AD Operations
AD Operations
AD Operations
Abstract
This operations guide for the Microsoft Windows Server 2003 Active Directory directory service provides step-by-step, task-oriented information for Windows Server 2003 and Windows Server 2003 with Service Pack 1 (SP1) technologies. This operations guide is designed to provide information technology (IT) operators and administrators with prescriptive guidance for operating, managing, and troubleshooting Active Directory servers.
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
Microsoft, MS-DOS, Windows, Windows NT, Windows Server, and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Contents
Windows Server 2003 Active Directory Operations Guide...................................................1 Contents.............................................................................................................................3 Active Directory Operations Guide Administering Active Directory Operations .......................................................................21 ............................................................21
Introduction to Administering Active Directory .......................................................22 When to Use This Guide................................................................................................22 How to Use this Guide...................................................................................................23 New in This Guide for Administering Active Directory ............................................24 New Content.................................................................................................................24 Updated Content...........................................................................................................24 Administering Domain and Forest Trusts Introduction to Domain and Forest Trusts Best Practices for Domain and Forest Trusts Managing Domain and Forest Trusts ..............................................................25 .............................................................25 ........................................................26 ....................................................................27
Creating Domain and Forest Trusts ......................................................................27 New Trust Wizard Terminology......................................................................................28 Known Issues for Creating Domain and Forest Trusts Creating External Trusts ..........................................29
Create a one-way, incoming, external trust for one side of the trust Create a one-way, incoming, external trust for both sides of the trust Create a one-way, outgoing, external trust for one side of the trust Create a one-way, outgoing, external trust for both sides of the trust Create a two-way, external trust for one side of the trust Create a two-way, external trust for both sides of the trust
......................................40 ....................................42
Create a one-way, incoming, shortcut trust for one side of the trust Create a one-way, incoming, shortcut trust for both sides of the trust Create a one-way, outgoing, shortcut trust for one side of the trust Create a one-way, outgoing, shortcut trust for both sides of the trust Create a two-way, shortcut trust for one side of the trust Create a two-way, shortcut trust for both sides of the trust Creating Forest Trusts
......................................52 ....................................54
Create a one-way, incoming, forest trust for one side of the trust Create a one-way, incoming, forest trust for both sides of the trust Create a one-way, outgoing, forest trust for one side of the trust Create a one-way, outgoing, forest trust for both sides of the trust Create a two-way, forest trust for one side of the trust Create a two-way, forest trust for both sides of the trust Creating Realm Trusts
..........................................66 .......................................68
Create a one-way, incoming, realm trust Create a one-way, outgoing, realm trust Create a two-way, realm trust
Validate a trust .....................................................................................................76 To validate a trust..........................................................................................................76 Remove a manually created trust .........................................................................78 To remove a manually created trust...............................................................................78 Modifying Name Suffix Routing Settings Modify the routing status of a name suffix ...............................................................80 .............................................................81
To modify the routing status of a name suffix.................................................................81 See Also........................................................................................................................82 Enable or disable an existing name suffix for routing ............................................82 To enable or disable an existing name suffix for routing.................................................82 See Also........................................................................................................................83 Exclude name suffixes from routing to local forests ..............................................83 To exclude name suffixes from routing to local forests...................................................83 See Also........................................................................................................................84 Securing Domain and Forest Trusts Configuring SID Filtering Settings Disable SID filtering Reapply SID filtering .....................................................................84 .........................................................................84
Enable selective authentication over an external trust ..........................................90 To enable selective authentication over an external trust...............................................90 Enable selective authentication over a forest trust ................................................91 To enable selective authentication over a forest trust.....................................................92 See Also........................................................................................................................92 Enable domain-wide authentication over an external trust ....................................92 To enable domain-wide authentication over an external trust.........................................93 Enable forest-wide authentication over a forest trust ............................................94 To enable forest-wide authentication over a forest trust.................................................94 Grant the Allowed to Authenticate permission on computers in the trusting domain or forest ......................................................................................................................................95 To grant the Allowed to Authenticate permission on computers in the trusting domain or forest..........................................................................................................................96 Appendix: New Trust Wizard Pages .....................................................................96 Direction of Trust...........................................................................................................96 Sides of Trust................................................................................................................99 Administering the Windows Time Service ...........................................................100 ....................................101
Managing the Windows Time Service Configuring a time source for the forest
Change the Windows Time service configuration on the previous PDC emulator Configure a domain controller in the parent domain as a reliable time source Configure the PDC emulator to synchronize from its internal hardware clock Disable the Windows Time service
Configuring Windows-based clients to synchronize time Configure a manual time source for a selected client computer
Configure a client computer for automatic domain time synchronization Restoring Windows Time service to default settings
............................................112 ..................112
Restore Windows Time service on local computer to default settings Administering SYSVOL
.......................................................................................113 ................................................................113
.............................................................................................117 .............................................118
Changing the Space Allocated to the Staging Area Stop the File Replication service
.........................................................................119 .......................................119
Change the space allocated to the Staging Area folder Start the File Replication service Relocating the Staging Area Identify replication partners
Check the status of the shared SYSVOL Verify replication with other domain controllers
Gather the SYSVOL path information .................................................................124 To gather the system volume path information.............................................................125
Reset the File Replication service staging folder to a different logical drive Relocating SYSVOL Manually Identify replication partners
.........127
Check the status of the shared SYSVOL Verify replication with other domain controllers
Gather the SYSVOL path information .................................................................134 To gather the system volume path information.............................................................135 Stop the File Replication service Create the SYSVOL folder structure Set the SYSVOL path Set the staging area path ........................................................................137 ...................................................................138
Prepare a domain controller for nonauthoritative SYSVOL restart Update security on the new SYSVOL Start the File Replication service Updating the System Volume Path
Gather the SYSVOL path information .................................................................145 To gather the system volume path information.............................................................146 Stop the File Replication service Set the SYSVOL path Set the staging area path Start the File Replication service Restoring and Rebuilding SYSVOL Identify replication partners ........................................................................148
Check the status of the shared SYSVOL Verify replication with other domain controllers
See Also......................................................................................................................156 Gather the SYSVOL path information .................................................................156 To gather the system volume path information.............................................................157 Stop the File Replication service ........................................................................159 .......................160
Prepare a domain controller for nonauthoritative SYSVOL restart Import the SYSVOL folder structure Start the File Replication service Administering the Global Catalog
Introduction to Administering the Global Catalog ................................................165 Global Catalog Placement...........................................................................................165 Initial Global Catalog Replication.................................................................................165 Global Catalog Readiness...........................................................................................166 Global Catalog Removal..............................................................................................166 See Also......................................................................................................................167 Managing the Global Catalog Configuring a Global Catalog Server .............................................................................167 ..................................................................167 ......................168 ...............................169
Determine whether a domain controller is a global catalog server Designate a domain controller to be a global catalog server Monitor global catalog replication progress Determining Global Catalog Readiness
.........................................................169 ..............................................................170
Verify global catalog readiness ...........................................................................171 To verify global catalog readiness................................................................................171 Verify global catalog DNS registrations Removing the Global Catalog Clear the global catalog setting ...............................................................172
Monitor global catalog removal in Event Viewer Administering Operations Master Roles
Guidelines for Role Placement....................................................................................176 Guidelines for Role Transfer........................................................................................179 Managing Operations Master Roles Designating a standby operations master ...................................................................180 ...........................................................181 ......................182 .............................183 ............................184
Determine whether a domain controller is a global catalog server Create a connection object on the current operations master Create a connection object on the standby operations master
Verify successful replication to a domain controller .............................................184 See Also......................................................................................................................187 Transferring an operations master role ...............................................................187
Verify successful replication to a domain controller .............................................189 See Also......................................................................................................................192 Determine whether a domain controller is a global catalog server Install the Schema snap-in Transfer the schema master Transfer the domain naming master ......................192
Transfer the domain-level operations master roles View the current operations master role holders Seizing an operations master role
......................................................................197
Verify successful replication to a domain controller .............................................198 See Also......................................................................................................................201 Seize the operations master role ........................................................................201 .................................................203
Reducing the workload on the PDC emulator master .........................................204 Adjusting the Weight for DNS SRV Records in the Registry.........................................204 Adjusting the Priority for DNS SRV Records in the Registry.........................................205 Change the weight for DNS SRV records in the registry .....................................206
Change the priority for DNS SRV records in the registry Administering Active Directory Backup and Restore
.....................................207 ...........................................208
Introduction to Administering Active Directory Backup and Restore ....................208 System State Components..........................................................................................208 Purpose of Performing Regular Backups.....................................................................209 Restore Requirements and Recommendations............................................................210 Backup Guidelines.......................................................................................................210 Backup Frequency.......................................................................................................212 Backup Latency Interval..............................................................................................213 See Also......................................................................................................................214 Managing Active Directory Backup and Restore .................................................214
Backing Up Active Directory Components ..........................................................214 Naming Backup Files...................................................................................................214 See Also......................................................................................................................216 Back up system state .........................................................................................216 See Also......................................................................................................................219 Back up system state and the system disk .........................................................219 See Also......................................................................................................................220 Performing a Nonauthoritative Restore of a Domain Controller ...........................221 See Also......................................................................................................................222 Restart the domain controller in Directory Services Restore Mode locally ...........222 See Also......................................................................................................................223 Restart the domain controller in Directory Services Restore Mode Remotely ......223 See Also......................................................................................................................225 Restore from backup media ...............................................................................225 See Also......................................................................................................................226 Verify Active Directory restore .............................................................................227
