
Active Directory Administration Cookbook, Second Edition
By :

One of the benefits of deploying read-only domain controllers is their ability to recover quickly from an information security breach.
Since only the passwords for a subset of users are cached on the read-only domain controller when these users signed on through the read-only domain controller and the passwords for really sensitive accounts weren't allowed to be cached on the read-only domain controller, the impact of a stolen read-only domain controller is small, compared to a fully writable domain controller.
To render the read-only domain controller useless to an attacker or thief, perform these steps:
dsa.msc
. The Active Directory Users and Computers window appears.Figure 2.21 – Deleting a read-only domain controller in Active Directory Users and Computers
Figure 2.22 – The Deleting Domain Controller window
Each read-only domain controller caches the hashes of the passwords for users signing in through the read-only domain controller. For this functionality, the read-only domain controller contacts a writable domain controller.
When a user account is denied having its password cached, the password is not cached. For accounts on which the passwords have been cached, the best remedy is to reset these passwords.
Every Kerberos ticket that is given to devices or user accounts is encrypted using the separate krbtgt
account for the read-only domain controller. These tickets are bound to the read-only domain controller. When the read-only domain controller is removed from the Active Directory domain, these Kerberos tickets become useless.