Troubleshooting Domain: Expert Workshop E143
Troubleshooting Domain: Expert Workshop E143
Troubleshooting Domain
Active Directory
Domain
Domain Name System
© ABB Consult IT - 2
Revision C
Domain
Troubleshooting Active Directory
Administrates resources on a network such as
Applications
Applications
Computers
Files
Computers Groups
Users Files
Peripherals e.g.
printers
Users Groups
Peripherals e.g.
printers
© ABB Consult IT - 3
Operators
© ABB Consult IT - 5
papercomp.local
© ABB Consult IT - 6
pulp.papercomp.local machine.papercomp.local
Revision C
Domain
Troubleshooting Active Directory Domain Forest
Multiple domain trees are called a forest.
Unusual in 800xA systems.
papercomp.local
steelcomp.local
Trust
© ABB Consult IT - 7
IIT.local
Operators
© ABB Consult IT - 8
papercomp.local steelcomp.local
Trust
© ABB Consult IT - 9
Revision C
Domain
Troubleshooting Active Directory Global Catalog
Global catalog replicated to those Domain
controllers designated as Global Catalog
servers
papercomp.local
© ABB Consult IT - 10
Revision C
Domain
Troubleshooting Domain Controller Replication
Replication between the domain controllers
secures consistent information
© ABB Consult IT - 11
Revision C
Domain
Troubleshooting Operation Masters
The Operation Masters runs only in one single Domain controller to
avoid to ensure consistency and avoid conflicts in data entries.
Schema Master
© ABB Consult IT - 13
Revision C
Domain
Troubleshooting Domain Naming Masters
The Domain Naming Master controls the addition or
removal of domains in the forest.
Domain Naming
Master
© ABB Consult IT - 14
New domain
Revision C
Domain
Troubleshooting PDC Emulator
The PDC emulator acts as a Microsoft Windows NT
primary domain controller (among other tasks).
RID
Master You can examine the RID pool with the
command dcdiag.
© ABB Consult IT - 16
Move
Infrastructure
Master
© ABB Consult IT - 17
Non-Functioning
Operation Master
Functioning
Operation Master
© ABB Consult IT - 18
Revision C
Domain
Troubleshooting
© ABB Consult IT - 19 Domain Name Space
Revision C
Domain
Troubleshooting Zones
Name Server
Name Server
webserver1 client
There must be
one Reverse
Lookup zone for
path 0
There must be
one Reverse
Lookup zone for
path 1
© ABB Consult IT - 23
Revision C
Domain
Troubleshooting Verify Domain Configuration Checks
Only the Client/Server network area
should be available.
If more areas: check DNS configuration,
especially the zones and the RNRP
filtering in Configuration Wizard.
© ABB Consult IT - 24
Revision C
Domain
Troubleshooting Verify Domain Configuration Checks
Zone properties
© ABB Consult IT - 25
Revision C
Domain
Troubleshooting Verify Domain Configuration Checks
nslookup
>ls – d domain shows all records
>ls –t SRV domain shows SRV records
Result can be piped to file.
© ABB Consult IT - 31
Revision C
Domain
Troubleshooting Windows Support Tools
Net share
SYSVOL and
NETLOGON must
exist as share
Check the Event Viewer Application Log if Backup has been completed
successfully.
Revision C
Domain
Troubleshooting Create a copy of the System State Backup
4.1.1 Description
The exercise gives you the ability to verify the domain configuration.. The exercise
shows how to analyze the domain controllers.
4.1.2 Objectives
Upon completion of this exercise you will be able to:
• Use Microsoft tools for checking the domain controller configuration.
• Be able to make your of Microsoft Management consol as an aid for the
domain control analyze.
• Use commands for analyze
1/3
E143-04 Exercise 4.1 - RevB.doc
2/3
Maintenenance Expert workshop
4. Instead you could use the command netdom query fsmo to find out the holder of
the FSMO roles. Try this command. What must be installed to have this
command working?
5. Start a File Replication Monitor with the command replmon. Add the servers.
Force manually a File Replication. Check the result both in the event log and the
File Replication Monitor
6. Verify the DNS with the nslookup command by calling up the command with
Fully Qualified Domain Name (FQDN), name and IP address for path 0 and 1.
3/3
Maintenenance Expert workshop
4.2.1 Description
The exercise covers a situation where the first domain controller doesn’t work any
more. The exercise shows how to analyze the remaining domain controller and make it
to a primary domain controller. The exercise deals also with a restore of a 800xA node
when it is installed in the same PC box as the domain controller.
The used case is a crash of the first domain controller which holds the FSMO roles.
The image backup is older than the tombstone limits. This means the user needs to
clean up the old domain configuration after the server is restored but before it is
connected to the network.
4.2.2 Objectives
Upon completion of this exercise you will be able to:
• Use Microsoft tools for checking the domain controller configuration.
• Finding the corresponding Microsoft Tech Net articles concerning FSMO
roles.
• Be able to make the current running domain controller as a primary domain
controller.
• Restore of a domain controller from a backup which is older than the
tombstone limits.
• Transfer of roles.
1/5
E143-04 Exercise 4.2 - RevC.doc
4. The situation you have now is a crashed first domain controller. The only backup
you have is a early image. You need now to make the remaining domain controller
to a first domain controller. The following steps are involved:
• Seize the roles
• Make the remaining domain controller to a Global Catalogue server.
• Clean up all the history from the crashed domain controller in remaining
domain controller.
5. Seize the FSMO roles according to the Microsoft tech net articles according to
article: Using NtdUtils.exe to transfer or seize FSMO roles to a domain.
Here follows a short description of the procedure. The Seize of roles is the last
way out when are sure that the crashed domain controller never comes back.
2/5
Maintenenance Expert workshop
After 5 minutes you will get an event message in the Directory Service Log that
the domain controller is now a Global Catalogue server. You can verify this.
8. Remove the old primary domain server from the active directory according to
article: How to remove data in Active Directory after an unsuccessful domain
controller demotion (216498). Below you find a short description how the
metadata cleanup works.
• In a command window enter the command ntdsutil
• Type metadata cleanup, and press ENTER.
• Type connections , and press ENTER
• Type connect to server servername, and then press ENTER, where
servername is the name of the current domain controller.
• Type q, and then press ENTER. The metadata cleanup menu appears.
• Type select operation target and press ENTER.
• Type list domains and press ENTER.
• Type select domain number and press ENTER, where number is the current
domain.
• Type list sites and press ENTER
• Type select site number and press ENTER, where number is the site where
you have the domain controller to be removed.
