Difficulty: Medium
Correct Answer: Apply a less restrictive custom security template to DC1
Explanation:
Introduction / Context:
Windows 2000 introduced security templates that can harden domain controllers substantially (for example, restricting LM/NTLM, enforcing SMB signing, tightening cipher suites). When a Windows 2000 DC is locked down with an aggressive template, legacy Windows NT 4.0 clients and trusted domains may fail authentication or resource access even though two-way trusts exist. This scenario tests your understanding of interoperability between mixed-generation domains and the impact of security templates on legacy access.
Given Data / Assumptions:
Concept / Approach:
Highly secure DC templates often disable or restrict down-level protocols (e.g., NTLMv1, unsigned SMB). NT 4.0 domains may still rely on these legacy mechanisms. The most direct, least disruptive fix is to adjust the security template applied to DC1 to a less restrictive custom profile that explicitly allows necessary down-level compatibility (e.g., permit NTLM where required, relax SMB signing requirements if appropriate). Changing domain mixed/native mode does not address authentication protocol mismatches and would not by itself re-enable access for NT clients.
Step-by-Step Solution:
Verification / Alternative check:
After applying the less restrictive template, verify successful NT user authentication, access to shared resources, and absence of related security failures in the DC’s event logs. Ensure that you only relax the minimum settings required.
Why Other Options Are Wrong:
Common Pitfalls:
Over-relaxing unrelated settings; changing domain mode unnecessarily; assuming trusts alone guarantee interoperability without ensuring protocol compatibility.
Final Answer:
Apply a less restrictive custom security template to DC1.
Discussion & Comments