{"id":625,"date":"2019-06-18T00:18:55","date_gmt":"2019-06-18T05:18:55","guid":{"rendered":"http:\/\/zewwy.ca\/?p=625"},"modified":"2019-10-03T10:49:07","modified_gmt":"2019-10-03T15:49:07","slug":"migrating-users-and-passwordssame-netbios-name","status":"publish","type":"post","link":"https:\/\/zewwy.ca\/index.php\/2019\/06\/18\/migrating-users-and-passwordssame-netbios-name\/","title":{"rendered":"Migrating Users and Passwords<br>Same NetBIOS Name"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Story\"><\/span>Story<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>*NOTE* All information here is provided as is for educational purposes only, whatever you do in your own environment is on you.<\/p>\n<p>I want to give a bit of a background here, the goal was to migrate users to a new child domain, that was previously a 2 way forest wide trust. In this case scenario, there was no need for a 2 way trust as both domains were owned and operated by the same corporation. A simplified AD structure was conceived, new workflow servers, new clean permissions throughout.<\/p>\n<p>Everything was coming along swimming until, after some extensive research, how to migrate users and their passwords without service interruptions&#8230;<\/p>\n<p>With Windows Authentication in the back end there was only one choice, <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=56570\">ADMT v3.2<\/a> and it&#8217;s <a href=\"https:\/\/www.microsoft.com\/en-ca\/download\/confirmation.aspx?id=19188\">associated documentation<\/a> &#8230; yeah that&#8217;s not a content based website, it&#8217;s a download to a doc, that was last updated 2014 with support with Windows Server 2012 R2.<\/p>\n<p>It states the following:<\/p>\n<p>Any DB works (I used SQL 2016 Express)<br \/>\nOther things, read it if you wish to be over\/under whelmed<br \/>\nNeeds a Trust<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Simple_Overview\"><\/span>Simple Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/i.imgur.com\/pTkZuu9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/pTkZuu9.png\" alt=\"\" width=\"672\" height=\"703\" \/><\/a><\/p>\n<p>Here&#8217;s a simple of an idea of how the Forests are laid out, and you can see where the users are planned to be migrated&#8230; <a href=\"https:\/\/social.technet.microsoft.com\/Forums\/en-US\/921ebb6b-8758-4414-bc2c-6e13b4d0e727\/adding-another-trust-but-thinks-it-already-exists?forum=winserverDS\">just one major problem<\/a>&#8230; You can&#8217;t create a trust between forests where the NetBIOS match. And Yes, that is a thread from 2011 unanswered, which I will answer for you tonight. Which you can see from my design, is exactly the problem I was facing. I was initially <a href=\"https:\/\/social.technet.microsoft.com\/Forums\/en-US\/2f065511-4b94-4fd0-8106-2a25d7b9a521\/migrate-ad-users-and-their-passwords-between-separate-domain-with-no-trust?forum=winserverDS\">hoping this could be done without a trust<\/a> which turned out was the answer which lead me to the answer..<\/p>\n<p>&#8221;<\/p>\n<p>You can do this via trust but not how you might normally think about it.<\/p>\n<p>Build out a new dc in your source domain and allow it to replicate properly, be sure that it is a dc\/gc and dns server. Disconnect this dc from the current domain and expect to NEVER connect to this domain again.<\/p>\n<p>Do a metadata cleanup of this dc&#8230;.<\/p>\n<p>&#8221;<\/p>\n<p>Along with <a href=\"https:\/\/social.technet.microsoft.com\/Forums\/windowsserver\/en-US\/c17db509-25e3-45fb-812a-638ef65f6781\/how-to-rename-domain-netbios-name-?forum=winserverDS\">this, How to rename the NetBIOS name<\/a>, now mix everything into one huge sch-melting pot and what do we get&#8230;. this blog post.<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Setup\"><\/span><strong>Setup<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"ADMT\"><\/span>ADMT<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>*Note don\u2019t bother installing SQL + ADMT until the member server is domain joined to the target domain. In this example Windows Server 2016 is used to host ADMT services. So this server is domain joined to Special.NewDomain.com<\/p>\n<p>First Download ADMT from <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=56570\">here<\/a><\/p>\n<p>Based on the size of the installer I\u2019m assuming this is an online installer and instead of dicking around trying to find an offline version.. simply connect this server to the internet. However before we begin ADMT requires an SQL instance to utilize, to keep life easy we will install SQL Express on this server and run it locally for the migration.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Installing_SQL_Express_2016\"><\/span>Installing SQL Express 2016<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now looking at where to <a href=\"https:\/\/stackoverflow.com\/questions\/39835986\/sql-server-2016-express-full-download\">find specific version to download and use<\/a>\u2026 I wasn\u2019t sure which <a href=\"https:\/\/www.mssqltips.com\/sqlservertip\/5543\/sql-server-express-versions\/\">version was best<\/a>\u2026<br \/>\nI decided to start with Express Core \u2026<br \/>\nNext, next, next, Mixed Auth (just in case) sa password.