• Type list servers in site and press ENTER. A list of servers appear.
3/5
E143-04 Exercise 4.2 - RevC.doc
• Type select server number and press ENTER, where number is the number
associated to the server you want to remove.
• Type q and press ENTER. The metadata cleanup menu appears.
• Type remove selected server and press ENTER.
• Type quit x number of times until you have exited the ntdsutil.
• Remove the cname in the _msdcs.root object in the forward lookup zone.
• Remove the “removed” domain controller in Active Directory Sites and
Services.
• Check that you have done everything according to article How to remove data
in Active Directory after an successful domain controller demotion (216498)
9. Check the status again with commands: dcdiag and netdiag.
10. Make a restore of the server by restoring the only image. The instructor will tell
which image you should restore. Don’t connect any network cables yet. After the
server is restored you must log on with the domain account.
11. You need also to delete the system on the node you have restored. You do this as
follow:
• Stop the server.
• Delete the system.
12. Remove the domain configuration by using the command:
dcpromo /forceremoval. This will bring the server automatically into a
workgroup. Check this. In order to log on you must use the local administrator
account.
13. Connect the restored server to the network.
14. Add the restored server to the domain. Check that the time is the same as the other
computers.
15. Check if DNS is installed. Open add remove programs. Select Add/Remove
window components. Select Network Services and press detail. Install DNS if it is
not installed.
16. Promote the domain controller.
Give the command dcpromo in a dos window. The domain controller will be a
second domain controller.
17. Check the Forward and Reverse look up zone.
18. Check that the license service runs with the service account.
19. Check the license connection.
20. Run the system software user settings again.
21. Connect the node again to the system from the Configuration Wizard.
22. Check the OPC configuration.
23. Check the domain configuration on the newly restored domain controller.
24. Transfer the FSMO roles back to the newly restored domain controller.
4/5
Maintenenance Expert workshop
For more information about the restore procedure see the attached information on the
following pages:
5/5
Using NSlookup.exe Page 1 of 4
Using NSlookup.exe
This article was previously published under Q200525
Article ID : 200525
SUMMARY Last Review : November 30, 2004
Nslookup.exe is a command-line administrative tool for testing and Revision : 2.0
troubleshooting DNS servers. This tool is installed along with the TCP/IP
protocol through Control Panel. This article includes several tips for using Nslookup.exe.
MORE INFORMATION
To use Nslookup.exe, please note the following:
Nslookup.exe can be run in two modes: interactive and noninteractive. Noninteractive mode is useful when only a
single piece of data needs to be returned. The syntax for noninteractive mode is:
To start Nslookup.exe in interactive mode, simply type "nslookup" at the command prompt:
C:\> nslookup
Default Server: nameserver1.domain.com
Address: 10.0.0.1
>
Typing "help" or "?" at the command prompt will generate a list of available commands. Anything typed at the
command prompt that is not recognized as a valid command is assumed to be a host name and an attempt is
made to resolve it using the default server. To interrupt interactive commands, press CTRL+C. To exit interactive
mode and return to the command prompt, type exit at the command prompt.
The following is the help output and contains the complete list of options:
http://support.microsoft.com/default.aspx?kbid=200525 2006-03-27
Using NSlookup.exe Page 2 of 4
server NAME - set default server to NAME, using current default server
lserver NAME - set default server to NAME, using initial server
finger [USER] - finger the optional NAME at the current default host
root - set current default server to the root
ls [opt] DOMAIN [> FILE] - list addresses in DOMAIN (optional: output to
FILE)
A number of different options can be set in Nslookup.exe by running the set command at the command prompt. A
complete listing of these options is obtained by typing set all. See above, under the set command for a printout
of the available options.
C:\> nslookup
Default Server: ns1.domain.com
Address: 10.0.0.1
The first time a query is made for a remote name, the answer is authoritative, but subsequent queries are
nonauthoritative. The first time a remote host is queried, the local DNS server contacts the DNS server that is
authoritative for that domain. The local DNS server will then cache that information, so that subsequent queries
are answered nonauthoritatively out of the local server's cache.
Example:
C:\> nslookup
http://support.microsoft.com/default.aspx?kbid=200525 2006-03-27
Using NSlookup.exe Page 3 of 4
Address: 10.0.0.1
Using ls with no arguments will return a list of all address and name server data. The -a switch will return alias
and canonical names, -d will return all data, and -t will filter by type.
Example:
>ls domain.com
[nameserver1.domain.com]
nameserver1.domain.com. NS server = ns1.domain.com
nameserver2.domain.com NS server = ns2.domain.com
nameserver1 A 10.0.0.1
nameserver2 A 10.0.0.2
>
Zone transfers can be blocked at the DNS server so that only authorized addresses or networks can perform this
function. The following error will be returned if zone security has been set:
For additional information, see the following article or articles in the Microsoft Knowledge Base:
Troubleshooting Nslookup.exe
Default Server Timed Out
When starting the Nslookup.exe utility, the following errors may occur:
*** Can't find server name for address w.x.y.z: Timed out
NOTE: w.x.y.z is the first DNS server listed in the DNS Service Search Order list.
*** Can't find server name for address 127.0.0.1: Timed out
The first error indicates that the DNS server cannot be reached or the service is not running on that computer. To
correct this problem, either start the DNS service on that server or check for possible connectivity problems.
The second error indicates that no servers have been defined in the DNS Service Search Order list. To correct this
problem, add the IP address of a valid DNS server to this list.
For additional information, see the following article or articles in the Microsoft Knowledge Base:
http://support.microsoft.com/default.aspx?kbid=200525 2006-03-27
Using NSlookup.exe Page 4 of 4
*** Can't find server name for address w.x.y.z: Non-existent domain
This error occurs when there is no PTR record for the name server's IP address. When Nslookup.exe starts, it does
a reverse lookup to get the name of the default server. If no PTR data exists, this error message is returned. To
correct make sure that a reverse lookup zone exists and contains PTR records for the name servers.
For additional information, see the following article or articles in the Microsoft Knowledge Base:
In DNS Manager, a new domain can be added under the primary zone, thus creating a child domain. Creating a
child domain this way does not create a separate db file for the domain, thus querying that domain or running a
zone transfer on it will produce the above errors. Running a zone transfer on the parent domain will list data for
both the parent and child domains. To work around this problem, create a new primary zone on the DNS server
for the child domain.
