So doing a P2V into Hyper-V of the existing system, and spinning up a new RDSH would be the preferred setup. Hacking up the security model on the domain controller to pull it off is digging yourself a ...