This command allows an admin to view or modify the password
replication policy for RODCs.
/prp [ADDITIONAL_ARGS]
can be either of
view
add
delete
move
for view, add, and delete, can be either of
rodc_name
*
for move, is
rodc_name
[ADDITIONAL_ARGS] depend on
view:
This operation displays the principals in the specified list or
displays the current password replication policy for a specified
principal.
/prp view {|}
is either of
auth2 - the list of security principals which have been
authenticated by the RODC
allow - security principals (or groups of security
principals) for which the RODC is explicitly allowed
to replicate passwords.
deny - the list of security principals (or groups of security
principals) for which RODC is explicitly denied
permission to replicate passwords.
reveal - the list of security principals (users and computers)
which have their current password cached by the RODC
The allow and deny lists typically contain groups - direct
or nested membership of any of the groups implies
membership of the relevant "list".
add:
This operation adds the specified principal to the allow list.
/prp add allow
delete:
This operation deletes the specified principal (or all principals)
from the auth2/allow list.
/prp delete allow {|/all}
/prp delete auth2 /all
move:
This operation moves all the principals from the auth2 list to
the specified group. If the group does not exist, it is created.
If the group is not in the allow list of the RODC, it is added.
/prp move [/noauth2cleanup]
[/users_only|/comps_only]
/noauth2cleanup - The auth2 list will be cleaned up by default
when using the move operation. Use this switch to avoid the
cleanup.
/users_only - Only user objects will be moved from the auth2
list to the allow list.
/comps_only - Only computer objects will be moved from the
auth2 list to the allow list.
This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
This command activates or deactivates the TPM. This command requires physical presence at the computer and cannot be run ...
This command allows an admin to view or modify the password replication policy for RODCs. /prp ADDITIONAL_ARGS can be either ...
This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) ...
This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) ...
This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using ...
This command allows or disallows the ability to set an owner. This command requires physical presence at the computer and ...