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Installing_ADMT\"><\/span>Installing ADMT<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now with SQL Express on the target domain joined server, double click the ADMT v3.2 installer exe.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/v4Jhool.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/v4Jhool.png\" alt=\"\" width=\"497\" height=\"449\" \/><\/a><\/p>\n<p>Accept the EULA. Accept\/Decline the CEIP<\/p>\n<p>Use local SQL and&#8230;.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/xWBEOo4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/xWBEOo4.png\" alt=\"\" width=\"498\" height=\"455\" \/><\/a><\/p>\n<p>DB Import&#8230; NO, next<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/rvBT5cm.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/rvBT5cm.png\" alt=\"\" width=\"500\" height=\"452\" \/><\/a><\/p>\n<p>Now we should be good to run ADMT (as a Domain admin on Special.NewDomain.com), IF you installed SQL + ADMT before joining to the target domain and did not choose to use mixed auth and have no sa account, <a href=\"http:\/\/zewwy.ca\/index.php\/2019\/06\/10\/resetting-access-to-sqlexpress-2016\/\">follow my previous blog pos<\/a>t to recover access to the SQL Express instance, granting your domain admin account access.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Preparing_the_Source_Domain\"><\/span>Preparing the Source Domain<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now how you choose to accomplish this is entirely up to you. If you wish to go the route suggested by the TechNet Post to create a new DC thats a GC and rip it out of the Forest\/Domain via a MetaData Cleanup&#8230; be my guest but that&#8217;s a lot of work.<\/p>\n<p>Instead I choose to simply create a secondary version of the Special.local DC via a backup, but I could have easily made a clone since it&#8217;s all virtualized. So for me it started out like this&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/o1vo692.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/o1vo692.png\" alt=\"\" width=\"684\" height=\"712\" \/><\/a><\/p>\n<p>Clearly at this point a trust still can&#8217;t be established as NetBIOS names are still the same, however now we have no fear of mucking up the source domain as it&#8217;s simply a clone will all users and their passwords still encrypted within AD. So this migration will require 2 things:<\/p>\n<p>1 &#8211; A domain rename<\/p>\n<p>2- Password Export Server (Covered later in this post)<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Renaming_the_Source_Domain\"><\/span>Renaming the Source Domain<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Changing_the_IP_Address\"><\/span>Changing the IP Address<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Since this is a clone, and I was not interested in alternative firewalls outside the windows firewalls I connected the source domain to the same subnet as the target domain to ease life. This requires the IP address to change.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/paK1x59.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/paK1x59.png\" alt=\"\" width=\"992\" height=\"658\" \/><\/a><\/p>\n<p>So open Network and Sharing Center and edit the adapter settings accordingly, this will however break the DC&#8217;s DNS service. So lets fix that.<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Deleting_the_DC_A_host_Record\"><\/span>Deleting the DC A host Record<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>On the DC open DNS snap-in, and navigate to the top where the SOA and NS records are, and below that search for the A host record for the DC itself, and delete that record (remember this should be a clone or copy of a DC from the original source DC so no risk should be had here).<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Reset_DNS_settings\"><\/span>Reset DNS settings<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<pre>ipconfig \/flushdns\r\nnet stop dns\r\nnet stop netlogon\r\nnet start dns\r\nnet start netlogon<\/pre>\n<p><a href=\"https:\/\/i.imgur.com\/Vea3lqU.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Vea3lqU.png\" alt=\"\" width=\"624\" height=\"389\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Create_a_new_DNS_zone\"><\/span>Create a new DNS zone<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Open DNS snap-in again on cloned source DC, and create a new DNS Zone for the new domain name.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/I5Jy5pO.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/I5Jy5pO.png\" alt=\"\" width=\"366\" height=\"381\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/rdTIdrc.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/rdTIdrc.png\" alt=\"\" width=\"498\" height=\"380\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/nR0rFaI.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/nR0rFaI.png\" alt=\"\" width=\"493\" height=\"378\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/eitTzCK.