APPLIES TO
• Microsoft Windows 2000 Server
• Microsoft Windows 2000 Advanced Server
• Microsoft Windows NT Server 4.0 Standard Edition
http://support.microsoft.com/default.aspx?kbid=200525 2006-03-27
How to remove data in Active Directory after an unsuccessful domain controller demo... Page 1 of 6
Warning If you use the ADSI Edit snap-in, the LDP utility, or any other LDAP version 3 client, and you incorrectly
modify the attributes of Active Directory objects, you can cause serious problems. These problems may require
you to reinstall Microsoft Windows 2000 Server, Microsoft Windows Server 2003, Microsoft Exchange 2000 Server,
Microsoft Exchange Server 2003, or both Windows and Exchange. Microsoft cannot guarantee that problems that
occur if you incorrectly modify Active Directory object attributes can be solved. Modify these attributes at your
own risk.
The Active Directory Installation Wizard (Dcpromo.exe) is used for promoting a server to a domain controller and
for demoting a domain controller to a member server (or to a stand-alone server in a workgroup if the domain
controller is the last in the domain). As part of the demotion process, the wizard removes the configuration data
for the domain controller from Active Directory. This data takes the form of an NTDS Settings object that exists as
a child of the server object in Active Directory Sites and Services.
CN=NTDS
Settings,CN=<servername>,CN=Servers,CN=<sitename>,CN=Sites,CN=Configuration,DC=<domain>...
The attributes of the NTDS Settings object include data representing how the domain controller is identified in
respect to its replication partners, the naming contexts that are maintained on the machine, whether the domain
controller is a global catalog server, and the default query policy. The NTDS Settings object is also a container
that may have child objects that represent the domain controller's direct replication partners. This data is required
for the domain controller to operate in the environment, but is retired upon demotion.
In the event that the NTDS Settings object is not removed correctly (for example, if the NTDS Settings object is
not correctly removed from a demotion attempt), the administrator can use the Ntdsutil.exe utility to manually
remove the NTDS Settings object. The following steps list the procedure for removing the NTDS Settings object in
Active Directory for a particular domain controller. At each Ntdsutil menu, the administrator can type help for
more information about the available options.
Caution The administrator must also make sure that replication has occurred since the demotion before manually
removing the NTDS Settings object for any server. Using the Ntdsutil utility incorrectly may result in partial or
complete loss of Active Directory functionality.
1. Click Start, point to Programs, point to Accessories, and then click Command Prompt.
2. At the command prompt, type ntdsutil, and then press ENTER.
3. Type metadata cleanup, and then press ENTER. Based on the options given, the administrator can
perform the removal, but additional configuration parameters must be specified before the removal can
http://support.microsoft.com/default.aspx/kb/216498 2006-03-27
How to remove data in Active Directory after an unsuccessful domain controller demo... Page 2 of 6
occur.
4. Type connections and press ENTER. This menu is used to connect to the specific server where the
changes occur. If the currently logged on user does not have administrative permissions, different
credentials can be supplied by specifying the credentials to use before making the connection. To do this,
type set creds DomainNameUserNamePassword, and then press ENTER. For a null password, type
null for the password parameter.
5. Type connect to server servername, and then press ENTER. You should receive confirmation that the
connection is successfully established. If an error occurs, verify that the domain controller being used in
the connection is available and the credentials you supplied have administrative permissions on the
server.
Note If you try to connect to the same server that you want to delete, when you try to delete the server
that step 15 refers to, you may receive the following error message:
6. Type quit, and then press ENTER. The Metadata Cleanup menu appears.
7. Type select operation target and press ENTER.
8. Type list domains and press ENTER. A list of domains in the forest is displayed, each with an associated
number.
9. Type select domain number and press ENTER, where number is the number associated with the
domain the server you are removing is a member of. The domain you select is used to determine
whether the server being removed is the last domain controller of that domain.
10. Type list sites and press ENTER. A list of sites, each with an associated number, appears.
11. Type select site number and press ENTER, where number is the number associated with the site the
server you are removing is a member of. You should receive a confirmation listing the site and domain
you chose.
12. Type list servers in site and press ENTER. A list of servers in the site, each with an associated number,
is displayed.
13. Type select server number, where number is the number associated with the server you want to
remove. You receive a confirmation listing the selected server, its Domain Name System (DNS) host
name, and the location of the server's computer account you want to remove.
14. Type quit and press ENTER. The Metadata Cleanup menu appears.
15. Type remove selected server and press ENTER. You should receive confirmation that the removal
completed successfully. If you receive the following error message, the NTDS Settings object may
already be removed from Active Directory as the result of another administrator removing the NTDS
Settings object or replication of the successful removal of the object after running the DCPROMO utility.
Note You may also see this error when you try to bind to the domain controller that will be removed.
Ntdsutil has to bind to a domain controller other than the one that will be removed with metadata
cleanup.
16. Type quit at each menu to quit the Ntdsutil utility. You should receive confirmation that the connection
disconnected successfully.
17. Remove the cname record in the _msdcs.root domain of forest zone in DNS. Assuming that DC will be
reinstalled and re-promoted, a new NTDS Settings object is created with a new GUID and a matching
cname record in DNS. You do not want the DCs that exist to use the old cname record.
As best practice, you should delete the host name and other DNS records. If the lease time that remains
on Dynamic Host Configuration Protocol (DHCP) address assigned to offline server is exceeded then
another client can obtain the IP address of the problem DC.
18. In the DNS console, use the DNS MMC to delete the A record in DNS. The A record is also known as the
Host record. To delete the A record, right-click the A record, and then click Delete. Also, delete the
cname record in the _msdcs container. To do this, expand the _msdcs container, right-click cname, and
then click Delete.
Important If this is a DNS server, remove the reference to this DC under the Name Servers tab. To do
this, in the DNS console, click the domain name under Forward Lookup Zones, and then remove this
server from the Name Servers tab.
http://support.microsoft.com/default.aspx/kb/216498 2006-03-27
How to remove data in Active Directory after an unsuccessful domain controller demo... Page 3 of 6
Note If you have reverse lookup zones, also remove the server from these zones.
19. If the deleted computer is the last domain controller in a child domain, and the child domain was also
deleted, use ADSIEdit to delete the trustDomain object for the child. To do this, follow these steps:
a. Click Start, click Run, type adsiedit.msc, and then click OK
b. Expand the Domain NC container.
c. Expand DC=Your Domain, DC=COM, PRI, LOCAL, NET.
d. Expand CN=System.
e. Right-click the Trust Domain object, and then click Delete.
20. Use Active Directory Sites and Services to remove the domain controller. To do this, follow these steps:
a. Start Active Directory Sites and Services.
b. Expand Sites.
c. Expand the server's site. The default site is Default-First-Site-Name.
d. Expand Server.
e. Right-click the domain controller, and then click Delete.
