Hi Folks,
Has anyone done this for a host which has never been in the vCO PowerShell inventory? Specifically, how does Kerberos cope with a hostname that might have been re-created since the last time Kerberos tried to authenticate for access to it?
Cheers