RODC
RODC
RODC
Objectives
Explain briefly on a Read-Only Domain Controller State pre-Installation Tasks to Install an RODC Identify Password Replication Policies
Trainer: KParbhudoyal
Trainer: KParbhudoyal
Trainer: KParbhudoyal
Add the attribute to the RODC filtered attribute set to prevent it from replicating to RODCs in the forest.
Mark the attribute as confidential, which removes the ability to read the data for members of the Authenticated Users group (including any RODCs).
Trainer: KParbhudoyal
Unidirectional Replication
Because no changes are written directly to the RODC and therefore do not originate locally, writable domain controllers that are replication partners do not have to pull changes from the RODC. This means that any changes or corruption that a malicious user might make at branch locations cannot replicate from the RODC to the rest of the forest. This also reduces the workload of bridgehead servers in the hub site and the effort required to monitor replication.
RODC unidirectional replication applies to both AD DS and Distributed File System (DFS) Replication of SYSVOL. The RODC performs normal inbound replication for AD DS and SYSVOL changes.
Trainer: KParbhudoyal 8
Credential Caching
Credential caching is the storage of user account or computer account credentials. Account credentials consist of a small set of attributes that are associated with security principals. By default, an RODC does not store account credentials, except for its own computer account and a special krbtgt account for that RODC. You must explicitly allow any other credentials to be cached on that RODC, including the appropriate user, computer, and service accounts, to allow the RODC to satisfy authentication and service ticket requests locally.
Trainer: KParbhudoyal 9
Trainer: KParbhudoyal
10
However, the DNS server on an RODC does not support client updates directly. When a client attempts to update its DNS records against an RODC, the server returns a referral. The client then attempts the update against the DNS server that is provided in the referral. In the background, the DNS server on the RODC attempts to replicate the updated record from the DNS server that made the update. This replication request is only for a single object (the DNS record). The entire list of changed zone or domain data is not replicated during this special, replicate-single-object request.
Trainer: KParbhudoyal 11
A bridgehead server.
Bridgehead servers are servers that are designated to replicate changes from other sites. Because RODCs perform only inbound replication, they cannot act as a bridgehead server for a site.
Trainer: KParbhudoyal
12
Advantages of RODC
Great for Low Physical Security Locations with few users Local Administrator functionality still allows for onsite administration Can be installed on a server core for less overhead. Bitlocker Drive Encryption for extra protection
Trainer: KParbhudoyal
13
Trainer: KParbhudoyal
14
Trainer: KParbhudoyal
16
Trainer: KParbhudoyal
18
Trainer: KParbhudoyal
19
Trainer: KParbhudoyal
20
The following table summarizes the three possible administrative models for the Password Replication Policy.
Trainer: KParbhudoyal
22
No Accounts Cached
This model provides the most secure option. No passwords are replicated to the RODC, except for the RODC computer account and its special krbtgt account. However, transparent user and computer authentication relies on WAN availability. This model has the advantage of requiring little or no additional administrative configuration from the default settings. Customers might choose to add their own security-sensitive user groups to the default list of denied users. This can protect those user groups against accidental inclusion in the list of allowed users and subsequent caching of their passwords on the RODC.
Trainer: KParbhudoyal
23
Trainer: KParbhudoyal
25
Trainer: KParbhudoyal
26
Trainer: KParbhudoyal
27