1. Click Start, point to Programs, point to Accessories, and then click Command Prompt.
2. At the command prompt, type ntdsutil, and then press ENTER.
3. Type metadata cleanup, and then press ENTER. Based on the options given, the administrator can
perform the removal, but additional configuration parameters must be specified before the removal can
occur.
4. Type connections and press ENTER. This menu is used to connect to the specific server where the
changes occur. If the currently logged on user does not have administrative permissions, different
credentials can be supplied by specifying the credentials to use before you make the connection. To do
this, type set creds DomainNameUserNamePassword, and then press ENTER. For a null password,
type null for the password parameter.
5. Type connect to server servername, and then press ENTER. You should receive confirmation that the
connection is successfully established. If an error occurs, verify that the domain controller being used in
the connection is available and the credentials you supplied have administrative permissions on the
server.
Note If you try to connect to the same server that you want to delete, when you try to delete the server
that step 15 refers to, you may receive the following error message:
6. Type quit, and then press ENTER. The Metadata Cleanup menu appears.
7. Type select operation target and press ENTER.
8. Type list domains and press ENTER. A list of domains in the forest is displayed, each with an associated
number.
9. Type select domain number and press ENTER, where number is the number associated with the
domain the server you are removing is a member of. The domain you select is used to determine
whether the server being removed is the last domain controller of that domain.
10. Type list sites and press ENTER. A list of sites, each with an associated number, is displayed.
11. Type select site number and press ENTER, where number is the number associated with the site the
server you are removing is a member of. You should receive a confirmation listing the site and domain
you chose.
12. Type list servers in site and press ENTER. A list of servers in the site, each with an associated number,
is displayed.
13. Type select server number, where number is the number associated with the server you want to
remove. You receive a confirmation listing the selected server, its Domain Name System (DNS) host
name, and the location of the server's computer account you want to remove.
14. Type quit and press ENTER. The Metadata Cleanup menu appears.
15. Type remove selected server and press ENTER. You should receive confirmation that the removal
http://support.microsoft.com/default.aspx/kb/216498 2006-03-27
How to remove data in Active Directory after an unsuccessful domain controller demo... Page 4 of 6
the NTDS Settings object may already be removed from Active Directory as the result of another
administrator removing the NTDS Settings object, or replication of the successful removal of the object
after you run the Dcpromo utility.
Note You may also see this error when you try to bind to the domain controller that will be removed.
Ntdsutil has to bind to a domain controller other than the one that will be removed with metadata
cleanup.
16. Type quit at each menu to quit the Ntdsutil utility. You should receive confirmation that the connection
disconnected successfully.
17. Remove the cname record in the _msdcs.root domain of forest zone in DNS. Assuming that DC will be
reinstalled and re-promoted, a new NTDS Settings object is created by using a new GUID and a matching
cname record in DNS. You do not want the DC's that exist to use the old cname record.
As best practice you should delete the hostname and other DNS records. If the lease time that remains
on Dynamic Host Configuration Protocol (DHCP) address assigned to offline server is exceeded then
another client can obtain the IP address of the problem DC.
Now that the NTDS Settings object has been deleted, you can delete the computer account, the FRS member
object, the cname (or Alias) record in the _msdcs container, the A (or Host) record in DNS, the trustDomain
object for a deleted child domain, and the domain controller.
The Adsiedit utility is included with the Windows Support Tools feature in both Windows 2000 Server and Windows
Server 2003. To install the Windows Support Tools, following these steps:
• Windows 2000 Server: On the Windows 2000 Server CD, open the Support\Tools folder, double-click
Setup.exe, and then follow the instructions that appear on the screen.
• Windows Server 2003: On the Windows Server 2003 CD, open the Support\Tools folder, double-click
Suptools.msi, click Install, and then follow the steps in the Windows Support Tools Setup Wizard to
complete the installation.
1. Use ADSIEdit to delete the computer account. To do this, follow these steps:
a. Click Start, click Run, type adsiedit.msc in the Open box, and then click OK.
b. Expand the Domain NC container.
c. Expand DC=Your Domain Name, DC=COM, PRI, LOCAL, NET.
d. Expand OU=Domain Controllers.
e. Right-click CN=domain controller name, and then click Delete.
If you receive the "DSA object cannot be deleted" error message when you try to delete the object,
change the UserAccountControl value. To change the UserAccountControl value, right-click the domain
controller in ADSIEdit, and then click Properties. Under Select a property to view, click
UserAccountControl. Click Clear, change the value to 4096, and then click Set. You can now delete the
object.
Note The FRS subscriber object is deleted when the computer object is deleted because it is a child of the
computer account.
2. Use ADSIEdit to delete the FRS member object. To do this, follow these steps:
a. Click Start, click Run, type adsiedit.msc in the Open box, and then click OK
b. Expand the Domain NC container.
c. Expand DC=Your Domain, DC=COM, PRI, LOCAL, NET.
d. Expand CN=System.
e. Expand CN=File Replication Service.
f. Expand CN=Domain System Volume (SYSVOL share).
g. Right-click the domain controller you are removing, and then click Delete.
3. In the DNS console, use the DNS MMC to delete the A record in DNS. The A record is also known as the
Host record. To delete the A record, right-click the A record, and then click Delete. Also delete the cname
(also known as the Alias) record in the _msdcs container. To do so, expand the _msdcs container, right-
click the cname, and then click Delete.
http://support.microsoft.com/default.aspx/kb/216498 2006-03-27
How to remove data in Active Directory after an unsuccessful domain controller demo... Page 5 of 6
Important If this was a DNS server, remove the reference to this DC under the Name Servers tab. To
do this, in the DNS console, click the domain name under Forward Lookup Zones, and then remove this
server from the Name Servers tab.
Note If you have reverse lookup zones, also remove the server from these zones.
4. If the deleted computer was the last domain controller in a child domain and the child domain was also
deleted, use ADSIEdit to delete the trustDomain object for the child. To do this, follow these steps:
a. Click Start, click Run, type adsiedit.msc in the Open box, and then click OK
b. Expand the Domain NC container.
c. Expand DC=Your Domain, DC=COM, PRI, LOCAL, NET.
d. Expand CN=System.
e. Right-click the Trust Domain object, and then click Delete.
5. Use Active Directory Sites and Services to remove the domain controller. To do this, follow these steps:
a. Start Active Directory Sites and Services.
b. Expand Sites.
c. Expand the server's site. The default site is Default-First-Site-Name.
d. Expand Server.
e. Right-click the domain controller, and then click Delete.