Performing an Authoritative Restore of Active Directory Objects .........................227 Group Membership Restoration Following Authoritative Restore..................................228 Authoritative Restore Improvements in Windows Server 2003 SP1.............................229 Procedures for Domain Controllers Running Windows Server 2003 with SP1..............230 Procedures for Domain Controllers Running Windows Server 2003 with No Service Pack Installed...................................................................................................................231
Restore from backup media ...............................................................................233 See Also......................................................................................................................234 Mark the object or objects authoritative ..............................................................234
Synchronize replication with all partners .............................................................237 See Also......................................................................................................................238 Run an LDIF file to recover back-links ................................................................238 See Also......................................................................................................................238 Restart the domain controller in Directory Services Restore Mode locally ...........239 See Also......................................................................................................................239 Create an LDIF file for recovering back-links for authoritatively restored objects . 239 See Also......................................................................................................................240 Turn off inbound replication ................................................................................241 See Also......................................................................................................................241 Turn on inbound replication ................................................................................241 See Also......................................................................................................................242 Performing an Authoritative Restore of an Application Directory Partition ............242
Restore from backup media ...............................................................................243 See Also......................................................................................................................244 Mark the application directory partition as authoritative Performing an Authoritative Restore of a Group Policy Object Restore a Group Policy Object .......................................245 ............................246
...........................................................................247
Restoring a Domain Controller Through Reinstallation and Subsequent Restore from Backup ...........................................................................................................247 Restore from backup media ...............................................................................249 See Also......................................................................................................................251 Verify Active Directory restore .............................................................................251 .......................................252
Restoring a Domain Controller Through Reinstallation Clean up server metadata Delete a Server object from a site
..................................................................................253 ......................................................................256
Delete a Computer object from the Domain Controllers OU ................................257 See Also......................................................................................................................257 Verify DNS registration and functionality .............................................................258 ...........................................258 ..................................................259
Verify communication with other domain controllers Verify the availability of the operations masters Install Active Directory
........................................................................................260 ......................................................................262
Introduction to Administering Intersite Replication ...............................................262 The KCC and Replication Topology.............................................................................263 Managing Intersite Replication Adding a New Site ...........................................................................264
Create a subnet object or objects and associate them with the new site Associate an existing subnet object with the new site Create a site link object and add the appropriate sites Remove the site from the site link Linking Sites for Replication
.........................................266 ........................................267
Create a site link object and add the appropriate sites Determine the ISTG role owner for a site Generate the replication topology on the ISTG Changing Site Link Properties
............................................................269 ...................................................270
............................................................................271
Configure the site link schedule to identify times during which intersite replication can occur ....................................................................................................................................272 Configure the site link interval to identify how often replication polling can occur during the schedule window ............................................................................................272 Configure the site link cost to establish a priority for replication routing Determine the ISTG role owner for a site ...............273
............................................................274
...................................................274
Moving a Domain Controller to a Different Site ...................................................275 TCP/IP Settings...........................................................................................................275 Preferred Bridgehead Server Status............................................................................276 Change the static IP address of a domain controller Create a delegation for a domain controller ...........................................277
........................................................278 . .279
Verify that an IP address maps to a subnet and determine the site association Determine whether the server is a preferred bridgehead server Configure the server to not be a preferred bridgehead server Move the Server object to the new site Removing a Site
..........................280 .............................281
...............................................................282
.................................................................................................282 .........................................284
Determine whether a Server object has child objects Delete a Server object from a site Delete the Site Link object
Associate the subnet or subnets with the appropriate site Delete the Site object
Determine the ISTG role owner for a site Generate the replication topology on the ISTG Administering the Active Directory Database
Introduction to Administering the Active Directory Database Managing the Active Directory Database
............................................................290
Relocating Active Directory Database Files ........................................................291 Disk space requirements for relocating Active Directory database files........................292 Determine the database size and location online Determine the database size and location offline ................................................294 ................................................295 ...................296
Compare the size of the directory database files to the volume size
Back up system state .........................................................................................297 See Also......................................................................................................................300 Restart the domain controller in Directory Services Restore Mode locally ...........300 See Also......................................................................................................................300 Restart the domain controller in Directory Services Restore Mode Remotely ......301 See Also......................................................................................................................302 Move the directory database and log files to a local drive Copy the directory database and log files to a remote share ...................................303 ...............................306
Returning Unused Disk Space from the Active Directory Database to the File System ....................................................................................................................................308 Change the garbage collection logging level to 1 ................................................310
Back up system state .........................................................................................310 See Also......................................................................................................................313 Restart the domain controller in Directory Services Restore Mode locally ...........313 See Also......................................................................................................................314 Restart the domain controller in Directory Services Restore Mode Remotely ......314 See Also......................................................................................................................315 Compact the directory database file (offline defragmentation) .............................316 . 319
If database integrity check fails, perform semantic database analysis with fixup Administering Domain Controllers
......................................................................320
Introduction to Administering Domain Controllers ...............................................321 Installing and Removing Active Directory.....................................................................321 Renaming Domain Controllers.....................................................................................322 Adding Domain Controllers to Remote Sites................................................................322 Managing Domain Controllers ............................................................................323 Managing Antivirus Software on Domain Controllers....................................................324 Preparing for Active Directory Installation ...........................................................327 Configuring DNS.........................................................................................................328 Site Placement............................................................................................................328 Domain Connectivity....................................................................................................329
Verify that an IP address maps to a subnet and determine the site association Verify communication with other domain controllers Verify the availability of the operations masters Installing a Domain Controller in an Existing Domain Install Active Directory
........................................................................................336
Installing a Domain Controller in an Existing Domain Using Restored Backup Media ....................................................................................................................................337 See Also......................................................................................................................340 Back up system state .........................................................................................340 See Also......................................................................................................................343 Restore system state to an alternate location .....................................................343
Install Active Directory from restored backup media ...........................................344 See Also......................................................................................................................345 Include application directory partitions in an Active Directory installation from backup media ....................................................................................................................................346 Adding Domain Controllers in Remote Sites .......................................................347
Known Issues for Adding Domain Controllers in Remote Sites ...........................348 SYSVOL Replication....................................................................................................349 Using Backup Media to Install Active Directory in a Remote Site..................................349 Installing Domain Controllers Before Shipping Them to the Remote Site.....................353 See Also......................................................................................................................357 Best Practices for Adding Domain Controllers in Remote Sites ...........................357 Using Backup Media to Install Active Directory in the Remote Site...............................357 Installing Domain Controllers Prior to Shipping to the Remote Site..............................359 See Also......................................................................................................................362 Preparing a Server Computer for Shipping and Installation from Backup Media . 363 Restore the Backup to the Promotion Computer or Ship Removable Media.................364 Determine the Restore Volume....................................................................................365 Enable Remote Desktop..............................................................................................366
Create a Domain Controller Installation Answer File....................................................366 See Also......................................................................................................................369 Back up system state .........................................................................................369 See Also......................................................................................................................371 Restore system state to an alternate location Enable Remote Desktop .....................................................371
....................................................................................373
Create an answer file for domain controller installation .......................................374 See Also......................................................................................................................377 Create a Remote Desktop Connection ...............................................................377 See Also......................................................................................................................378 Install Active Directory from restored backup media ...........................................378 See Also......................................................................................................................379 Include application directory partitions in an Active Directory installation from backup media ....................................................................................................................................379 Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection ....................................................................................................................................380 See Also......................................................................................................................382 Determine the tombstone lifetime for the forest View the current operations master role holders Transfer the domain-level operations master roles Transfer the schema master Transfer the domain naming master ..................................................382 .................................................383 .............................................384
Prepare a domain controller for nonauthoritative SYSVOL restart Enable strict replication consistency
...................................................................389
Synchronize replication with all partners .............................................................390 See Also......................................................................................................................391 Verify successful replication to a domain controller .............................................392 See Also......................................................................................................................394 Reconnecting a Domain Controller After a Long-Term Disconnection .................394
Reconnecting an Outdated Domain Controller.............................................................395 Updating SYSVOL.......................................................................................................395 See Also......................................................................................................................397 Determine when intersite replication is scheduled to begin .................................397
Use Repadmin to remove lingering objects ........................................................398 See Also......................................................................................................................400 Verify successful replication to a domain controller .............................................400 See Also......................................................................................................................403 Performing an Unattended Installation of Active Directory ..................................403 See Also......................................................................................................................404 Create an answer file for domain controller installation .......................................404 See Also......................................................................................................................406 Install Active Directory using an answer file ........................................................406 See Also......................................................................................................................407 Verifying Active Directory Installation ..................................................................407 .........................................408 . .409
