Kerberos delegation

Resource based delegation property:

Get-ADUser <account> -properties msDs-AllowedToActOnBehalfOfOtherIdentity | select -ExpandProperty msDs-AllowedToActOnBehalfOfOtherIdentity | fl *

To set up target resource:

$creds = Get-Credential
$user1 = Get-ADUser -Identity <samaccountname1> -Credential $creds -Server <remote-DC-FQDN>
$user2 = Get-ADUser -Identity <samaccountname2> -Credential $creds -Server <remote-DC-FQDN> 
Set-ADUser <target-samaccountname> -PrincipalsAllowedToDelegateToAccount $user1,$user2

Office 2019 installation

Configuration tool available at https://config.office.com/

 setup /configure configuration.xml
<Configuration>
  <Add OfficeClientEdition="64" Channel="PerpetualVL2019" AllowCdnFallback="TRUE" ForceUpgrade="TRUE">
    <Product ID="ProPlus2019Volume">
      <Language ID="en-us" />
      <ExcludeApp ID="Groove" />
    </Product>
    <Product ID="VisioPro2019Volume">
      <Language ID="en-us" />
      <ExcludeApp ID="Groove" />
    </Product>
    <Product ID="ProjectPro2019Volume">
      <Language ID="en-us" />
      <ExcludeApp ID="Groove" />
    </Product>
  </Add>
  <Property Name="SharedComputerLicensing" Value="0" />
  <Property Name="PinIconsToTaskbar" Value="FALSE" />
  <Property Name="SCLCacheOverride" Value="0" />
  <Updates Enabled="TRUE" />
  <Display Level="Full" AcceptEULA="TRUE" />
</Configuration>