1. Run ntdsutil.
2. Switch to the metadata cleanup prompt.
3. Run the following command
remove selected server <DN of the server object in the config container>
4. Remove the cname record in the _msdcs.root domain of forest zone in DNS. Assuming that DC will be
reinstalled and re-promoted, a new NTDS Settings object is created by using a new GUID and a matching
cname record in DNS. You do not want the DCs that exist to use the old cname record.
As best practice, you should delete the host name and other DNS records. If the lease time that remains
on Dynamic Host Configuration Protocol (DHCP) address assigned to offline server is exceeded, another
client can obtain the IP address of the problem DC.
5. If the deleted computer was the last domain controller in a child domain, and the child domain was also
deleted, use ADSIEdit to delete the trustDomain object for the child. To do this, follow these steps:
a. Click Start, click Run, type adsiedit.msc, and then click OK.
b. Expand the Domain NC container.
c. Expand DC=Your Domain Name, DC=COM, PRI, LOCAL, NET.
d. Expand CN=System.
e. Right-click the Trust Domain object,, and then click Delete.
6. Use Active Directory Sites and Services to remove the domain controller. To do this, follow these steps:
a. Start Active Directory Sites and Services.
b. Expand Sites.
c. Expand the server's site. The default site is Default-First-Site-Name.
d. Expand Server.
http://support.microsoft.com/default.aspx/kb/216498 2006-03-27
How to remove data in Active Directory after an unsuccessful domain controller demo... Page 6 of 6
MORE INFORMATION
For additional information about how to forcefully demote a Windows Server 2003 or Windows 2000 domain
controller, click the following article number to view the article in the Microsoft Knowledge Base:
332199 (http://support.microsoft.com/kb/332199/) Domain controllers do not demote gracefully when you use
the Active Directory Installation Wizard to force demotion in Windows Server 2003 and in Windows 2000
Server
1. Run LDP.
2. Bind to rootDSE .
3. Select View\tree. Base DN should be cn=configuration,dc=rootdomain,dc=<suffix>.
4. Expand Sites.
5. Expand the site where the server object resides.
6. Expand Servers.
7. Expand the server that you are removing.
8. Look for a line on the right hand side that starts with DN.
9. Copy whole line excluding the DN.
"CN=DC1,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=corp,DC=com"
APPLIES TO
• Microsoft Windows 2000 Server
• Microsoft Windows 2000 Advanced Server
• Microsoft Windows 2000 Datacenter Server
• Microsoft Windows Server 2003, Standard Edition (32-bit x86)
• Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
• Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
http://support.microsoft.com/default.aspx/kb/216498 2006-03-27
Using Ntdsutil.exe to transfer or seize FSMO roles to a domain controller Page 1 of 4
MORE INFORMATION
Certain domain and enterprise-wide operations that are not good for multi-master updates are performed by a
single domain controller in an Active Directory domain or forest. The domain controllers that are assigned to
perform these unique operations are called operations masters or FSMO role holders.
The following list describes the 5 unique FSMO roles in an Active Directory forest and the dependent operations
that they perform:
• Schema master - The Schema master role is forest-wide and there is one for each forest. This role is
required to extend the schema of an Active Directory forest or to run the adprep /domainprep command.
• Domain naming master - The Domain naming master role is forest-wide and there is one for each forest.
This role is required to add or remove domains or application partitions to or from a forest.
• RID master - The RID master role is domain-wide and there is one for each domain. This role is required to
allocate the RID pool so that new or existing domain controllers can create user accounts, computer
accounts or security groups.
• PDC emulator - The PDC emulator role is domain-wide and there is one for each domain. This role is
required for the domain controller that sends database updates to Windows NT backup domain controllers.
The domain controller that owns this role is also targeted by certain administration tools and updates to
user account and computer account passwords.
• Infrastructure master - The Infrastructure master role is domain-wide and there is one for each domain.
This role is required for domain controllers to run the adprep /forestprep command successfully and to
update SID attributes and distinguished name attributes for objects that are referenced across domains.
The Active Directory Installation Wizard (Dcpromo.exe) assigns all 5 FSMO roles to the first domain controller in
the forest root domain. The first domain controller in each new child or tree domain is assigned the three domain-
wide roles. Domain controllers continue to own FSMO roles until they are reassigned by using one of the following
methods:
• The current role holder is operational and can be accessed on the network by the new FSMO owner.
• You are gracefully demoting a domain controller that currently owns FSMO roles that you want to assign to
a specific domain controller in your Active Directory forest.
• The domain controller that currently owns FSMO roles is being taken offline for scheduled maintenance and
you need specific FSMO roles to be assigned to a “live” domain controller. This may be required to perform
operations that connect to the FSMO owner. This would be especially true for the PDC Emulator role but
less true for the RID master role, the Domain naming master role and the Schema master roles.
• The current role holder is experiencing an operational error that prevents an FSMO-dependent operation
from completing successfully and that role cannot be transferred.
• A domain controller that owns an FSMO role is force-demoted by using the dcpromo /forceremoval
command.
• The operating system on the computer that originally owned a specific role no longer exists or has been
reinstalled.
As replication occurs, non-FSMO domain controllers in the domain or forest gain full knowledge of changes that
http://support.microsoft.com/default.aspx/kb/255504 2006-03-27
Using Ntdsutil.exe to transfer or seize FSMO roles to a domain controller Page 2 of 4
are made by FSMO-holding domain controllers. If you must transfer a role, the best candidate domain controller is
one that is in the appropriate domain that last inbound-replicated, or recently inbound-replicated a writable copy
of the “FSMO partition” from the existing role holder. For example, the Schema master role-holder has a
distinguished name path of CN=schema,CN=configuration,dc=<forest root domain>, and this mean that roles
reside in and are replicated as part of the CN=schema partition. If the domain controller that holds the Schema
master role experiences a hardware or software failure, a good candidate role-holder would be a domain controller
in the root domain and in the same Active Directory site as the current owner. Domain controllers in the same
Active Directory site perform inbound replication every 5 minutes or 15 seconds.
PDC DC=<domain>
RID DC=<domain>
Infrastructure DC=<domain>
A domain controller whose FSMO roles have been seized should not be permitted to communicate with existing
domain controllers in the forest. In this scenario, you should either format the hard disk and reinstall the
operating system on such domain controllers or forcibly demote such domain controllers on a private network and
then remove their metadata on a surviving domain controller in the forest by using the ntdsutil /metadata
cleanup command. The risk of introducing a former FSMO role holder whose role has been seized into the forest
is that the original role holder may continue to operate as before until it inbound-replicates knowledge of the role
seizure. Known risks of two domain controllers owning the same FSMO roles include creating security principals
that have overlapping RID pools, and other problems.
