Difference between revisions of "New domain migration (2008 R2 to 2016 DC)"

From Michael's Information Zone
Jump to navigation Jump to search
Line 27: Line 27:
 
The following example reads from the old domain, from a system that is already enrolled, then writes to the new domain. The old groups are Global and here I am creating Domain Local<ref>https://technet.microsoft.com/de-de/library/hh852283(v=wps.630).aspx</reF>
 
The following example reads from the old domain, from a system that is already enrolled, then writes to the new domain. The old groups are Global and here I am creating Domain Local<ref>https://technet.microsoft.com/de-de/library/hh852283(v=wps.630).aspx</reF>
 
<pre>
 
<pre>
get-adgroup test-group | new-ADGroup -Server 10.99.1.5 -Path "OU=SecurityGroups,DC=youdomain,DC=tld" -GroupScope 0 -Credential $PSCredential
+
get-adgroup test-group | new-ADGroup -Server xxx.xxx.xxx.xxx -Path "OU=SecurityGroups,DC=youdomain,DC=tld" -GroupScope 0 -Credential $PSCredential
 
</pre>
 
</pre>
 
<br>
 
<br>
 
<br>
 
<br>
 
<br>
 
<br>

Revision as of 17:52, 30 July 2018

Purpose

To switch from old domain "very.long.name.net" to "new.net". The old servers are in a colo, the new ones are in Azure as VMs (Windows 7 support was still needed, so Azure AD was not usable.)

Process

Tunnels

The nice Windows minions created the Azure VMs for me and setup the ipsec endpoint, on my end I used PFSense to handle the ipsec tunnel between the colo and Azure. Very straight forward and similar to AWS. One thing I will say that Azure did right over AWS, was to implement IKEv2 and use SHA256. AWS is lagging behind on this, but since we are tunneling encrypted traffic anyway it makes no difference.

Just need to have them turn on IPv6 so I can bypass the tunnels altogether.

Trust

Creating the trust was simple enough.[1]

  • Create DNS conditional forwarder in the old domain controller to the new domain.
    • I did get an error that the IPs I used were not authoritative to the new domain. Does not seem to be an issue for what I am trying to do so moving on from here.
  • Create DNS entries in the new servers (My Windows minions did this already. Good for them, except they disabled the firewall!)
  • Open up domains and trust on the new server, create the two way connection, enter admin credentials for the old domain.

Group Permissions

The fun here is that I am not a Windows weenie, which makes the process fun to work through how Microsoft wants you to use their group structure. Thankfully I found a VERY useful article[2] on how to best deploy the groups to allow cross permissions to resources during the migration process.

  • In this case I will follow the AGDLP structure to ensure future compatibility. The last domain admins used random groups, and I followed their bad example and the existing group structure is useless.

Group Policy Process

In this case I want to use loopback processing to ensure that users get different policies based on the computer they connect to.

For example; I want to apply an encryption policy if someone logs into a laptop, then a web browser policy for logging into a terminal server, a policy for logging into VDI environment, then a policy for logging into other servers. [3] For initial testing I want to use replace processing, or at least I think I do.

Replicate Distribution Lists

In this case I wanted to create a new DL structure. Something that would need fewer manual additions. So nothing of importance to note here.

Replicate Security Groups

The following example reads from the old domain, from a system that is already enrolled, then writes to the new domain. The old groups are Global and here I am creating Domain Local[4]

get-adgroup test-group | new-ADGroup -Server xxx.xxx.xxx.xxx -Path "OU=SecurityGroups,DC=youdomain,DC=tld" -GroupScope 0 -Credential $PSCredential