ENTERPRISE

Active Directory Domain Services 2008 : Remove a User, Group, or Computer from the Password Replication Policy

2/15/2011 9:00:01 AM
Problem: A group of employees relocated from your company’s New York office to your company’s head office. The RODC in the New York office previously cached the password for these employees. These employees no longer need to authenticate against the RODC.

Solution:  Remove the group from the Password Replication Policy on the RODC.

To remove a user, group, or computer from the password replication policy, perform the following steps:

1.
Log on to a domain controller or a member computer that has Windows Server 2008 RSAT installed.

2.
Click Start, click Administrative Tools, and then click Active Directory Users and Computers.

3.
Right-click Active Directory Users and Computers in the console tree, and click Change Domain Controller.

4.
On the Change Directory Server window, select a writable domain controller that has W2K8 in the DC Version column and click OK.

5.
In the console tree, expand the domain node and select the Domain Controllers node.

6.
In the details pane, right-click the RODC on which you want to configure the password replication policy; then click Properties.

7.
On the RODC Properties page, click the Password Replication Policy tab.

8.
Select the user, group, or computer you want to remove from the Password Replication Policy, and click Remove.

9.
Select Yes on the confirmation to remove the security principal from the Password Replication Policy, shown in Figure 1.

Figure 1. The confirmation to remove security principal from Password Replication Policy.

Other  
  •  Active Directory Domain Services 2008 : Add a User, Group, or Computer to the Password Replication Policy
  •  Exchange Server 2010 : Backing Up Specific Windows Services
  •  Create Bookmark Create Note or Tag Backing Up Windows Server 2008 and Exchange Server 2010
  •  What to Back Up on Exchange Servers 2010
  •  Leveraging and Optimizing Search in SharePoint 2010 : Define Content Sources
  •  Deploying a Native SharePoint 2010 Search Service Application
  •  Backing Up the Exchange Server 2010 Environment : Roles and Responsibilities & Developing a Backup Strategy
  •  Backing Up the Exchange Server 2010 Environment : Supporting Backups with Documentation
  •  Backing Up the Exchange Server 2010 Environment : Understanding the Importance of Backups & Establishing Service Level Agreements
  •  Making the Best Use of SAN/NAS Disks with Exchange Server 2010
  •  Optimizing an Exchange Server 2010 Environment - Properly Sizing Exchange Server 2010
  •  Optimizing an Exchange Server 2010 Environment - Analyzing and Monitoring Core Elements
  •  SharePoint 2010 : Beyond Built-In SharePoint PowerShell Cmdlets
  •  SharePoint 2010 : Understanding Advanced PowerShell Topics
  •  Optimizing an Exchange Server 2010 Environment : Monitoring Exchange Server 2010
  •  Optimizing Exchange Server 2010 Servers
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 3) - Business Connectivity Services Web Parts
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 2) - Writing to External Content Types
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 1) - External Lists & External Data
  •  Optimizing an Exchange Server 2010 Environment : Analyzing Capacity and Performance
  •  
    Top 10
    iPhone Developer : Integrating Core Data Tables with Live Data Edits, Implementing Undo-Redo Support with Core Data
    Understanding the Architecture of SharePoint 2010 : Deployment
    Understanding the Architecture of SharePoint 2010 : Capabilities
    DirectX 10 Game Programming : 3D Primer - 3D Space, Points
    DirectX 10 Game Programming : The 2D Resurgence - How to Animate on Time
    Windows 7 : Protecting Your Network from Hackers and Snoops - Configuring Windows Firewall
    Windows 7 : Protecting Your Network from Hackers and Snoops - Specific Configuration Steps for Windows 7
    Windows Vista : Programming the WshShell Object (part 2) - Working with Shortcuts, Working with Registry Entries, Working with Environment Variables
    Windows Vista : Programming the WshShell Object (part 1) - Displaying Information to the User
    Windows Vista : Programming the WScript Object
    Most View
    Upgrading to Windows Server 2003 : Planning a Windows NT Domain Upgrade (part 3) - Making a Recovery Plan
    BizTalk 2006 : Dealing with Compressed Files (part 1) - Sending Simple Zipped Files
    Windows 7 :Navigating Your Computer with the Address Bar (part 2) - Using Selected Paths to Quickly Navigate Your Computer
    Sharepoint 2010 : BCS Architecture - Presentation & Core Components
    SharePoint Administration with PowerShell (part 2)
    Compact Digital Cameras Under $300 (Part 5) - Samsung MV800
    IIS 7.0 : Using Basic Verbs: List, Add, Set, Delete
    Creative Sound Blaster Tactic3D Alpha Headphones Review
    Optimizing for Vertical Search : Optimizing for News, Blog, and Feed Search
    Find Stunning Wallpapers
    SQL Server 2008 : Using Temporary Tables in Stored Procedures
    Choosing The Right Camera For You (Part 1) - Nikon D3100, Sony NEX C3
    The Best Apps and Gear of 2012 (Part 10)
    100 Ways To Speed Up Windows (Part 4)
    Microsoft Dynamics AX 2009 : Building Lookups - Displaying a list of custom options
    Windows Server 2008 R2 Active Directory Domain Services Primer : Examining AD DS’s Structure
    JavaScript Patterns : Conventions
    Silverlight Recipes : Using Sockets to Communicate over TCP (part 4) - The Chat Server
    Targus Travel Chill Mat - Chillin' On-The-Go
    Migrating from Legacy SharePoint to SharePoint Server 2010 : Planning for an Upgrade to SharePoint 2010