Verify that an IP address maps to a subnet and determine the site association Move the Server object to the new site Configure DNS server forwarders Verifying DNS configuration
...............................................................410 .......................................................................411
................................................................................411 ........................................................412
Create a delegation for a domain controller Create a secondary zone Configure the DNS client settings Check the status of the shared SYSVOL Verify DNS registration and functionality
Verify communication with other domain controllers Verify replication with other domain controllers Verify the availability of the operations masters
Verify domain membership for a new domain controller Renaming a Domain Controller
......................................419
..........................................................................420
Rename a domain controller using System Properties ........................................421 See Also......................................................................................................................421 Rename a domain controller using Netdom ........................................................422 See Also......................................................................................................................423 Update the FRS member object Decommissioning a Domain Controller .........................................................................424 ...............................................................424 .................................................426
View the current operations master role holders Transfer the schema master Transfer the domain naming master
Determine whether a domain controller is a global catalog server Verify DNS registration and functionality
Verify communication with other domain controllers Verify the availability of the operations masters Uninstall Active Directory
....................................................................................433 .........................................434
Determine whether a Server object has child objects Delete a Server object from a site
......................................................................435 ......................................................435
Forcing the Removal of a Domain Controller Identify replication partners Force domain controller removal Clean up server metadata
Additional Resources for Administering Active Directory Troubleshooting Active Directory Operations
......................................................442 .............................442
Configuration Tasks for Troubleshooting......................................................................443 Troubleshooting Active Directory Replication Problems ......................................446 Event and Tool Solution Recommendations.................................................................447 Ruling Out the Obvious................................................................................................447 Correct Response to Any Outdated Server Running Windows 2000 Server.................448 Root Causes................................................................................................................448 General Approach to Fixing Problems..........................................................................449 Monitoring Replication Health......................................................................................449 Attempting to Resolve Problems..................................................................................452 Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042) ......457 Tombstone Lifetime and Replication of Deletions.........................................................457 How Lingering Objects Occur......................................................................................458 Causes of Long Disconnections...................................................................................458 Indications That a Domain Controller Has Lingering Objects........................................459 Tool for Removing Lingering Objects...........................................................................462 See Also......................................................................................................................463 Event ID 1388 or 1988: A lingering object is detected .........................................463 Event ID 1388..............................................................................................................463 Event ID 1988..............................................................................................................464 Cause..........................................................................................................................465 Solution.......................................................................................................................465 A deleted account remains in the Address Book, e-mail is not received, or a duplicate account exists .................................................................................................470 Solution.......................................................................................................................471 Event ID 2042: It has been too long since this machine replicated ......................472 Solution.......................................................................................................................474 Fixing Replication Security Problems .................................................................476
An "Access denied" or other security error has caused replication problems ......477 Cause..........................................................................................................................477 Solution.......................................................................................................................477 Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088) ............480 Improvements to Domain Controller Name Resolution in SP1.....................................481 DNS Requirements for CNAME Lookup Success........................................................483 Event ID 1925: Attempt to establish a replication link failed due to DNS lookup problem ....................................................................................................................................484
Solution.......................................................................................................................485 Event ID 2087: DNS lookup failure caused replication to fail ...............................485 Cause..........................................................................................................................487 Solution.......................................................................................................................488 Event ID 2088: DNS lookup failure occurred with replication success .................500 Cause..........................................................................................................................502 Solution.......................................................................................................................502 Fixing Replication Connectivity Problems (Event ID 1925) ..................................502
Event ID 1925: Attempt to establish a replication link failed due to connectivity problem ....................................................................................................................................502 Cause..........................................................................................................................503 Solution.......................................................................................................................503 Fixing Replication Topology Problems (Event ID 1311) .......................................509
Event ID 1311: Replication configuration does not reflect the physical network ...509 Cause..........................................................................................................................510 Solution.......................................................................................................................511 Additional Resources for Troubleshooting Active Directory .................................517
Administering SYSVOL Administering the Global Catalog Administering Operations Master Roles Administering Active Directory Backup and Restore Administering Intersite Replication Administering the Active Directory Database Administering Domain Controllers Additional Resources for Administering Active Directory
Note You cannot install Active Directory on a server running Windows Server 2003, Web Edition, but you can join the server to an Active Directory domain as a member server. For more information about Windows Server 2003, Web Edition, see Overview of Windows Server 2003, Web Edition, on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=9253). Acknowledgments Key Technical Reviewers: Chris Macaulay, Nigel Cain, Arren Conner, Dmitry Dukat, Levon Esibov, Khushru Irani, Kamal Janardhan, Gregory Johnson, William Lees, Andreas Luther, Kevin Sims, Jeromy Statia, Eric Kool-Brown, J. K. Jaganathan, Mike Resnick, Michael Snyder, Nathan Muggli, Yi Zhao, Christopher Westpoint, Robert Powalka, Rob Kochman Microsoft Most Valuable Professional (MVP) Reviewers: Joseph Shook, Thomas Bittner, Nuo Yan, Al Mulnick, Tony Murray, Guido Grillenmeier, M. Rajesh, Todd Myrick
You want to manage common Active Directory problems that are associated with misconfiguration. You want to configure Active Directory to increase network availability.
This guide assumes a basic understanding of what Active Directory is, how it works, and why your organization uses it to access, manage, and secure shared resources across your network. You should also have a thorough understanding of how Active Directory is deployed and managed in your organization. This includes an understanding of the mechanism your organization uses to configure and manage Active Directory settings. This guide can be used by organizations that have deployed Windows Server 2003 and Windows Server 2003 with Service Pack 1 (SP1). It includes information that is relevant to different roles within an IT organization, including IT operations management and administrators. It contains high-level information that is required to plan an Active Directory operations environment. This information provides management-level knowledge of Active Directory and the IT processes required to operate it. In addition, this guide contains more detailed procedures that are designed for operators who have varied levels of expertise and experience. Although the procedures provide operator guidance from start to finish, operators must have a basic proficiency with the Microsoft Management Console (MMC) and snap-ins and know how to start administrative programs and access the command line. If operators are not familiar with Active Directory, it might be necessary for IT planners or IT managers to review the relevant operations in this guide and provide the operators with parameters or data that must be entered when the operation is performed.
If you are an IT manager who will be delegating tasks to operators within your organization, you will want to:
Read through the objectives and tasks to determine how to delegate permissions and whether you need to install tools before operators perform the procedures for each task. Before assigning tasks to individual operators, ensure that you have all the tools installed where operators can use them. When necessary, create tear sheets for each task that operators perform within your organization. Cut and paste the task and its related procedures into a separate document and then either print these documents or store them online, depending on the preference of your organization.
New Content
August 2005: Performing an Authoritative Restore of Active Directory Objects contains new procedures for regenerating the group memberships of restored user objects and group objects. This functionality is available in the version of Ntdsutil.exe that is included with Windows Server 2003 with Service Pack 1 (SP1). February 2006: Enable Remote Desktop contains a new procedure to enable Remote Desktop remotely by using the registry. February 2006: Known Issues for Adding Domain Controllers in Remote Sites contains the additional information that moving the Ntds.dit file takes less time than copying the file when you restore a system state backup.
Updated Content
April 2006: Performing an Authoritative Restore of Active Directory Objects contains corrected information about the details of updating back-link attributes.
Acknowledgements Produced by: Microsoft Windows Server Security and Directory Services User Assistance team Project Writer: Nick Pierson Project Editor: Jim Becker
When a trust exists between two domains, the authentication mechanisms for each domain trust the authentications coming from the other domain. Trusts help to provide controlled access to shared resources in a resource domain (the trusting domain) by verifying that incoming authentication requests come from a trusted authority (the trusted domain). In this way, trusts act as bridges that allow only validated authentication requests to travel between domains. How a specific trust passes authentication requests depends on how it is configured. Trust relationships can be one-way, providing access from the trusted domain to resources in the trusting domain, or two-way, providing access from each domain to resources in the other domain. Trusts are also either nontransitive, in which case a trust exists only between the two trust partner domains, or transitive, in which case a trust automatically extends to any other domains that either of the partners trusts. In some cases, trust relationships are established automatically when domains are created; in other cases, administrators must choose a type of trust and explicitly establish the appropriate relationships. The specific types of trusts that are used and the structure of the resulting trust relationships in a given trust implementation depend on such factors as how Active Directory is organized and whether different versions of Windows coexist on the network.
Perform regular backups of domain controllers to preserve all trust relationships within a particular domain. For more information, see Back up system state.
Both sides of the trust: When you create external trusts, shortcut trusts, or forest trusts, you have the option to create each side of the trust separately or both sides of the trust simultaneously. If you choose to create each side of the trust separately, you must run the New Trust Wizard twice once for each domain. When you create trusts separately, you must supply the same trust password for each domain. As a security best practice, all trust passwords should be strong passwords. Domain-wide authentication: An authentication setting that permits unrestricted access by any users in the specified domain to all available shared resources that are located in the local domain. This is the default authentication setting for external trusts. Forest-wide authentication: An authentication setting that permits unrestricted access by any users in the specified forest to all available shared resources that are located in any of the domains in the local forest. This is the default authentication setting for forest trusts. Selective authentication: An authentication setting that restricts access over an external trust or forest trust to only those users in a specified domain or specified forest who have been explicitly given authentication permissions to computer objects (resource computers) that reside in the local domain or the local forest. This authentication setting must be enabled manually. Trust password: An option in which both domains in a trust relationship share a password, which is stored in the trusted domain object (TDO) object in Active Directory. When you choose this option, a strong trust password is generated automatically for you. You must use the same password when you create a trust relationship in the specified domain. If you choose to create both sides of the trust simultaneously, you run the New Trust Wizard once.
and the Enterprise Admins group can create trusts. However, any user who is a member of the Incoming Forest Trust Builders group can create one-way, incoming forest trusts to your forest. For more information about the Incoming Forest Trust Builders group, see "How Domain and Forest Trusts Work" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35356). When you are logged on locally to a domain controller and you try to create a new trust by using Active Directory Domains and Trusts, the operation may be unsuccessful and you may receive the message Access denied. This issue occurs only if you are logged on locally to the domain controller as an ordinary user (meaning that the user is not logged on as Administrator or as a member of any administrative groups for the domain). By default, ordinary users are blocked from logging on locally to a domain controller unless Group Policy is modified to permit this. When you use Active Directory Domains and Trusts to create a trust, you may receive the message Operation failed. Parameter incorrect. This issue may occur if you try to establish a trust relationship when the source domain and the target domain have one or more of the following identifiers that are the same: Security identifier (SID) Domain Name System (DNS) name Network basic input/output system (NetBIOS) name
To resolve this issue, do one of the following before you try to create the trust, as appropriate to your situation: Rename the conflicting identifier. Use a fully qualified domain name (FQDN) if there is a NetBIOS conflict.
The option to create a forest trust does not appear in the New Trust Wizard. This issue typically occurs when one or both of the Windows Server 2003 forests are not set to the Windows Server 2003 forest functional level. For more information about forest functional levels, see Active Directory Functional Levels Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41698). There are restrictions in the number and types of trusts that can be created when you target a Microsoft Windows Small Business Server 2003 domain.
