So doing a P2V into Hyper-V of the existing system, and spinning up a new RDSH would be the preferred setup. Hacking up the security model on the domain controller to pull it off is digging yourself a ...
Cuireadh roinnt torthaí i bhfolach toisc go bhféadfadh siad a bheith dorochtana duit
Taispeáin torthaí dorochtana