The document provides requirements and steps for migrating an Active Directory domain including establishing a trust between domains, configuring password and network settings, installing migration software, and verifying prerequisites are met.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
631 views
Active Directory Domain Migration Checklist 3
The document provides requirements and steps for migrating an Active Directory domain including establishing a trust between domains, configuring password and network settings, installing migration software, and verifying prerequisites are met.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5
Active Directory Domain Migration Checklist
ADUM Active Directory Migrator
Before beginning an Active Directory migration, a number of mandatory requirements are needed to be in place in order to complete the migration successfully. These requirements are standards to meet both the requirements for Microsoft Windows migration and the ADUM Active Directory Migrator.
Throughout this document, the terms source domain and target domain mean the domain from which the objects are being migrated from and the destination domain being where the objects are being migrated to.
Requirements Prior to ADMigrator Installation
Windows Trust Requirements
Establish a two way trust relationship between the source domain and target domain Verify the trust relationship To verify, check that you are able to list accounts from each domain in each domain Add the source domains Domain Admins group to the target domains Administrators group Add the target domains Domain Admins group to the source domains Administrators group
Windows Password Migration Requirements
In the target domain check and verify that the domain Password Policy is equal to or less restrictive then the source domains password policy. In both the source domain and target domain, enable Account Management Audit for success and failure at both the domain level and the domain controller level. You must reboot the PDC emulator for the policy to take effect. Verify that Account Auditing is working in each domain. Create a test user and delete the users. Check that each event has been recorded in the security logs. In the source domain create a domain local group with the NetBIOS name of the domain followed by three dollar signs with no members. Example DOMANNAME$$$ In the target domain create a domain local group with the NetBIOS name of the domain followed by three dollar signs with no members. Example DOMANNAME$$$ In the source domain and the target domain verify or add the Everyone group as a member of the Pre-Windows 2000 Compatible Access group.
NetBIOS Naming Resolution Requirements
Install a WINS server on the target domain PDC Emulator (still required for Windows 2008 domains) In the TCP/IP Advanced Network Card Properties of the source and target domain controllers, add the IP Address of the target domain controller under the WINS server tab. Enable NetBIOS over IP for both the source and target domains PDC Emulator Verify that all domain controllers both source and target have Enable lmhost Lookup enabled
DNS Naming Resolution Requirements
In the TC/IP DNS advanced settings of both the source and target domain controllers, verify that the DNS server of both domains are entered with the first entry as the domain name that the domain controller belongs to. Append the domain suffix list to include the DNS name of both domains with the first entry as the domain name that the domain controller belongs to. Enter the domain name for the DNS suffix for this connection Check Register this connections addresses in DNS
Group Policy Requirements
Create a Domain Group Policy to disable Windows Firewall in both the source and target domain. (See appendix 1) Verify IP Filtering is disabled for both the source and target domain controllers in the Advanced TCP\IP Options Setting to Permit All For Windows 2008 domain controllers, disable User Account Control (UAC)
Logon to the migration computer in the target domain as a member of the target domains Domain Admins group and install ADMigrator.
Post ADMigrator Installation
Once ADMigrator is installed, updated to the latest build and the domain migration options have been set, verify that all the pre-migration internal checks have a green check mark beside each prerequisite.
Verify Clonepr.dll is located in the C:\Windows directory of the target domain Controller. If not, then copy drive:\ADUM\ADMigrator\Clonepr.dll to the C:\Windows directory of the target domain Controller. Register Clonepr.dll on the target domain controller. Run Regsvr32 C:\Windows\Clonepr.dll this is required for both sIDHistory and computer migration.
Know Installation Issues:
Windows 64 bit Domain Controller (PDC Emulator)
In order for the account password copy to process accounts involving Windows 2003, 2008 or 2008 R2 64bit domain controls acting as the PDC emulator in either the source or target domains, the following registry entries must be in place:
Check and verify the registry entries in HKEY_LOCAL_MACHINE System\CurrentControlSet\Lsa. The Entries should match the screen capture above.
Pay special attention to the Security Packages Reg_Multi_SZ list it must be exactly as shown. Remove any additional packages and reboot the server for the changes to take effect.
The ADUM Scheduling service is not running
This is a common issue at the first installation. To remedy, connect to the domain controller(s) that displays the error, start the services MMC and navigate to the ADUM Schedule service or FSTScheduler. Click on the logon option. Reenter the service account name and password and click Apply. If the service is running, stop and restart the service.
Unable to verify PDC Emulator of the source or target domain
This issue will arise when the target domain controller is unable to resolve NetBIOS Names. Launch the ADUM LMHCreator to create an lmhosts file. Add the IP Address and name of the source domain controller, add the IP address and the name of the target domain controller, add the IP Address of the source domain controller and the source domain name and add the IP Address of the target domain controller and the target domain name. Save the new lmhosts file. Register the lmhosts file to cache and verify the cache table that all 4 entries are in cache.
Administrator Account Password Containing Special Characters
A known LDAP issue exists if the first character of the Administrators password begins with a special character. This issue will prevent migrating computers from the source domain to the target domain because LDAP translation will drop the first character of the password, the password will become incorrect and the operation will fail. To remedy this issue change the password of the source or target domains Administrators password so that the password begins with an alpha-numeric character.
Anti-Virus Software False Trojan Quarantine Most Anti-virus software will trap the 32 bit version of copypwd.dll as a Trojan. Copypwd.dll is required to extract and set password hashes and is required to copy passwords. Disable or allow copypwd.dll to not to be quarantined on the ADUM console, Source and Target PDC Emulators. Console location - drive:\ADUM\ADMigrator and drive:\Windows\ PDC Emulator location - drive:\ADUM\ADMigrator\ADM\ and drive:\Windows\ Appendix 1 Group Policy to Disable Windows Firewall
Create a new Group Policy object, and give the object a descriptive name (for example, ITS- Turn off Windows Firewall).
Select the newly created group policy. Right-click on the newly created policy and select Edit. Expand the Computer Configuration folder, then the Administrative Templates folder. Expand the Network folder, then the Network Connections folder, then the Windows Firewall folder. Select the Standard Profile folder. Double-click the Windows Firewall: Protect all network connections option. Select Disabled, and then click OK. Select the Domain Profile folder. Double-click the Windows Firewall: Protect all network connections option. Select Disabled, and then click OK. Close the Group Policy dialog box. In the Security Filter section, click Add. Search for the objects that this group policy will be applied to, then click OK. Close the Group Policy editor.
Active Directory Domain Migration Checklist Copyright ADUMTech 2012 all rights reserved. Revision 1.4 June 12, 2012