{"id":34,"date":"2014-04-29T18:00:52","date_gmt":"2014-04-29T23:00:52","guid":{"rendered":"http:\/\/blog.metcorp.org\/?p=34"},"modified":"2014-04-29T20:27:41","modified_gmt":"2014-04-30T01:27:41","slug":"ad-reading-active-directory-read-only-domain-controller","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=34","title":{"rendered":"AD Reading: Active Directory Read Only Domain Controller"},"content":{"rendered":"<p>The following are extremely useful resources for the Active Directory Read Only Domain Controller (RODC).<\/p>\n<p><strong>Read Only Domain Controller<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc771744%28v=ws.10%29.aspx\">Read-Only Domain Controller Planning and Deployment Guide<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754719%28v=ws.10%29.aspx\">Understanding Planning and Deployment for Read-Only Domain Controllers<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dd734758%28v=ws.10%29.aspx\">RODC Branch Office Guide<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754218%28v=ws.10%29.aspx\">Appendix A: RODC Technical Reference Topics<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc742416%28v=ws.10%29.aspx\">Appendix B: RODC-Related Events<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc742415%28v=ws.10%29.aspx\">Appendix C: Acronyms Used in This Guide<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755310%28v=ws.10%29.aspx\">RODC Administration<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc731420%28v=ws.10%29.aspx\">Installing Remote Server Administration Tools<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/rodc-guidance-for-administering-the-password-replication-policy%28v=ws.10%29.aspx\">Administering the Password Replication Policy<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772234.aspx\">Read-only Domain Controllers Step-by-Step Guide<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc771936.aspx\">Who Should Use This Guide?<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc755058.aspx\">What Is an RODC?<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc770370.aspx\">RODC Placement Considerations for Windows Server 2003 Domains<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc731243.aspx\">Prerequisites for Deploying an RODC<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc753207.aspx\">Known Issues for Deploying an RODC<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754629.aspx\">Steps for Deploying an RODC<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772478.aspx\">Steps for Administering an RODC<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754956.aspx\">RODC Frequently Asked Questions<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc770616.aspx\">Appendix A: Client Operations<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc771144.aspx\">Appendix B: How the Authentication Process Works with RODCs<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754165.aspx\">Appendix C: Application Compatibility with RODCs<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772331.aspx\">Appendix D: Steps to Add an Attribute to the RODC Filtered Attribute Set<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754956%28v=ws.10%29.aspx\">RODC Frequently Asked Questions <\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754794%28v=ws.10%29.aspx\">Adding Attributes to the RODC Filtered Attribute Set<\/a><\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/944043\/en-us\">Description of the Windows Server 2008 read-only domain controller compatibility pack for Windows<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754794%28v=ws.10%29.aspx\">Adding Attributes to the RODC Filtered Attribute Set<\/a><\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/922836\">Using the confidentiality bit in 203 SP1<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754218%28WS.10%29.aspx#BKMK_DDNS\">RODC DNS Client Update Mechanism<\/a><\/li>\n<li><a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/cc200527.aspx\">The RODC requests the update<\/a><a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/cc200527.aspx\">using a<\/a><a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/cc200527.aspx\">special operation called<\/a>replicateSIngleObject:<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=2c3c0615-baf4-4a9c-b613-3fda14e84545&amp;DisplayLang=en\">BitLocker implementation for RODC.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The following are extremely useful resources for the Active Directory Read Only Domain Controller (RODC). Read Only Domain Controller Read-Only Domain Controller Planning and Deployment Guide o\u00a0\u00a0 Understanding Planning and Deployment for Read-Only Domain Controllers o\u00a0\u00a0 RODC Branch Office Guide o\u00a0\u00a0 Appendix A: RODC Technical Reference Topics o\u00a0\u00a0 Appendix B: RODC-Related Events o\u00a0\u00a0 Appendix C: &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=34\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5,6],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-technical-reading","tag-adreading","tag-mcm","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=34"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":35,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/34\/revisions\/35"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}