For more information about how to use the Netdom command-line tool to create an external trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/? LinkId=41700). Note If you have the appropriate administrative credentials for each domain, you can create both sides of an external trust at the same time. To create both sides of the trust, simultaneously, follow the appropriate procedure below that contains the words both sides of the trust in the procedure title. For example, the procedure Create a one-way, incoming, external trust for both sides of the trust provides the steps to follow when you have the administrative credentials for both domains and you want to use the New Trust Wizard to create an incoming, external trust in one
operation. For more information about how the both sides of the trust option works, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. You can create an external trust by using any of the following procedures, depending on the requirements of your organization and the administrative credentials that you have when you create the trust: Create a one-way, incoming, external trust for one side of the trust Create a one-way, incoming, external trust for both sides of the trust Create a one-way, outgoing, external trust for one side of the trust Create a one-way, outgoing, external trust for both sides of the trust Create a two-way, external trust for one side of the trust Create a two-way, external trust for both sides of the trust
Create a one-way, incoming, external trust for one side of the trust
This procedure creates one side of a one-way, incoming, external trust. Although one side of a trust will be created successfully, the new trust will not function until the administrator for the reciprocal domain uses his or her credentials to create the second side of the trust. If you have administrative credentials for both domains that are involved in the trust, you can use the procedure Create a one-way, incoming, external trust for both sides of the trust to create both sides of the trust in one simultaneous operation. A one-way, incoming, external trust allows users in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to access resources in another Active Directory domain (outside your forest) or in a Windows NT 4.0 domain. For example, if you are the administrator of sales.wingtiptoys.com and users in that domain need to access resources in the marketing.tailspintoys.com domain (which is located in another forest), you can use this procedure (in conjunction with another procedure, which is executed by the administrator in the other forest) to establish one side of the relationship so that users in your domain can access resources in the marketing.tailspintoys.com domain. You can create this external trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create an external trust, see
"Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, incoming, external trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: incoming, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next. With the administrator of the other domain, agree on a secure channel password to be used in establishing the trust. 9. On the Trust Selections Completepage, review the results, and then click Next. 10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the
incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 12. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the domain administrator for the specified domain or specified forest must follow the procedure Create a one-way, outgoing, external trust for one side of the trust, using his or her administrative credentials and the exact same trust password that was used during this procedure.
Create a one-way, incoming, external trust for both sides of the trust
This procedure creates both sides of a one-way, incoming, external trust, and it requires you to have administrative credentials for your domain as well for the reciprocal domain. If you have administrative credentials only for your domain, you can use the procedure Create a one-way, incoming, external trust for one side of the trust to create your side of the trust. Then, have the administrator for the reciprocal domain create a one-way, outgoing, external trust from his or her domain. A one-way, incoming, external trust allows users in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to access resources in another Active Directory domain (outside your forest) or in a Windows NT 4.0 domain. For example, if you are the administrator of sales.wingtiptoys.com and users in that domain need to access resources in the marketing.tailspintoys.com domain (which is located in another forest) you can use this procedure to establish a relationship so that users in your domain can access resources in the marketing.tailspintoys.com domain. You can create this external trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create an external trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory.
To create a one-way, incoming, external trust for both sides of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: incoming, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Outgoing Trust Authentication Level--Specified Domain page, do one of the following, and then click Next: Click Domain-wide authentication. Click Selective authentication.
10. On the Trust Selections Complete page, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified
domain. 13. On the Completing the New Trust Wizard page, click Finish.
Create a one-way, outgoing, external trust for one side of the trust
This procedure creates one side of a one-way, outgoing, external trust. Although one side of a trust will be created successfully, the new trust will not function until the administrator for the reciprocal domain uses his or her credentials to create the second side of the trust. If you have administrative credentials for both domains that are involved in the trust, you can use the procedure Create a one-way, outgoing, external trust for both sides of the trust to create both sides of the trust in one simultaneous operation. A one-way, outgoing, external trust will allow resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed by users in a different Active Directory domain (outside your forest) or in a Windows NT 4.0 domain. For example, if you are the administrator of sales.wingtiptoys.com and you have resources in that domain that need to be accessed by users in the marketing.tailspintoys.com domain (which is located in another forest), you can use this procedure to establish one side of the relationship so that users in the marketing.tailspintoys.com domain can access the resources in sales.wingtiptoys.com. You can create this external trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create an external trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, outgoing, external trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties.
3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: outgoing, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Outgoing Trust Authentication Level page, do one of the following, and then click Next: Click Domain-wide authentication. Click Selective authentication.
9. On the Trust Password page, type the trust password twice, and then click Next. 10. On the Trust Selections Completepage, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 13. On the Completing the New Trust Wizard page, click Finish.
Note For this trust to function, the domain administrator for the specified domain or specified forest must follow the procedure Create a one-way, incoming, external trust for one side of the trust, using his or her administrative credentials and the exact same trust passwordthat was used during this procedure.
Create a one-way, outgoing, external trust for both sides of the trust
This procedure creates both sides of a one-way, outgoing, external trust, and it requires you to have administrative credentials for your domain as well as for the reciprocal domain. If you have administrative credentials only for your domain, you can use the procedure Create a one-way, outgoing, external trust for one side of the trust to create your side of the trust. Then, have the administrator for the reciprocal domain create a one-way, incoming, external trust from his or her domain. A one-way, outgoing, external trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed by users in a different Active Directory domain (outside your forest) or in a Windows NT 4.0 domain. For example, if you are the administrator of sales.wingtiptoys.com and you have resources in that domain that need to be accessed by users in the marketing.tailspintoys.com domain (which is located in another forest), you can use this procedure to establish one side of the relationship so that users in the marketing.tailspintoys.com domain can access the resources in sales.wingtiptoys.com. You can create this external trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create an external trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, outgoing, external trust for both sides of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust
with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: outgoing, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Outgoing Trust Authentication Level--Local Domain page, do one of the following, and then click Next: Click Domain-wide authentication. Click Selective authentication.
10. On the Trust Selections Complete page, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain.
13. On the Completing the New Trust Wizard page, click Finish.
6. On the Direction of Trust page, click Two-way, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Outgoing Trust Authentication Level page, do one of the following, and then click Next: Click Domain-wide authentication. Click Selective authentication.
9. On the Trust Password page, type the trust password twice, and then click Next. 10. On the Trust Selections Completepage, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 13. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 14. On the Completing the New Trust Wizard page, click Finish.
Note For this trust to function, the domain administrator for the specified domain or specified forest must follow this same procedure, using his or her administrative credentials and the exact same trust password that was used during this procedure.
Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click Two-way, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Outgoing Trust Authentication Level--Local Domain page, do one of the following, and then click Next: Click Domain-wide authentication. Click Selective authentication.
10. On the Outgoing Trust Authentication Level--Specified Domain page, do one of the following, and then click Next: Click Domain-wide authentication. Click Selective authentication.
11. On the Trust Selections Complete page, review the results, and then click Next. 12. On the Trust Creation Complete page, review the results, and then click Next. 13. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 14. On the Confirm Incoming Trust page, do one of the following:
If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 15. On the Completing the New Trust Wizard page, click Finish.
For more information about how to use the Netdom command-line tool to create a shortcut trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Note If you have the appropriate administrative credentials for each domain, you can create both sides of a shortcut trust at the same time. To create both sides of the trust, follow the appropriate procedure below that contains the words for both sides of the trust in the title. For example, the procedure Create a one-way, incoming, shortcut trust for both sides of the trust explains how to configure both sides of a shortcut trust. For more information about how the both sides of the
trust option works, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. You can create a shortcut trust by using any of the following procedures, depending on the requirements of your organization and the administrative credentials that you have when you create the trust: Create a one-way, incoming, shortcut trust for one side of the trust Create a one-way, incoming, shortcut trust for both sides of the trust Create a one-way, outgoing, shortcut trust for one side of the trust Create a one-way, outgoing, shortcut trust for both sides of the trust Create a two-way, shortcut trust for one side of the trust Create a two-way, shortcut trust for both sides of the trust
Create a one-way, incoming, shortcut trust for one side of the trust
This procedure creates one side of a one-way, incoming, shortcut trust. Although one side of a trust will be created successfully, the new trust will not function until the administrator for the reciprocal domain uses his or her credentials to create the second side of the trust. If you have administrative credentials for both domains that are involved in the trust, you can use the procedure Create a one-way, incoming, shortcut trust for both sides of the trust to create both sides in one simultaneous operation. A one-way, incoming, shortcut trust allows users in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to more quickly access resources in another domain (which is nested within another domain tree) in your forest. For example, if you are the administrator of sales.wingtiptoys.com and users in that domain need to access resources in the marketing.tailspintoys.com domain (which is a child domain of the tailspintoys.com tree root domain), you can use this procedure to establish one side of the relationship so that users in your domain can more quickly access resources in the marketing.tailspintoys.com domain. You can create this shortcut trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a shortcut trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700).
Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, incoming, shortcut trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: incoming, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next. 9. On the Trust Selections Complete page, review the results, and then click Next. 10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain.
12. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the domain administrator for the specified domain or specified forest must follow the procedure Create a one-way, outgoing, shortcut trust for one side of the trust, using his or her administrative credentials and the exact same trust password that was used during this procedure.
Create a one-way, incoming, shortcut trust for both sides of the trust
This procedure creates both sides of a one-way, incoming, shortcut trust, and it requires you to have administrative credentials for your domain as well for the reciprocal domain. If you have administrative credentials only for your domain, you can use the procedure Create a one-way, incoming, shortcut trust for one side of the trust to create your side of the trust. Then, have the administrator for the reciprocal domain create a one-way, outgoing, shortcut trust from his or her domain. A one-way, incoming, shortcut trust allows users in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to more quickly access resources in another domain (which is nested within another domain tree) in your forest. For example, if you are the administrator of sales.wingtiptoys.com and users in that domain need to access resources in the marketing.tailspintoys.com domain (which is a child domain of the tailspintoys.com tree root domain), you can use this procedure to establish one side of the relationship so that users in your domain can more quickly access resources in the marketing.tailspintoys.com domain. You can create this shortcut trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a shortcut trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, incoming, shortcut trust for both sides of the trust 1. Open Active Directory Domains and Trusts.
2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: incoming, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Trust Selections Complete page, review the results, and then click Next. 10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 12. On the Completing the New Trust Wizard page, click Finish.
