Information Technology Reference
In-Depth Information
FIGURE 5-15 The Virtual Machine Connection to a domain controller being cloned
When the cloning is complete, both the original source domain controller and the new
cloned domain controller are in the Cloneable Domain Controllers security group. They
should be removed from this group except during active cloning operations.
 
Search WWH ::




Custom Search