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/eitTzCK.png\" alt=\"\" width=\"498\" height=\"378\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/gK3AfK8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/gK3AfK8.png\" alt=\"\" width=\"495\" height=\"375\" \/><\/a><\/p>\n<p>Complete the wizard.<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Configure_Domain_to_Accept_new_DNS_Suffix\"><\/span>Configure Domain to Accept new DNS Suffix<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>&#8211; Open ADSI Edit<br \/>\n&#8211; Right Click ADSI Edit -&gt; Connect to\u2026<br \/>\n&#8211; Leave defaults -&gt; ok<br \/>\n&#8211; Expand \u201cDefault Naming Context\u201d<br \/>\n&#8211; Right Click Domain Parent Object -&gt; Properties<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/f6tn01m.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/f6tn01m.png\" alt=\"\" width=\"710\" height=\"393\" \/><\/a><\/p>\n<p>&#8211; Enter the new domain name into the msDS-AllowedDNSSuffixes<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/q9Z3eDQ.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/q9Z3eDQ.png\" alt=\"\" width=\"710\" height=\"393\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Enable_update_DNS_Suffix_option\"><\/span>Enable update DNS Suffix option<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/i.imgur.com\/yTexnSO.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/yTexnSO.png\" alt=\"\" width=\"1012\" height=\"621\" \/><\/a><\/p>\n<p>Server will reboot after this step, again since it is a clone and not actually hosting AD services for any production need this is no problem, right?<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Get_the_required_XML_to_edit\"><\/span>Get the required XML to edit:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Everything I was reading online stated that you need to do all this from a member server, and you need to copy rendom and another application from the System32 from a DC, etc, etc, all a bunch of rubbish&#8230; everytime I attempted to follow such guides the rendom command would spit out some lines that seems was supposed to be parsed by something else to provide useful return output. People stated running from System32 directly fixed that issue for them, but not for me. Instead I decided to run all the commands directly from the DC since it was the lowest risk for me. as stated serveral times why above. Sooo&#8230;..<\/p>\n<p>&#8211; Open CMD as admin on DC<br \/>\n&#8211; Run \u201crendom \/list\u201d<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/IeEnoYI.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/IeEnoYI.png\" alt=\"\" width=\"624\" height=\"292\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Edit_the_XML_file_open_via_elevated_cmd_prompt\"><\/span>Edit the XML file (open via elevated cmd prompt)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/i.imgur.com\/O8g6RT6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/O8g6RT6.png\" alt=\"\" width=\"830\" height=\"457\" \/><\/a><\/p>\n<p>save and check by running &#8220;rendom \/showforest&#8221;<\/p>\n<p>It should report the changes you made to the XML file.<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Upload_the_XML_to_the_DC\"><\/span>Upload the XML to the DC<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/i.imgur.com\/Lr17UpY.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Lr17UpY.png\" alt=\"\" width=\"322\" height=\"94\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Prepare_DC\"><\/span>Prepare DC<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/i.imgur.com\/3JlS4ze.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/3JlS4ze.png\" alt=\"\" width=\"629\" height=\"167\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Execute_Domain_Rename\"><\/span>Execute Domain Rename<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/i.imgur.com\/OOgLFRZ.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/OOgLFRZ.png\" alt=\"\" width=\"991\" height=\"460\" \/><\/a><\/p>\n<p>Let DC reboot and then complete the rename.<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"End_the_Domain_Rename_process\"><\/span>End the Domain Rename process<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/i.imgur.com\/UcjnGLS.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/UcjnGLS.png\" alt=\"\" width=\"522\" height=\"134\" \/><\/a><\/p>\n<p>So now the setup should look like this&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/XfvXplZ.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/XfvXplZ.png\" alt=\"\" width=\"670\" height=\"694\" \/><\/a><\/p>\n<p>Now as you can see we no longer have the same NetBIOS name and thus we can create a trust here to migrate users using ADMT and PES yay!<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"The_Trust\"><\/span>The Trust<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Conditional_Forwarders\"><\/span>Conditional Forwarders<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For the trust to work each domain must be reachable by the other domains DC via FQDN. This obviously requires conditional forwarders to be configured for each DC accordingly.