Create a one-way, outgoing, shortcut trust for one side of the trust
This procedure creates one side of a one-way, outgoing, shortcut trust. Although one side of a trust will be created successfully, the new trust will not function until the administrator for the reciprocal domain uses his or her credentials to create the second side of the trust. If you have administrative credentials for both domains that are involved in the trust, you can use the procedure Create a one-way, outgoing, shortcut trust for both sides of the trust to create both sides of the trust in one simultaneous operation. A one-way, outgoing, shortcut trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest. For example, if you are the administrator of marketing.tailspintoys.com and resources in that domain need to be accessed by users in the sales.wingtiptoys.com domain (which is a child domain of the wingtiptoys.com tree root domain), you can use this procedure to establish one side of the relationship so that users in the sales.wingtiptoys.com domain can more quickly access resources in the marketing.tailspintoys.com domain. You can create this shortcut trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a shortcut trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, outgoing, shortcut trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next.
5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: outgoing, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next. 9. On the Trust Selections Complete page, review the results, and then click Next. 10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 12. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the domain administrator for the specified domain or specified forest must follow the procedure Create a one-way, incoming, shortcut trust for one side of the trust, using his or her administrative credentials and the exact same trust password that was used during this procedure.
Create a one-way, outgoing, shortcut trust for both sides of the trust
This procedure creates both sides of a one-way, outgoing, shortcut trust, and it requires that you have administrative credentials for your domain as well as for the reciprocal domain. If you have administrative credentials only for your domain, you can use the procedure Create a one-way, outgoing, shortcut trust for one side of the trust to create your side of the trust. Then, have the administrator for the reciprocal domain create a one-way, incoming, shortcut trust from his or her domain. A one-way, outgoing, shortcut trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest. For example, if you are the administrator of marketing.tailspintoys.com and resources in that domain need to be accessed by users in the sales.wingtiptoys.com domain (which is a child domain of the wingtiptoys.com tree root domain), you can use this procedure to establish one side of the relationship so that users in the sales.wingtiptoys.com domain can more quickly access resources in the marketing.tailspintoys.com domain. You can create this shortcut trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a shortcut trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, outgoing, shortcut trust for both sides of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next.
5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click One-way: outgoing, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Trust Selections Complete page, review the results, and then click Next. 10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 12. On the Completing the New Trust Wizard page, click Finish.
have administrative credentials for both domains that are involved in the trust, you can use the procedure Create a two-way, shortcut trust for both sides of the trust to create both sides of the trust in one simultaneous operation. A two-way, shortcut trust allows users in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) and users in the reciprocal domain to more quickly access resources in either domain (when both domains are separated by a domain tree) in your forest. You can create this shortcut trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a shortcut trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a two-way, shortcut trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click Two-way, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next.
9. On the Trust Selections Completepage, review the results, and then click Next. 10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 12. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 13. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the domain administrator for the specified domain must follow this same procedure using his or her administrative credentials and the exact same trust passwordthat was used during this procedure.
A two-way, shortcut trust allows users in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) and users in the reciprocal domain to more quickly access resources in either domain (when both domains are separated by a domain tree) in your forest. You can create this shortcut trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a shortcut trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a two-way, shortcut trust for both sides of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click External trust, and then click Next. 6. On the Direction of Trust page, click Two-way, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Trust Selections Completepage, review the results, and then click Next.
10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 12. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 13. On the Completing the New Trust Wizard page, click Finish.
To create a forest trust, you must set the forest functional level for both of the Windows Server 2003 forests that are involved in the trust relationship to Windows Server 2003. For more information about functional levels, see Active Directory Functional Levels Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41698). To create a forest trust successfully, you must set up your Domain Name System (DNS) environment properly. If there is a root DNS server that you can make the root DNS server for the DNS namespaces of both forests, make it the root server by ensuring that the root zone contains delegations for each of the DNS namespaces. Also, update the root hints of all DNS servers with the new root DNS server. If there is no shared root DNS server and the root DNS servers for each forest DNS namespace are running a member of the Windows Server 2003 family, configure DNS conditional forwarders in each DNS namespace to route queries for names in the other namespace. If there is no shared root DNS server and the root DNS servers for each forest DNS namespace are not running a member of the Windows Server 2003 family, configure DNS secondary zones in each DNS namespace to route queries for names in the other namespace. For more information about configuring DNS to work with Active Directory, see DNS Support for Active Directory Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41699). You can use either of the following tools to perform the procedures for this task: Active Directory Domains and Trusts Netdom.exe
For more information about how to use the Netdom command-line tool to create a forest trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Note If you have the appropriate administrative credentials for each forest, you can create both sides of a forest trust at the same time. To create both sides of the forest trust, follow the appropriate procedure below that contains the words for both sides of the trust in the title. For example, the procedure Create a one-way, incoming, forest trust for both sides of the trust explains how to configure both sides of the trust. For more information about how the both sides of the trust option works, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages.
You can create a forest trust by using any one of the following procedures, depending on the requirements of your organization and the administrative credentials that you have when you create the trust: Create a one-way, incoming, forest trust for one side of the trust Create a one-way, incoming, forest trust for both sides of the trust Create a one-way, outgoing, forest trust for one side of the trust Create a one-way, outgoing, forest trust for both sides of the trust Create a two-way, forest trust for one side of the trust Create a two-way, forest trust for both sides of the trust
Create a one-way, incoming, forest trust for one side of the trust
This procedure creates one side of a one-way, incoming, forest trust. Although one side of a trust will be created successfully, the new trust will not function until the administrator for the reciprocal forest uses his or her credentials to create the second side of the trust. If you have administrative credentials for both forests that are involved in the trust, you can use the procedure Create a one-way, incoming, forest trust for both sides of the trust to create both sides of the trust in one simultaneous operation. A one-way, incoming, forest trust allows users in your Windows Server 2003 forest (the forest that you are logged on to at the time that you run the New Trust Wizard) to access resources in another Windows Server 2003 forest. For example, if you are the administrator of the wingtiptoys.com forest and users in that forest need to access resources in the tailspintoys.com forest, you can use this procedure to establish one side of the relationship so that users in your forest can access resources in any of the domains that make up the tailspintoys.com forest. You can create this forest trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a forest trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group (in the forest root domain) or the Enterprise Admins group in Active Directory. If you are a member
of the Incoming Forest Trust Builders group, you can create one-way, incoming, forest trusts to your forest. For more information about the Incoming Forest Trust Builders group, see "How Domain and Forest Trusts Work" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35356). To create a one-way, incoming, forest trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Forest trust, and then click Next. 6. On the Direction of Trust page, click One-way: incoming, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next. 9. On the Trust Selections Complete page, review the results, and then click Next. 10. On the Trust Creation Complete page, review the results, and then click Next. 11. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain.
12. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the domain administrator for the specified domain (the forest root domain in the specified forest) must complete the procedure Create a one-way, outgoing, forest trust for one side of the trust, using their administrative credentials and the exact same trust passwordthat was used during this procedure.
Create a one-way, incoming, forest trust for both sides of the trust
This procedure creates both sides of a one-way, incoming, forest trust, and it requires you to have administrative credentials for your forest as well as for the reciprocal forest. If you have administrative credentials only for your forest, you can use the procedure Create a one-way, incoming, forest trust for one side of the trust to create your side of the trust. Then, have the administrator for the reciprocal forest create a one-way, outgoing forest trust from his or her domain. A one-way, incoming, forest trust allows users in your Windows Server 2003 forest (the forest that you are logged on to at the time that you run the New Trust Wizard) to access resources in another Windows Server 2003 forest. For example, if you are the administrator of the wingtiptoys.com forest and users in that forest need to access resources in the tailspintoys.com forest, you can use this procedure to establish one side of the relationship so that users in your forest can access resources in any of the domains that make up the tailspintoys.com forest. You can create this forest trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a forest trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group (in the forest root domain) or the Enterprise Admins group in Active Directory. If you are a member of the Incoming Forest Trust Builders group, you can create one-way, incoming, forest trusts to your forest. For more information about the Incoming Forest Trust Builders group,
see "How Domain and Forest Trusts Work" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35356). To create a one-way, incoming, forest trust for both sides of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Forest trust, and then click Next. 6. On the Direction of Trust page, click One-way: incoming, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Outgoing Trust Authentication Level--Specified Forest page, do one of the following, and then click Next: Click Forest-wide authentication. Click Selective authentication.
10. On the Trust Selections Complete page, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the
incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 13. On the Completing the New Trust Wizard page, click Finish.
Create a one-way, outgoing, forest trust for one side of the trust
This procedure creates one side of a one-way, outgoing, forest trust. Although one side of a trust will be created successfully, the new trust will not function until the administrator for the reciprocal forest uses his or her credentials to create the second side of the trust. If you have administrative credentials for both forests that are involved in the trust, you can use the procedure Create a one-way, outgoing, forest trust for both sides of the trust to create both sides of the trust in one simultaneous operation. A one-way, outgoing, forest trust allows resources in your Windows Server 2003 forest (the forest that you are logged on to at the time that you run the New Trust Wizard) to be accessed by users in another Windows Server 2003 forest. For example, if you are the administrator of the wingtiptoys.com forest and resources in that forest need to be accessed by users in the tailspintoys.com forest, you can use this procedure to establish one side of the relationship so that users in the tailspintoys.com forest can access resources in any of the domains that make up the wingtiptoys.com forest. You can create this forest trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a forest trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group (in the forest root domain) or the Enterprise Admins group in Active Directory. If you are a member of the Incoming Forest Trust Builders group, you can create one-way, incoming, forest trusts to your forest. For more information about the Incoming Forest Trust Builders group, see "How Domain and Forest Trusts Work" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35356).