1. Log on to a Windows 2000 Server-based or Windows Server 2003-based member computer or domain
controller that is located in the forest where FSMO roles are being transferred. We recommend that you
log on to the domain controller that you are assigning FSMO roles to. The logged-on user should be a
member of the Enterprise Administrators group to transfer Schema master or Domain naming master
roles, or a member of the Domain Administrators group of the domain where the PDC emulator, RID
master and the Infrastructure master roles are being transferred.
2. Click Start, click Run, type ntdsutil in the Open box, and then click OK.
3. Type roles, and then press ENTER.
Note To see a list of available commands at any one of the prompts in the Ntdsutil utility, type ?, and
then press ENTER.
4. Type connections, and then press ENTER.
5. Type connect to server servername, and then press ENTER, where servername is the name of the
domain controller you want to assign the FSMO role to.
6. At the server connections prompt, type q, and then press ENTER.
7. Type transfer role, where role is the role that you want to transfer. For a list of roles that you can
transfer, type ? at the fsmo maintenance prompt, and then press ENTER, or see the list of roles at the
start of this article. For example, to transfer the RID master role, type transfer rid master. The one
exception is for the PDC emulator role, whose syntax is transfer pdc, not transfer pdc emulator.
8. At the fsmo maintenance prompt, type q, and then press ENTER to gain access to the ntdsutil prompt.
Type q, and then press ENTER to quit the Ntdsutil utility.
1. Log on to a Windows 2000 Server-based or Windows Server 2003-based member computer or domain
controller that is located in the forest where FSMO roles are being seized. We recommend that you log on
to the domain controller that you are assigning FSMO roles to. The logged-on user should be a member of
the Enterprise Administrators group to transfer schema or domain naming master roles, or a member of
the Domain Administrators group of the domain where the PDC emulator, RID master and the
http://support.microsoft.com/default.aspx/kb/255504 2006-03-27
Using Ntdsutil.exe to transfer or seize FSMO roles to a domain controller Page 3 of 4
Notes
• Under typical conditions, all five roles must be assigned to “live” domain controllers in the forest. If a
domain controller that owns a FSMO role is taken out of service before its roles are transferred, you
must seize all roles to an appropriate and healthy domain controller. We recommend that you only
seize all roles when the other domain controller is not returning to the domain. If it is possible, fix the
broken domain controller that is assigned the FSMO roles. You should determine which roles are to be
on which remaining domain controllers so that all five roles are assigned to a single domain
controller. For more information about FSMO role placement, click the following article number to
view the article in the Microsoft Knowledge Base:
• If the domain controller that formerly held any FSMO role is not present in the domain and if it has
had its roles seized by using the steps in this article, remove it from the Active Directory by following
the procedure that is outlined in the following Microsoft Knowledge Base article:
• Removing domain controller metadata with the Windows 2000 version or the Windows Server 2003
build 3790 version of the ntdsutil /metadata cleanup command does not relocate FSMO roles that
are assigned to live domain controllers. The Windows Server 2003 Service Pack 1 (SP1) version of
the Ntdsutil utility automates this task and removes additional elements of domain controller
metadata.
• Some customers prefer not to restore system state backups of FSMO role-holders in case the role has
been reassigned since the backup was made.
• Do not put the Infrastructure master role on the same domain controller as the global catalog server.
If the Infrastructure master runs on a global catalog server it stops updating object information
because it does not contain any references to objects that it does not hold. This is because a global
catalog server holds a partial replica of every object in the forest.
1. Click Start, point to Programs, point to Administrative Tools, and then click Active Directory Sites
and Services.
2. Double-click Sites in the left pane, and then locate the appropriate site or click Default-first-site-name
if no other sites are available.
3. Open the Servers folder, and then click the domain controller.
4. In the domain controller's folder, double-click NTDS Settings.
5. On the Action menu, click Properties.
6. On the General tab, view the Global Catalog check box to see if it is selected.
For more information about FSMO roles, click the following article numbers to view the articles in the Microsoft
Knowledge Base:
http://support.microsoft.com/default.aspx/kb/255504 2006-03-27
Using Ntdsutil.exe to transfer or seize FSMO roles to a domain controller Page 4 of 4
223787 (http://support.microsoft.com/kb/223787/) Flexible Single Master Operation transfer and seizure process
APPLIES TO
• Microsoft Windows Server 2003, Standard Edition (32-bit x86)
• Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
• Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
• Microsoft Windows 2000 Server
• Microsoft Windows 2000 Advanced Server
• Microsoft Windows 2000 Datacenter Server
http://support.microsoft.com/default.aspx/kb/255504 2006-03-27
260371 - Troubleshooting Common Active Directory Setup Issues in Windows 2000 Page 1 of 5
SUMMARY
Some common issues that you may encounter with Active Directory installation and configuration can cause a partial or
complete loss of functionality in Active Directory. These issues may include, but not be limited to:
This article describes how to troubleshoot Active Directory issues by identifying common configuration issues. For more
information about any of the issues described in this article, consult the Help system in Windows 2000, and the
Deployment Planning Guide , which is located on the following Microsoft Web site:
l http://www.microsoft.com/windows2000/library/resources/reskit/dpg/default.asp
Chapter 9 of the Deployment Planning Guide describes the design of the Active Directory structure, which is essential to
a successful Windows 2000 Active Directory deployment. Chapter 9 of the Deployment Planning Guide is available on the
Internet at the following Microsoft Web site:
l http://www.microsoft.com/windows2000/library/resources/reskit/dpg/chapt-9.asp
MORE INFORMATION
Consider the following items when you are investigating Active Directory Setup issues.
You must configure DNS correctly to ensure that Active Directory will function properly. For a more in-depth treatment of
DNS configuration for Active Directory, see the following Microsoft Knowledge Base article:
Review the following configuration items to ensure that DNS is healthy and that the Active Directory DNS entries will be
registered correctly:
l DNS IP configuration
l Active Directory DNS registration
l Dynamic zone updates
l DNS forwarders
DNS IP Configuration
An Active Directory server that is hosting DNS must have its TCP/IP settings configured properly. TCP/IP on an Active
Directory DNS server must be configured to point to itself to allow the server to register with its own DNS server. To view
the current IP configuration, open a command window and type ipconfig /all to display the details. You can modify the
DNS configuration by following these steps:
http://support.microsoft.com/default.aspx?scid=kb;[LN];260371 2004-02-04
260371 - Troubleshooting Common Active Directory Setup Issues in Windows 2000 Page 2 of 5
Active Directory DNS domain name should be listed first (at the top of the list).
c. Verify that the DNS Suffix for this connection setting is the same as the Active Directory domain
name.
d. Verify that the Register this connection's addresses in DNS check box is selected.
