What is (RODC) – Read Only Domain Controllers

RODC are used in non secure areas (Where the physical server can be compromised). You can establish which credentials can be cached on an RODC (Computer and User objects). When a user or computer authenticates against an RODC, the RODC will authenticate the user against a writable DC. If the object is allowed to be…