<\/p>\n<p>So opening a MMC.exe application, from a member system with RSAT installed, or directly on Special.NewDomain.com if it has the desktop experience. Then Add the DNS snap-in. Add a conditional forwarder, in my case I added NotSpecial.com pointing to the IP address of the cloned and renamed DC.<\/p>\n<p>Then doing the same thing on NotSpecial.com DC, opening the DNS application (or remotely with RSAT), and creating a conditional forwarder that says special.newdomain.com pointed to the IP address of the actual child DC, in the same subnet as in the diagram.<\/p>\n<p>At this point ensure that Target DC (Special.NewDoamin.com) can ping NotSpecial.com, and that Source DC (Special.com) can ping Special.NewDomain.com. If yes, we can now go ahead and build the trust.<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Building_the_Trust\"><\/span>Building the Trust<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Open domain and trusts. Right click domain and properties:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/r0pIl2U.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/r0pIl2U.png\" alt=\"\" width=\"328\" height=\"257\" \/><\/a><\/p>\n<p>Click the Trusts Tab, New Trust:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/qwz4mad.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/qwz4mad.png\" alt=\"\" width=\"401\" height=\"442\" \/><\/a><\/p>\n<p>Complete the wizard for both sides of the trust. I had a domain admin account in each source and target domain.<\/p>\n<p>With admin account on each domain and already logged in as domain admin on the NotSpecial domain, wizard completes successfully:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/KJr4iqD.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/KJr4iqD.png\" alt=\"\" width=\"502\" height=\"386\" \/><\/a><\/p>\n<p>Now with a trust in place, we could start just migrating users, but we need those passwords migrated as well, else we will have a bunch of angry users.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"ADMT_PES\"><\/span>ADMT &amp; PES<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Permissions\"><\/span>Permissions<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Nest Special\\DomainAdmin into NotSpecial\\BuiltIn\\Administrators group, as well as into Special\\BuiltIn\\Administrators group. You might be wondering why? Well I hit this error when attempting to migrate users passwords:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/YMWRYTm.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/YMWRYTm.png\" alt=\"\" width=\"492\" height=\"173\" \/><\/a><\/p>\n<p>After <a href=\"https:\/\/social.technet.microsoft.com\/Forums\/windowsserver\/en-US\/3703eea9-e465-4316-b6d5-0f42322c9290\/unable-to-establish-a-session-with-the-password-export-server-access-is-deniedquot?forum=winserverMigration\">reading this<\/a>, I made the changes above and it finally got past this error when attempting to migrate users passwords.<\/p>\n<p>Logged on to ADMT as Special\\DomainAdmin<\/p>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Password_Export_Server_Setup\"><\/span>Password Export Server Setup<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Step 1) Create the encryption key for the migration:<\/p>\n<pre>admt key \/option:create \/sourcedomain:notspecial.com \/keyfile:\"C:\\path\\to\\file.pes\" \/keypassword:*<\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/mrmH147.png\" \/><\/p>\n<p>Step 2) Copy the Key to the NotSpecial.com DC (I used RDP)<\/p>\n<p>Step 3) Grab <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=1838\">PES installer from here<\/a>, and get it on NotSpecial.com DC<\/p>\n<p>You should now have this on NotSpecial.com DC:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/BaIG4Df.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/BaIG4Df.png\" alt=\"\" width=\"991\" height=\"359\" \/><\/a><\/p>\n<p>Step 4) Install PES running the MSI from an elevated cmd prompt:<br \/>\nIf you&#8217;re wondering why, I was about to smash a monitor when the installer kept telling me the password was wrong for the encryption file, when I knew for certain I wasn&#8217;t putting it in wrong, and <a href=\"https:\/\/www.petenetlive.com\/KB\/Article\/0001355\">someone else blogged about it<\/a>.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/La9FOsG.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/La9FOsG.png\" alt=\"\" width=\"624\" height=\"278\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/zp70wqi.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/zp70wqi.png\" alt=\"\" width=\"497\" height=\"386\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/nKX3AkN.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/nKX3AkN.png\" alt=\"\" width=\"490\" height=\"376\" \/><\/a><\/p>\n<p>I used a installed using local system account cause again this DC will be shutdown after the migration.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/gZmuT3R.