5. At a command prompt, type ipconfig /flushdns to purge the DNS resolver cache, and then type
ipconfig /registerdns to register the DNS resource records.
Start the DNS Management console. There should be a host record (an "A" record in Advanced view) for the computer
name. There should also be a Start of Authority (SOA in Advanced view) record pointing to the domain controller (DC) as
well as a Name Server record (NS in Advanced view).
The Active Directory DNS records must be registering in DNS. The DNS zone can be either a standard primary or an
Active Directory-integrated zone. An Active Directory-integrated zone is different from a standard primary zone in several
ways. An Active Directory-integrated zone provides the following benefits:
l The Windows 2000 DNS service stores zone data in Active Directory. This causes DNS replication to create
multiple masters, and it allows any DNS server to accept updates for a directory service-integrated zone. Using
Active Directory integration also reduces the need to maintain a separate DNS zone transfer replication topology.
l Secure dynamic updates are integrated with Windows security. This allows an administrator to precisely control
which computers can update which names, and it prevents unauthorized computers from obtaining existing names
from DNS.
Use the following steps to ensure that DNS is registering the Active Directory DNS records:
_msdcs
_sites
_tcp
_udp
If these folders do not exist, DNS is not registering the Active Directory DNS records. These records are critical to
Active Directory functionality and must appear within the DNS zone. You should repair the Active Directory DNS
record registration.
l Check for the existence of a Root Zone entry. View the Forward Lookup zones in the DNS Management console.
There should be an entry for the domain. Other zone entries may exist. There should not be a dot (".") zone. If
the dot (".") zone exists, delete the dot (".") zone. The dot (".") zone identifies the DNS server as a root server.
Typically, an Active Directory domain that needs external (Internet) access should not be configured as a root
DNS server.
The server probably needs to reregister its IP configuration (by using Ipconfig) after you delete the dot ("."). The
Netlogon service may also need to be restarted. Further details about this step are listed later in this article.
l Manually repopulate the Active Directory DNS entries. You can use the Windows 2000 Netdiag tool to repopulate
the Active Directory DNS entries. Netdiag is included with the Windows 2000 Support tools. At a command
prompt, type netdiag /fix.
NOTE: The server may need to reregister its IP configuration (by using Ipconfig) after you run Netdiag. The
Netlogon service may also need to be restarted.
If the Active Directory DNS records do not appear, you may need to manually re -create the DNS zone.
http://support.microsoft.com/default.aspx?scid=kb;[LN];260371 2004-02-04
260371 - Troubleshooting Common Active Directory Setup Issues in Windows 2000 Page 3 of 5
l After you run the Netdiag utility, refresh the view in the DNS Management console. The Active Directory DNS
records should then be listed.Manually re-create the DNS zone:
1. Start the DNS Management console.
2. Right-click the name of the zone, and then click Delete .
3. Click OK to acknowledge any warnings. The Forward Lookup zones no longer list the deleted zone.
4. Right-click Forward Lookup Zones, and then click New Zone.
5. The New Zone Wizard starts. Click Next to continue.
6. Click the appropriate zone type (either Active Directory-integrated or Standard primary, and then
click Next.
7. Type the name of the zone exactly as it appears in Network Identification, and then click Next.
8. Click the appropriate zone file, or a new zone file. Click Next, and then click Finish to finish the New Zone
Wizard. The newly created zone appears in the DNS Management console.
9. Right-click the newly created zone, click Properties, and then change Allow Dynamic Updates to Yes.
10. At a command prompt, type net stop netlogon, and then press ENTER. The Netlogon service is stopped.
11. Type net start netlogon, and then press ENTER. The Netlogon service is restarted.
12. Refresh the view in the DNS Management console. The Active Directory DNS records should be listed under
the zone.
If the Active Directory DNS records still do not exist, there may be a disjointed DNS namespace. If you suspect that there
is a disjointed DNS namespace, see the "Disjointed DNS Namespace" section in this article.
Microsoft recommends that the DNS Lookup zone accept dynamic updates. You can configure this by right-clicking the
name of the zone, and then clicking Properties. On the General tab, the Allow Updates setting should be set to Yes,
or for an Active Directory-integrated zone, either Yes or Only secure updates. If dynamic updates are not allowed, all
host registration must be completed manually.
DNS Forwarders
To ensure network functionality outside of the Active Directory domain (such as browser requests for Internet
addresses), configure the DNS server to forward DNS requests to the appropriate Internet service provider (ISP) or
corporate DNS servers. To configure forwarders on the DNS server:
NOTE: If the Enable Forwarders check box is unavailable, the DNS server is attempting to host a root zone
(usually identified by a zone named only with a period, or dot ("."). You must delete this zone to enable the DNS
server to forward DNS requests. In a configuration in which the DNS server does not rely on an ISP DNS server
or a corporate DNS server, you can use a root zone entry.
5. Type the appropriate IP addresses for the DNS servers that will accept forwarded requests from this DNS server.
The list reads from the top down in order; if there is a preferred DNS server, place it at the top of the list.
6. Click OK to accept the changes.
For more troubleshooting information about DNS configuration for Active Directory, see the following Microsoft
Knowledge Base articles:
241505 SRV Records Missing After Implementing Active Directory and DNS
241515 How to Verify the Creation of SRV Records for a Domain Controller
Network Configuration
You must configure specific network components properly to ensure proper operation of Active Directory on the network,
and to ensure that computers will be able to join the domain.
http://support.microsoft.com/default.aspx?scid=kb;[LN];260371 2004-02-04
260371 - Troubleshooting Common Active Directory Setup Issues in Windows 2000 Page 4 of 5
If the File and Printer Sharing component is disabled on the Windows 2000-based domain controller, error messages
occur when attempts are made to join the domain. For more information, see the following Microsoft Knowledge Base
article:
Note that there are situations in which it is preferable to disable File and Printer Sharing on a Windows 2000-based
computer. For example, when a Windows 2000-based computer is accessible over the Internet. In this case, you should
disable File and Printer Sharing only on the network adapter that is accessible on the Internet.
If clients that are not running Windows 2000 (for example, clients that are running Microsoft Windows 95, Microsoft
Windows 98, or Microsoft Windows NT) will participate in the Active Directory domain, they should be able to perform
NetBIOS name resolution. NetBIOS name resolution does not work if NetBIOS over TCP/IP is disabled.
