODC Headquarters Primary DC RODC Queries DC Remote Office DC Provides Authentication Computer Domain Controller Domain Controller 2022/1/26 10:38

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!