To create a one-way, outgoing, forest trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Forest trust, and then click Next. 6. On the Direction of Trust page, click One-way: outgoing, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Outgoing Trust Authentication Level page, do one of the following, and then click Next: Click Forest-wide authentication. Click Selective authentication.
9. On the Trust Password page, type the trust password twice, and then click Next. 10. On the Trust Selections Complete page, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust,
and then supply the appropriate administrative credentials from the specified domain. 13. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the domain administrator for the specified domain (the forest root domain in the specified forest) must follow the procedure Create a oneway, incoming, forest trust for one side of the trust, using his or her administrative credentials and the exact same trust password that was used during this procedure.
Create a one-way, outgoing, forest trust for both sides of the trust
This procedure creates both sides of a one-way, outgoing, forest trust, and it requires you to have administrative credentials for your forest as well as for the reciprocal forest. If you have administrative credentials only for your domain, you can use the procedure Create a one-way, outgoing, forest trust for one side of the trust to create your side of the trust. Then, have the administrator for the reciprocal forest create a one-way, incoming, external trust from his or her forest. A one-way, outgoing, forest trust allows resources in your Windows Server 2003 forest (the forest that you are logged on to at the time that you run the New Trust Wizard) to be accessed by users in another Windows Server 2003 forest. For example, if you are the administrator of the wingtiptoys.com forest and resources in that forest need to be accessed by users in the tailspintoys.com forest, you can use this procedure to establish one side of the relationship so that users in the tailspintoys.com forest can access resources in any of the domains that make up the wingtiptoys.com forest. You can create this forest trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a forest trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group (in the forest root domain) or the Enterprise Admins group in Active Directory. If you are a member of the Incoming Forest Trust Builders group, you can create one-way, incoming, forest
trusts to your forest. For more information about the Incoming Forest Trust Builders group, see "How Domain and Forest Trusts Work" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35356). To create a one-way, outgoing, forest trust for both sides of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Forest trust, and then click Next. 6. On the Direction of Trust page, click One-way: outgoing, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Outgoing Trust Authentication Level--Local Forest page, do one of the following, and then click Next: Click Forest-wide authentication. Click Selective authentication.
10. On the Trust Selections Completepage, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Outgoing Trust page, do one of the following:
If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 13. On the Completing the New Trust Wizard page, click Finish.
To create a two-way, forest trust for one side of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Forest trust, and then click Next. 6. On the Direction of Trust page, click Two-way, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click This domain only, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the Outgoing Trust Authentication Level page, do one of the following, and then click Next: Click Forest-wide authentication. Click Selective authentication.
9. On the Trust Password page, type the trust password twice, and then click Next. 10. On the Trust Selections Completepage, review the results, and then click Next. 11. On the Trust Creation Complete page, review the results, and then click Next. 12. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified
domain. 13. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 14. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the domain administrator in the specified forest must follow this same procedure, using his or her administrative credentials and the exact same trust passwordthat was used during this procedure.
trusts to your forest. For more information about the Incoming Forest Trust Builders group, see "How Domain and Forest Trusts Work" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35356). To create a two-way, forest trust for both sides of the trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Forest trust, and then click Next. 6. On the Direction of Trust page, click Two-way, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 7. On the Sides of Trust page, click Both this domain and the specified domain, and then click Next. For more information about the selections that are available on the Sides of Trust page, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. 8. On the User Name and Password page, type the user name and password for the appropriate administrator in the specified domain. 9. On the Outgoing Trust Authentication Level--Local Forest page, do one of the following, and then click Next: Click Forest-wide authentication. Click Selective authentication.
10. On the Outgoing Trust Authentication Level--Specified Forest page, do one of the following, and then click Next: Click Forest-wide authentication. Click Selective authentication.
11. On the Trust Selections Complete page, review the results, and then click Next.
12. On the Trust Creation Complete page, review the results, and then click Next. 13. On the Confirm Outgoing Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users. If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain. 14. On the Confirm Incoming Trust page, do one of the following: If you do not want to confirm this trust, click No, do not confirm the incoming trust. If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain. 15. On the Completing the New Trust Wizard page, click Finish.
For more information about how to use the Netdom command-line tool to create a realm trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Note The New Trust Wizard in Active Directory Domains and Trusts does not support the creation of both sides of a realm trust at the same time. For more information about how the both sides of the trust option works, see the section "Sides of Trust" in Appendix: New Trust Wizard Pages. You can create a realm trust by using any of the following procedures, depending on the requirements of your organization and the administrative credentials that you have when you create the trust: Create a one-way, incoming, realm trust Create a one-way, outgoing, realm trust Create a two-way, realm trust
2. In the console tree, right-click the domain node for the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Realm trust, and then click Next. 6. On the Transitivity of Trust page, do one of the following: To form a trust relationship with the domain and the specified realm only, click Nontransitive, and then click Next. To form a trust relationship with the domain and the specified realm and all trusted realms, click Transitive, and then click Next. 7. On the Direction of Trust page, click One-way: incoming, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next. 9. On the Trust Selections Complete page, review the results, and then click Next. 10. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the administrator of the realm must complete the trust, using his or her administrative credentials and the exact same trust password that was used during this procedure.
in the Kerberos realm, you can use this procedure to establish a relationship so that users in the Kerberos realm can access resources in the sales.wingtiptoys.com domain. You can create this realm trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a realm trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To create a one-way, outgoing, realm trust 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that you want to establish a trust with, and then click Properties. 3. On the Trusts tab, click New Trust, and then click Next. 4. On the Trust Name page, type the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the domain, and then click Next. 5. On the Trust Type page, click Realm trust, and then click Next. 6. On the Transitivity of Trust page, do one of the following: To form a trust relationship with the domain and the specified realm only, click Nontransitive, and then click Next. To form a trust relationship with the domain and the specified realm and all trusted realms, click Transitive, and then click Next. 7. On the Direction of Trust page, click One-way: outgoing, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next. 9. On the Trust Selections Complete page, review the results, and then click Next.
10. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the administrator of the realm must complete the trust, using his or her administrative credentials and the exact same trust password that was used during this procedure.
trusted realms, click Transitive, and then click Next. 7. On the Direction of Trust page, click Two-way, and then click Next. For more information about the selections that are available on the Direction of Trust page, see the section "Direction of Trust" in Appendix: New Trust Wizard Pages. 8. On the Trust Password page, type the trust password twice, and then click Next. 9. On the Trust Selections Complete page, review the results, and then click Next. 10. On the Completing the New Trust Wizard page, click Finish. Note For this trust to function, the administrator of the realm must complete the trust, using his or her administrative credentials and the exact same trust password that was used during this procedure.
You can use either of the following tools to perform the procedures for this task: Active Directory Domains and Trusts Netdom.exe
For more information about how to use the Netdom command-line tool to create a realm trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). To complete this task, perform the following procedures: Validate a trust Remove a manually created trust
Validate a trust
You can validate all trusts that are made between domains, but you cannot validate realm trusts. You can validate a trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to create a realm trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To complete this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory.
To validate a trust
Using the Windows interface Using the command line
Using the Windows interface 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that contains the trust that you want
to validate, and then click Properties. 3. On the Trusts tab, under either Domains trusted by this domain (outgoing trusts) or Domains that trust this domain (incoming trusts), click the trust to be validated, and then click Properties. 4. Click Validate. 5. Do one of the following, and then click OK: Click No, do not validate the incoming trust.
If you click this option, it is recommended that you repeat this procedure for the reciprocal domain. Click Yes, validate the incoming trust.
If you click this option, you must type a user account and password with administrative credentials for the reciprocal domain.
Using the command line 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: netdom trust TrustingDomainName /d:TrustedDomainName /verify
Term TrustingDomainName
Definition Specifies the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the trusting domain in the trust that is being created. Specifies the DNS name (or NetBIOS name) of the domain that will be trusted in the trust that is being created.
TrustedDomainName
Using the Windows interface 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click the domain that contains the trust that you want to remove, and then click Properties. 3. Click the Trusts tab. 4. In either Domains trusted by this domain (outgoing trusts) or Domains that trust this domain (incoming trusts), click the trust to be removed, and then click Remove.
5. Do one of the following, and then click OK: Click No, remove the trust from the local domain only.
If you click this option, it is recommended that you repeat this procedure for the reciprocal domain. Click Yes, remove the trust from both the local domain and the other domain. If you click this option, you must type a user account and password with administrative credentials for the reciprocal domain.
Using the command line 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: netdom trust TrustingDomainName /d:TrustedDomainName /remove/UserD:User /PasswordD:*
Term TrustingDomainName
Definition Specifies the Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the trusting domain in the trust that is being created. Specifies the DNS name (or NetBIOS name) of the domain that will be trusted in the trust that is being created.
TrustedDomainName
Note If you are using Netdom to remove a realm trust, you must add the /force option to the end of the command (after /remove) to remove the trust successfully.
For more information about how to use the Netdom command-line tool to create a realm trust, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). To complete this task, perform any of the following procedures: Modify the routing status of a name suffix Enable or disable an existing name suffix for routing Exclude name suffixes from routing to local forests
See Also
To enable a name suffix, click the suffix that you want to enable, and then click Enable. If the Enable button is unavailable, the name suffix is already enabled. To disable a name suffix, click the suffix that you want to disable, and then click Disable. If the Disable button is unavailable, the name suffix is already disabled.
See Also
3. On the Trusts tab, under either Domains trusted by this domain (outgoing trusts) or Domains that trust this domain (incoming trusts), click the forest trust that you want to administer, and then click Properties. 4. On the Name Suffix Routing tab, under Name suffixes in the x.x forest, click the unique name suffix to exclude from routing, and then click Edit. 5. In Name suffixes to exclude from routing to x.x, click Add, type a DNS name suffix that is subordinate to the unique name suffix, and then click OK.
