-
Prepare source and target domains
- Install high Encryption software (not needed if domains >= 2003)
-
Configure DNS on source and target to resolve name space of both domains (conditional forward)
- On target domain add conditional forwarder to sourceDomain.xxx.xxx
- On source domain add conditional forwarder to targetDomain.xxx.xxx
-
Establish required trust (bidirectional from source and target domains)
- Create a two-way trust between source and target domains
-
Create Migration Account and group on source domain
- In the source domain, create an account called <Source Domain>migrator
- In the source domain, add migrator account to Domain Admins group
- In the target domain, delegate permissions on OUs that are targets for resource migration to the migrator account.
-
Configure source and target domains for SID history migration
- To enable auditing in the the source domain, create a local group called SourceDomain$$$, where SourceDomain is the NetBIOS name of your source domain, for example, H07$$$. Do not add members to this group; if you do, SID history migration will fail
-
Enable auditing of account management in the source and target domains. For Windows Server 2008 R2 and Windows Server 2008, you need to also enable auditing for directory service access in order to migrate users with SID history between forests.
- Log on as an administrator to any domain controller in the target domain
- Click Start, point to All Programs, point to Administrative Tools, and then click Group Policy Management
- Navigate to Forest | Domains | Domain | Domain Controllers | Default Domain Controllers Policy
- Right-click Default Domain Controllers Policy and click Edit
- In Group Policy Management Editor, in the console tree, navigate to Computer Configuration | Policies | Windows Settings | Security Settings | Local Policies | Audit Policy
- In the details pane, right-click Audit account management, and then click Properties
- Click Define these policy settings, and then click Success and Failure
- Click Apply, and then click OK
- In the details pane, right-click Audit directory service access and then click Properties
- Click Define these policy settings and then click Success
- Click Apply, and then click OK
- If the changes need to be immediately reflected on the domain controller, open an elevated command prompt and type gpupdate /force
- Repeat steps 1 through 12 in the source domain
-
configure Firewall on source designed domain Controller (Must be PDC emulator)
- Enable Remote Administration
- Enable Remote Service Management
-
Configure the target domain OU for Administration
- Log on as an administrator to any domain controller in the target domain
- Start Active Directory Users and Computers, and then create the OU structure that your design team specified
- Create administrative groups, and assign migrator users to these groups
- Delegate the administration of the OU structure to migrators group
-
Install ADMT
- Install or upgrade a server computer (preferably a member server) in either your source or target domain environment as necessary to run Windows Server 2008 R2
- grant migrator account local Administrator rights on ADMT server
- login on ADMT server as migrator account
- install SQL Server 2005 Express and install it (http://go.microsoft.com/fwlink/?LinkId=181159)
- (in Database Selection use .\SQLEXPRESS)
- Download and install ADMT (3.2)
-
Enable password Migration
- Download PES v3.1 from the Microsoft Download Center 1 (x64) (http://go.microsoft.com/fwlink/?LinkId=147653)
- Generate Encryption key for password migration on target domain on computer running ADMT admt key /option:create /sourcedomain:<SourceDomain> /keyfile:<KeyFilePath> /keypassword:{<password>|*}
- copy the encryption key for password file on source designed Domain Controller
- configure the PES service on a domain controller in the source domain
-
Migrate Users
- start PES service on desigened source domain controller (PDC emulator)
- start ADMT application on ADMT (target domain) server
- right click on "Active Directory Migration Tool" and select "Users Account Migration Wizard"
- "On domain selection" select domains and source/target domain controllers (on source domain select domain controller where PES service is installed)
- On "Users Selection Options" select "Select Users from Domain"
- On "Users selection" select source domain users that has to be migrated
- On "Organizational Unit Selection" select OU on target domain where migrated users will be moved
- On "Password Options" select "Migrate Password" and select Source Domain controller where PES service is installed in the "Password Migration Source DC" text field
- On "Account Transition Options" select "Target same as source" and "Migrate user SID to target domain"
- On "User Account" supply credential of an Administrator user on source domain (migrator user should be fine)
- On "User Options" select all except "Translate Roaming Profiles"
- On "Object Properties Exclusion" proceed with default values
- On "Conflict Management" select "Migrate and merge conflicting objects"
- Proceeed till the end
- Migrate resources (computers)