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/gZmuT3R.png\" alt=\"\" width=\"491\" height=\"381\" \/><\/a><\/p>\n<p>Step 5) Complete the Install and after reboot start the service<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/QlQjhYy.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/QlQjhYy.png\" alt=\"\" width=\"796\" height=\"68\" \/><\/a><\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"ADMT_and_Migrating_Users\"><\/span>ADMT and Migrating Users<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>At this point we should be officially ready to migrate users, on ADMT open ADMT:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/xD2BQKW.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/xD2BQKW.png\" alt=\"\" width=\"316\" height=\"210\" \/><\/a><\/p>\n<p>Right click the folder and select the user migration wizard<br \/>\nPopulate the domain names and tree source domain controllers should pick up automatically.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/03Y2pie.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/03Y2pie.png\" alt=\"\" width=\"494\" height=\"387\" \/><\/a><\/p>\n<p>Select your users, Pick a target OU, then select to migrate password:<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/385OY36.png\" \/><\/p>\n<p>Given you followed the permissions section, this should work:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/3NcEBSA.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/3NcEBSA.png\" alt=\"\" width=\"492\" height=\"390\" \/><\/a><\/p>\n<p>Keep target state same as source and don\u2019t copy SID as we have no intention of using SID filtering.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/7EQg5I1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/7EQg5I1.png\" alt=\"\" width=\"496\" height=\"392\" \/><\/a><\/p>\n<p>These settings worked great for me, change based on your needs.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/rnqIxo0.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/rnqIxo0.png\" alt=\"\" width=\"494\" height=\"394\" \/><\/a><\/p>\n<p>again these settings worked for me.<\/p>\n<p>After the process&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/wpHmev6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/wpHmev6.png\" alt=\"\" width=\"408\" height=\"395\" \/><\/a><\/p>\n<p>It worked! However i was amazed even in my first test run, there was one noticeable message in the log:<\/p>\n<p>Rename UPN name user@NewDomain.com to user@NewDomain.com. Cannot create accounts with the same UPN name as another UPN in the enterprise.<\/p>\n<p>Well cause there already exists a user with that UPN at the parent, but why is it picking the parent for setting the UPN? <a href=\"https:\/\/social.technet.microsoft.com\/Forums\/ie\/en-US\/00ca94ef-b4c5-4bfa-b754-15e13c98fad5\/admt-setelcting-the-upn-of-the-parent-domain?forum=winserverDS\">Who knows&#8230;<\/a> but much like that reference you can bulk select users in ADUAC Snap-in, and select the child domain from the drop down text-box.<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<ol>\n<li>Create a Copy of the Source Domain Controller<\/li>\n<li>Rename its Domain<\/li>\n<li>Connect to target domain subnet<\/li>\n<li>create conditional forwarders<\/li>\n<li>create two way trust<\/li>\n<li>Setup ADMT<\/li>\n<li>Setup PES<\/li>\n<li>Migrate Users<\/li>\n<li>Remove Trust, and Shutdown NotSpecial.com DC<\/li>\n<li>Happy Dance<\/li>\n<\/ol>\n<p>Hope everyone enjoyed this post, and hopefully someone finds it useful.<\/p>\n<p>*Update* <a href=\"https:\/\/dirkjanm.io\/active-directory-forest-trusts-part-one-how-does-sid-filtering-work\/\">Here&#8217;s a really good blog on SID FIltering between forest trusts<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Story *NOTE* All information here is provided as is for educational purposes only, whatever you do in your own environment is on you. I want to give a bit of a background here, the goal was to migrate users to a new child domain, that was previously a 2 way forest wide trust. In this &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/zewwy.ca\/index.php\/2019\/06\/18\/migrating-users-and-passwordssame-netbios-name\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Migrating Users and Passwords<br \/>Same NetBIOS Name&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[8,197],"tags":[207,206,208,209],"class_list":["post-625","post","type-post","status-publish","format-standard","hentry","category-server-administration","category-windows","tag-admt","tag-migrating-users","tag-pes","tag-same-netbios"],"_links":{"self":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/comments?post=625"}],"version-history":[{"count":11,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/625\/revisions"}],"predecessor-version":[{"id":629,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/625\/revisions\/629"}],"wp:attachment":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/media?parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/categories?post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/tags?post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}