ENTERPRISE

Active Directory Domain Services 2008 : View Cached Credentials on a Read-Only Domain Controller

2/15/2011 9:01:31 AM
Problem: You need to determine which passwords an RODC has cached.

Solution: View the cached credentials on an RODC.

To determine which credentials an RODC has cached, perform the following steps:

1.
Log on to a domain controller or a member computer that has Windows Server 2008 RSAT installed.

2.
Click Start, click Administrative Tools, and then click Active Directory Users and Computers.

3.
Right-click Active Directory Users and Computers in the console tree, and click Change Domain Controller.

4.
On the Change Directory Server window, select a writable domain controller that has W2K8 in the DC Version column and click OK.

5.
In the console tree, expand the domain node and select the Domain Controllers node.

6.
In the details pane, right-click the RODC on which you want to view the cached credentials and click Properties.

7.
Click on the Password Replication Policy tab.

8.
On the RODC Properties page, click Advanced.

9.
On the Advanced Password Replication Policy page, select Accounts whose passwords are stored on this Read-only Domain Controller from the drop-down list, as shown in Figure 1.

Figure 1. View cached credentials on an RODC.


10.
View the accounts that have been cached by the RODC by reviewing the Users and computers section of the window.
Other  
  •  Active Directory Domain Services 2008 : Remove a User, Group, or Computer from the Password Replication Policy
  •  Active Directory Domain Services 2008 : Add a User, Group, or Computer to the Password Replication Policy
  •  Exchange Server 2010 : Backing Up Specific Windows Services
  •  Create Bookmark Create Note or Tag Backing Up Windows Server 2008 and Exchange Server 2010
  •  What to Back Up on Exchange Servers 2010
  •  Leveraging and Optimizing Search in SharePoint 2010 : Define Content Sources
  •  Deploying a Native SharePoint 2010 Search Service Application
  •  Backing Up the Exchange Server 2010 Environment : Roles and Responsibilities & Developing a Backup Strategy
  •  Backing Up the Exchange Server 2010 Environment : Supporting Backups with Documentation
  •  Backing Up the Exchange Server 2010 Environment : Understanding the Importance of Backups & Establishing Service Level Agreements
  •  Making the Best Use of SAN/NAS Disks with Exchange Server 2010
  •  Optimizing an Exchange Server 2010 Environment - Properly Sizing Exchange Server 2010
  •  Optimizing an Exchange Server 2010 Environment - Analyzing and Monitoring Core Elements
  •  SharePoint 2010 : Beyond Built-In SharePoint PowerShell Cmdlets
  •  SharePoint 2010 : Understanding Advanced PowerShell Topics
  •  Optimizing an Exchange Server 2010 Environment : Monitoring Exchange Server 2010
  •  Optimizing Exchange Server 2010 Servers
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 3) - Business Connectivity Services Web Parts
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 2) - Writing to External Content Types
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 1) - External Lists & External Data
  •  
    Top 10
    Plain Text: Not Exactly Plain Sailing (Part 2)
    Plain Text: Not Exactly Plain Sailing (Part 1)
    Adobe Photoshop Lightroom 4.0
    CodeKit Vs LiveReload
    CraftArtist2 Professional - Traditional Crafting On Your Computer
    Excel 2013 – The Smartest Spreadsheet Software
    How-To Computing: Upgrade Your Music With iTunes Match
    How To Upgrade To Windows 8 (Part 1)
    Let’s Go Shopping: Inside The Win 8 Store
    Update Your Android Tablet (Part 3)
    Most View
    SQL Azure : Building Two OData Consumer Applications (part 2) - Windows Mobile 7 Application
    Decide What Edition of Windows Server 2008 to Install
    Securing Internet Explorer
    70 Ways To Take Better Photos (Part 3) - Portraits, Adjust light intensity
    Finite Automata and Regular Expressions
    KWA 150 SE – The Most Expensive Amplifier Of ModWright
    Windows Server 2008: IPv6 Introduction (part 2) - IPv6 Transition Technologies & The ISATAP Tunneling Protocol
    Mobile Commerce Applications, Part 1
    Speed up Linux (Part 1)
    iPhone Application Development : Reading and Writing User Defaults (part 2) - Implementing System Settings
    iPhone Application Development : Building a Multi-View Tab Bar Application (part 1)
    Roku 2 XS
    Get More From Your Mobile Devices (Part 2)
    CrowdFunding - Does It Work? (Part 2)
    Defensive Database Programming with SQL Server : TRY...CATCH Gotchas (part 1) - Re-throwing errors
    Android Security : ContentProviders
    Asus K45VM – Affordable Good-Performance Laptop
    Windows 7 : Scheduling Maintenance Tasks
    Windows Server 2008 Server Core : Accessing the Windows Package Manager with the PkgMgr Utility, Adding and Removing Applications with the OCSetup Utility
    SharePoint 2010 : Operations Management with the SharePoint Central Administration Tool (part 3) - Administering Monitoring Tasks in SPCA