See Also
For more information about how the security settings for domain and forest trusts work, see "Security Considerations for Trusts" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35413).
automatically enables SID filtering on all external trusts and forest trusts that are created by a Windows Server 2003 domain controller. External trusts that are created using domain controllers running Windows 2000 Server with Service Pack 3 (SP3) or earlier must be manually configured to enable SID filtering. Note You cannot turn off the default behavior in Windows Server 2003 that enables SID filtering for newly created external and forest trusts. External trusts that are created from domain controllers running Windows 2000 Server with SP3 or earlier do not enforce SID filtering by default. You can use SID filtering to filter out migrated SIDs that are stored in SIDHistory from specific domains. For example, where an external trust relationship exists so that the Noam domain (running Windows 2000 Server domain controllers) trusts the Acquired domain (also running Windows 2000 Server domain controllers), an administrator of the Noam domain can manually apply SID filtering to the Acquired domain, which allows all SIDs with a domain SID from the Acquired domain to pass but all other SIDs (such as those from migrated SIDs that are stored in SIDHistory) to be discarded. Note Do not apply SID filtering to domains within a forest, because doing so removes SIDs that are required for Active Directory replication, and it causes authentication to fail for users from domains that are trusted transitively through the isolated domain. To further secure your forest, consider enabling SID filtering on all existing external trusts that are created by domain controllers running Windows 2000 Server SP3 or earlier. You can do this by using Netdom.exe to enable SID filtering on existing external trusts or by recreating these external trusts from a domain controller running Windows Server 2003 or Windows 2000 Server with Service Pack 4 (SP4) or later. For more information about how to enable SID filtering on trusts that are created by Windows 2000 Server domain controllers, see the Windows 2000 Active Directory Operations Guide the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=18545). For more information about how SID filtering works, see "Security Considerations for Trusts" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35413). Task requirements You can use either of the following tools to perform the procedures for this task: Active Directory Domains and Trusts Netdom.exe
For more information about how to use the Netdom command-line tool to configure SID filtering settings, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). To complete this task, perform the following procedures: Disable SID filtering Reapply SID filtering
2. Type the following command, and then press ENTER: Netdom trust TrustingDomainName /domain:TrustedDomainName /quarantine:No /usero:domainadministratorAcct /passwordo:domainadminpwd Value TrustingDomainName Description The Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the trusting domain in the trust that is being created. The DNS name (or NetBIOS name) of the domain that will be trusted in the trust that is being created. The user account name with the appropriate administrator credentials to modify the trust. The password of the user account in domainadministratorAcct.
TrustedDomainName
domainadministratorAcct
domainadminpwd
Note You can enable or disable SID filtering only from the trusting side of the trust. If the trust is a two-way trust, you can also disable SID filtering in the trusted domain by using the domain administrators credentials for the trusted domain and reversing the TrustingDomainName and TrustedDomainName values in the command-line syntax.
You can reapply SID filtering by using the Netdom command-line tool. For more information about the Netdom command-line tool, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To complete this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory. To reapply SID filtering 1. To reapply SID filtering for the trusting domain, open a Command Prompt. 2. Type the following syntax, and then press ENTER: Netdom trust TrustingDomainName /domain:TrustedDomainName /quarantine:Yes /usero:domainadministratorAcct /passwordo:domainadminpwd
Term TrustingDomainName
Definition The Domain Name System (DNS) name (or network basic input/output system (NetBIOS) name) of the trusting domain in the trust that is being created. The DNS name (or NetBIOS name) of the domain that will be trusted in the trust that is being created. The user account name with the appropriate administrator credentials to modify the trust. The password of the user account in domainadministratorAcct.
TrustedDomainName
domainadministratorAcct
domainadminpwd
For more information about how to use the Netdom command-line tool to configure selective authentication settings, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). To complete this task, perform the following procedures: Enable selective authentication over an external trust Enable selective authentication over a forest trust Enable domain-wide authentication over an external trust Enable forest-wide authentication over a forest trust
Grant the Allowed to Authenticate permission on computers in the trusting domain or forest
OK. Note Only the authentication settings for the outgoing trust are displayed when you click Properties and then click the Authentication tab in Active Directory Domains and Trusts. To view the correct authentication settings for the incoming side of a twoway, external trust, connect to a domain controller in the trusted domain, and then use Active Directory Domains and Trusts to view the authentication settings for the outgoing side of the same trust.
See Also
You can enable domain-wide authentication over an external trust by using the New Trust Wizard in Active Directory Domains and Trusts or by using the Netdom command-line tool. For more information about how to use the Netdom command-line tool to configure selective authentication settings, see "Netdom.exe: Windows Domain Manager" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41700). Administrative credentials To complete this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory.
Note Only the authentication settings for the outgoing trust are displayed when you click Properties and then click the Authentication tab in Active Directory Domains and Trusts. To view the correct authentication settings for the incoming side of a twoway, forest trust, connect to a domain controller in the trusted domain (the forest root domain in the other forest), and then use Active Directory Domains and Trusts to view the authentication settings for the outgoing side of the same trust.
Grant the Allowed to Authenticate permission on computers in the trusting domain or forest
For users in a trusted Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2003 domain or forest, where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. For more information about how the Allowed to Authenticate permission works, see "Security Considerations for Trusts" in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=35413). Note The Allowed to Authenticate permission can be set on computer objects that represent member servers running Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003. Note By default, only members of the Account Operators, Administrators, Domain Admins, Enterprise Admins, and SYSTEM security groups that are located in the trusting domain can modify the Allowed to Authenticate permission. To enable access to resources over an external trust or forest trust that is set to selective authentication, complete the following procedure by using Active Directory Users and Computers from the trusting domain. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory.
To grant the Allowed to Authenticate permission on computers in the trusting domain or forest
Using the Windows interface 1. Open Active Directory Users and Computers. 2. In the console tree, click the Computers container or the container where your computer objects reside. 3. Right-click the computer object that you want users in the trusted domain or forest to access, and then click Properties. 4. On the Security tab, do one of the following: In Group or user names, click the user names or group names for which you want to grant access to this computer, select the Allow check box next to the Allowed to Authenticate permission, and then click OK. Click Add. In Enter the object names to select, type the name of the user object or group object for which you want to grant access to this resource computer, and then click OK. Select the Allow check box next to the Allowed to Authenticate permission, and then click OK.
Direction of Trust
The Direction of Trust page in the New Trust Wizard is configured by an administrator in one domain to determine whether authentication requests should be routed from this
domain to a specified domain, from the specified domain to this domain, or freely between both domains. The following options are available on the Direction of Trust page: Two-way: A two-way trust allows authentication requests that are sent by users in either domain or forest to be routed successfully to resources in either of the two domains or forests. One-way: incoming: A one-way, incoming trust allows authentication requests that are sent by users in your domain or forest (the domain or forest where you started the New Trust Wizard) to be routed successfully to resources in the other domain or forest. One-way: outgoing: A one-way, outgoing trust allows authentication requests that are sent by users in the other domain (the domain or forest that you are indicating in the New Trust Wizard as the specified domain or forest) to be routed successfully to resources in your domain or forest. These options are explained in the following sections.
means that your domain or forest will be the domain or forest that receives access to the resources in the other domain.
your domain or forest will provide access to resources that are located in your domain to users who are located in the other domain or forest.
Sides of Trust
In Windows NT 4.0 and Windows 2000, the only way to create trusts using the graphical user interface (GUI) was incrementally one side of the trust at a time. When you create external trusts, shortcut trusts, realm trusts, or forest trusts in Windows Server 2003, you now have the option to create each side of the trust separately or both sides of the trust simultaneously.
Acknowledgements Published: March 2005 Applies to: Windows Server 2003 Produced by: Microsoft Windows Server User Assistance team
Domain controllers may nominate the primary domain controller (PDC) operations master as their in-bound time partner but may use a parent domain controller based on stratum numbering. All PDC operations masters follow the hierarchy of domains in the selection of their in-bound time partner. Following this hierarchy, the PDC operations master at the root of the forest becomes authoritative for the organization. The authoritative time source at the root of the forest can acquire its time by connecting to an external NTP server, which is connected to a hardware device by means of a telephone or the Internet. Organizations such as the United States Naval Observatory provide NTP servers that are connected to extremely reliable reference clocks. If you need highly accurate time synchronization, but cannot connect to an external time source on the Internet we recommend that you configure a hardware clock, such as a radio or GPS device, as the time source for the PDC. There are many consumer and enterprise devices that use the Network Time Protocol (NTP), allowing you to install the device on an internal network for usage with the PDC.
For a detailed technical reference of the Windows Time service, including complete documentation of the w32tm tool and the time service registry settings, see the Windows Time Service Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=40648).
The Microsoft time server (time.windows.com) uses NIST, the National Institute of Standards and Technology, located in Boulder, Colorado, as its external time provider. NIST provides the Automated Computer Time Service (ACTS), which can set a computer clock with an uncertainty of less than 10 milliseconds. The U.S. Naval Observatory (USNO) Time Service Department in Washington D.C. is another source for accurate time synchronization in the United States. Many other sites exist throughout the world that can be used for time synchronization. To find them, search for "time synchronization" on the Internet. Note Because synchronization with an external time source is not authenticated, it is less secure. The PDC emulator of the forest root domain is customarily the authoritative time source for the forest and the computer that is usually configured to retrieve time from an external source. However, if the PDC emulator is not configured to retrieve time from another time source but is the reliable time source for the domain, configure it to synchronize from its own internal hardware clock. The role of PDC emulator can move between computers, meaning that every time the role of PDC emulator moves, the time service must be reconfigured on the new PDC emulator, and the manual configuration must be removed from the original PDC emulator. To avoid this process, configure one domain controller in the forest root domain that is not the PDC emulator, as the reliable time source and manually configure it to point to an external time source. Then, no matter which computer is the PDC emulator, the root of the time service stays the same and thus remains properly configured. If you choose to implement another time synchronization product that uses the NTP protocol on your network, you must disable the Windows Time service. All NTP servers need access to UDP port 123. If W32Time is running on a Windows 2003based computer, port 123 will remain occupied. Task requirements The following tools are required to perform the procedures for this task: W32tm.exe Services snap-in if you need to disable the Windows Time service
Perform the following procedures as needed to configure a time source for your forest: 1. Configure the Windows Time service on the PDC emulator 2. If you move the role of the PDC emulator to a new domain controller, Change the Windows Time service configuration on the previous PDC emulator.