DNS servers that run Windows NT 4.0 cannot dynamically register the Active Directory DNS records. The best solution in
this case is to install DNS on the Active Directory domain controller to ensure that Active Directory DNS records will be
registered for the domain.
You must configure the correct DNS suffix information before you begin a Windows 2000 upgrade installation. You
cannot change the server name and DNS domain information after Active Directory is installed.
To configure the DNS suffix information in Windows NT before you upgrade the computer to a Windows 2000 -based
Active Directory domain controller:
If you must change the DNS domain information after you install Active Directory, you must run the Dcpromo utility on
the computer to remove it from the domain and make it a stand-alone server.
If these two entries do not contain identical suffix information, a disjointed DNS namespace exists. This condition
prevents proper registration of any Active Directory DNS records.
NOTE: The only supported method to recover from a disjointed namespace is to use Dcpromo to remove the computer
from the domain and make it a stand -alone server. You can then correct the DNS namespace information and run
Dcpromo again to promote the computer back to a domain controller.
WARNING: Exercise caution if you determine that this process is necessary on an existing Windows 2000-based
domain. The process of running Dcpromo to remove the computer from a domain, and then re-creating an Active
Directory domain results in a total loss of all the computer account information and user account information for the
domain. You must manually re-create all user account information and computer account information after using this
process.
http://support.microsoft.com/default.aspx?scid=kb;[LN];260371 2004-02-04
260371 - Troubleshooting Common Active Directory Setup Issues in Windows 2000 Page 5 of 5
For additional information, click the article number below to view the article in the Microsoft Knowledge Base:
Contact Us
© 2004 Microsoft Corporation. All rights reserved. Terms of use Security & Privacy Accessibility
http://support.microsoft.com/default.aspx?scid=kb;[LN];260371 2004-02-04
How to create or move a Global Catalog in Windows 2000 Page 1 of 2
There may be occasions when it is necessary to create a new global catalog to replace an existing one, or to add a
new global catalog. Microsoft recommends the following method:
By default, Windows 2000 will only place a Global catalog on the first Domain Controller in each AD forest.
To create additional global catalog servers, or to move a global catalog from one domain controller to another,
you need to perform these actions manually.
How to Create a New Global Catalog on the Destination Global Catalog Server
To create a new global catalog:
1. On the domain controller where you want the new global catalog, start the Active Directory Sites and
Services snap-in. To start the snap-in, click Start, point to Programs, point to Administrative Tools,
and then click Active Directory Sites and Services.
2. In the console tree, double-click Sites, and then double-click sitename.
3. Double-click Servers, click your domain controller, right-click NTDS Settings, and then click Properties.
4. On the General tab, click to select the Global catalog check box to assign the role of global catalog to
this server.
5. Restart the domain controller.
Note Allow sufficient time for the account and the schema information to replicate to the new global catalog
server before you remove the global catalog from the original domain controller.
Event 1119 may be logged in the Directory Services log in Event Viewer with a description that states that the
computer is now advertising itself as a global catalog server.
In a Windows 2000 domain with only one domain controller, you typically assign the roles of the global catalog
and of the operations master (also known as flexible single-master operations or FSMO) to the same domain
controller; however, in domains with multiple domain controllers, particularly in forests with multiple domains, it is
important to consider the placement of these roles before you assign them. For more information, click the
following article number to view the article in the Microsoft Knowledge Base:
How to Remove the Global Catalog from the Original Global Catalog Server
To remove the global catalog from the original domain controller:
1. On the domain controller from which you want to remove the global catalog, start the Active Directory
Sites and Services snap-in. To start the snap-in, click Start, point to Programs, point to Administrative
Tools, and then click Active Directory Sites and Services.
2. In the console tree, double-click Sites, and then double-click sitename.
3. Double-click Servers, click your domain controller, right-click NTDS Settings, and then click Properties.
4. On the General tab, click to clear the Global catalog check box to remove the role of global catalog from
this server.
5. Restart the domain controller.
http://support.microsoft.com/default.aspx/kb/313994 2006-03-27
How to create or move a Global Catalog in Windows 2000 Page 2 of 2
Note Allow sufficient time for the account and the schema information to replicate to the new global catalog
server before you remove the global catalog from the original domain controller.
If you create additional global catalog servers, this may provide quicker responses to user inquiries; however, if
you enable additional domain controllers as global catalog servers, this may increase replication traffic on the
network. For more information about directory replication in Windows 2000, click the following article number to
view the article in the Microsoft Knowledge Base:
REFERENCES
For more information about the global catalog, click the following article numbers to view the articles in the
Microsoft Knowledge Base:
257203 (http://support.microsoft.com/kb/257203/) Common default attributes set for Active Directory and
Global Catalog
229662 (http://support.microsoft.com/kb/229662/) How to control what data is stored in the Global Catalog
248717 (http://support.microsoft.com/kb/248717/) How to modify attributes that replicate to the Global Catalog
APPLIES TO
• Microsoft Windows 2000 Server
• Microsoft Windows 2000 Advanced Server
• Microsoft Windows 2000 Professional Edition
• Microsoft Small Business Server 2000 Standard Edition
• Microsoft Windows Server 2003, Standard Edition (32-bit x86)
• Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
• Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
• Microsoft Windows Server 2003, Web Edition
• Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems
• Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
http://support.microsoft.com/default.aspx/kb/313994 2006-03-27
216993 - Backup of the Active Directory Has 60-Day Useful Life Page 1 of 2
MORE INFORMATION
If your only backup of the Active Directory is older than the tombstone
lifetime setting, reinstall the server after confirming there is at least one
surviving domain controller in the domain from which new replicas can be
synchronized. You can lose all but one server in the domain and still
recover with no loss of data, assuming that the remaining survivor holds
current information.
CN=Directory Service,CN=Windows
NT,CN=Services,CN=Configuration,DC=COMPANY,DC=COM
Use the Active Directory editing tool of your choice so that the
"tombstoneLifetime" attribute is set to be older than the backup used to
restore the Active Directory. Supported tools include Adsiedit.msc,
Ldp.exe, and ADSI Scripts.
NOTE: This information assumes that the backup is not older than the
default "tombstoneLifetime" setting. Otherwise, the objects have already
been deleted from the database. In this case, an authoritative restore
may be the better alternative if there are multiple domain controllers.
Contact Us
© 2003 Microsoft Corporation. All rights reserved. Terms of use Security & Privacy Accessibility