3. If you anticipate moving the PDC emulator role and do not want to reconfigure the Windows Time service afterwards, Configure a domain controller in the parent domain as a reliable time source. 4. If your PDC emulator is not configured to retrieve time from another time source but is the reliable time source for the domain, Configure the PDC emulator to synchronize from its internal hardware clock. 5. If you are implementing a time synchronization product other than the Windows Time service in your environment that uses the NTP protocol, Disable the Windows Time service to free UDP port 123 on the network.
computer and a target computer, and then press ENTER: w32tm /stripchart /computer:target /samples:n/dataonly Value target Definition Specifies the DNS name or IP address of the NTP server that you are comparing the local computer's time against, such as time.windows.com. Specifies the number of time samples that will be returned from the target computer to test basic NTP communication.
3. Open UDP port 123 for outgoing traffic if needed. 4. Open UDP port 123 (or a different port you have selected) for incoming NTP traffic. 5. Type the following command to configure the PDC emulator and then press ENTER: w32tm /config /manualpeerlist:peers /syncfromflags:manual /reliable:yes /update where peers specifies the list of DNS names and/or IP addresses of the NTP time source that the PDC emulator synchronizes from. For example, you can specify time.windows.com. When specifying multiple peers, use a space as the delimiter and enclose them in quotation marks.
Change the Windows Time service configuration on the previous PDC emulator
Use the following procedure to change the Windows Time service configuration on the previous PDC emulator after you transfer the role to a new domain controller. The previous
PDC emulator will now automatically synchronize time with the domain hierarchy, getting it's time from the new reliable time source. Note For more information about the w32tm command, type w32tm /? at a command prompt or see Windows Time Service Tools and Settings on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=42984). Administrative Credentials To perform this procedure locally on the PDC emulator, you must be a member of the Administrators group. To perform this procedure from a remote computer, you must be a member of the Domain Admins group. To change the Windows Time service configuration on the previous PDC emulator 1. Open a Command Prompt. 2. Type the following command and then press ENTER: w32tm /config /syncfromflags:domhier /reliable:no /update 3. Type the following command and then press ENTER: net stop w32time 4. Type the following command and then press ENTER: net start w32time
have not moved the PDC emulator role, you must still configure the existing PDC emulator to no longer be the reliable time source for the domain. Note For more information about the w32tm command, type w32tm /? at a command prompt or see Windows Time Service Tools and Settings on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=42984). Administrative Credentials To perform this procedure locally on the domain controller, you must be a member of the Administrators group. To perform this procedure from a remote computer, you must be a member of the Domain Admins group. To configure a domain controller in the parent domain as a reliable time source 1. Open a Command Prompt. 2. Type the following command and press ENTER: W32tm /config /reliable:yes /update
Configure the PDC emulator to synchronize from its internal hardware clock
Use the following procedure to configure the PDC emulator in the forest root domain to synchronize from its internal hardware clock and remain the reliable time source in the forest root domain. Note For more information about the w32tm command, type w32tm /? at a command prompt or see Windows Time Service Tools and Settings on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=42984). Administrative Credentials To perform this procedure locally on the PDC emulator, you must be a member of the Administrators group. To perform this procedure from a remote computer, you must be a member of the Domain Admins group.
To configure the PDC emulator to synchronize from its internal hardware clock 1. Open a Command Prompt. 2. Type the following command and then press ENTER: w32tm /config /syncfromflags:domhier /reliable:yes /update 3. Type the following command and then press ENTER: net stop w32time 4. Type the following command and then press ENTER: net start w32time
Configure these computers to request time from a particular source, such as a domain controller in the domain. If you do not specify a source that is synchronized with the domain, each computers internal hardware clock governs its time. Task requirements The following tool is required to perform the procedures for this task: W32tm
Use either of the following procedures to configure your Windows-based clients to synchronize time: -or Configure a client computer for automatic domain time synchronization Configure a manual time source for a selected client computer
Note For more information about the w32tm command, type w32tm /? at a command prompt or see Windows Time Service Tools and Settings on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=42984). Administrative Credentials To perform this procedure, you must be a member of the Administrators group on the local computer. To perform this procedure from a remote computer, you must be a member of the Domain Admins group. To configure a manual time source for a selected client computer 1. Open a Command Prompt. 2. Type the following command to display the time difference between the local computer and a target computer, and then press ENTER: w32tm /stripchart /computer:target /samples:n/dataonly Value target Definition Specifies the DNS name or IP address of the NTP server that you comparing the local computer's time against. Specifies the number of time samples that will be returned from the target computer to test basic NTP communication.
3. Open UDP port 123 for outgoing traffic on firewall if needed. 4. Open UDP port 123 (or a different port you have selected) for incoming NTP traffic. 5. Type the following command to configure a manual time source for the selected computer and then press ENTER: w32tm /config /manualpeerlist:peers /syncfromflags:manual /update where peers specifies the list of DNS names or IP addresses of the NTP time source(s) that the selected computer will synchronize from. When specifying multiple peers, use a space as the delimiter and enclose them in quotation marks.
Perform the following procedure to restore local Windows Time service to the default settings: Restore Windows Time service on local computer to default settings
3. Type the following command and then press ENTER: w32tm /unregister 4. Type the following command and then press ENTER: w32tm /register 5. Type the following command and then press ENTER: net start w32time
Administering SYSVOL
This SYSVOL Administering guide provides administering information for the Active Directory SYSVOL shared folder in the Microsoft Windows Server 2003 operating system. In this guide Introduction to Administering SYSVOL Managing SYSVOL
Acknowledgements Published: March 2005 Updated: Applies to: Windows Server 2003 Produced by: Microsoft Windows Server User Assistance team Writer: Mary Hillman Editor: Jim Becker
Note Only the Group Policy template (GPT) is replicated by SYSVOL. The Group Policy container (GPC) is replicated through Active Directory replication. To be effective, both parts must be available on a domain controller. FRS monitors SYSVOL and, if a change occurs to any file stored on SYSVOL, then FRS automatically replicates the changed file to the SYSVOL folders on the other domain controllers in the domain. The day-to-day operation of SYSVOL is an automated process that does not require any human intervention other than watching for alerts from the monitoring system. Occasionally, you might perform some system maintenance as you change your network. This objective describes the basic tasks required for managing SYSVOL in order to maintain capacity and performance of SYSVOL, for hardware maintenance, or for data organization. Key considerations for administering SYSVOL To manage SYSVOL, ensure that FRS properly replicates the SYSVOL data and that enough space is provided to store SYSVOL. Implement a monitoring system to detect low disk space and potential FRS disruptions so that you can address those issues before the system stops replicating. A useful tool for this is the Ultrasound utility, which can be downloaded from www.microsoft.com, by searching for Ultrasound. Other key considerations for managing SYSVOL are: Capacity.
Depending upon the configuration of your domain, SYSVOL can require a significant amount of disk space to function properly. During the initial deployment, SYSVOL might be allocated adequate disk space to function. However, as your Active Directory grows in size and complexity, the required capacity can exceed the available disk space. If you receive indications that disk space is low, determine if the cause is due to inadequate physical space on the disk or a registry setting that limits the size of the staging area. By modifying a setting in the registry, you can allocate more staging area space, rather than relocating SYSVOL or the staging area. Increasing the space allocation in the registry is much faster and easier than relocation Performance.
Any changes made to SYSVOL are automatically replicated to the other domain controllers in the domain. If the files stored in SYSVOL change frequently, the replication increases the input and output for the volume where SYSVOL is located. For example, editing a GPO can potentially force a GPO-level replication. If the volume is also host to other system files,
such as the directory database or the pagefile, then the increased input and output for the volume can impact the performance of the server. Hardware maintenance.
System maintenance, such as removal of a disk drive, can require you to relocate SYSVOL. Even if the maintenance occurs on a different disk drive, verify that that maintenance does not affect the system volume. Logical drive letters could change after you add and remove disks. FRS locates SYSVOL by using pointers stored in the directory and the registry. If drive letters change after you add or remove disk drives, be aware that these pointers are not automatically updated. Backing up Group Policy objects (GPOs).
The successful operation of Group Policy is heavily dependant on the reliable operation of SYSVOL. Key components of the GPO exist in the SYSVOL (in the policies subdirectory) and it is essential that these remain in sync with related components in Active Directory. Therefore, backing up only the SYSVOL component does not represent a full and complete backup of your GPOs. The Group Policy Management Console (GPMC) provides both UIbased and scriptable methods for backing up GPOs. It is important that you back up GPOs as part of your regular backup/disaster recovery processes. Soon after installation of a new domain, the default domain and default domain controllers' GPOs should be backed up. They should also be backed up after any subsequent changes are made. Understanding the SYSVOL folder structure Before you attempt to relocate all or portions of the system volume, you must clearly understand the folder structure and the relationships between the folders and the path information that is stored in the registry and the directory itself. When folders are relocated, any associated parameters that are stored in the registry and the directory must be updated to match the new location. The folder structure contains junctions that might also require updating when folders get moved to a new location. Maintaining the relationship between the folders, junctions, and stored parameters is important when you must relocate all or portions of SYSVOL. Failure to do so can result in files being replicated to or from the wrong location. It can also result in files failing to replicate, yet FRS will not report any errors. Due to the configuration error, FRS looks in the wrong location for the files that you want to replicate. The folder structure used by the system volume uses a feature called a junction point. Junction points look like folders and behave like folders (in Windows Explorer you cannot distinguish them from regular folders), but they are not folders. A junction point contains a link to another folder. When a program opens it, the junction point automatically redirects the program to the folder to which the junction point is linked. The redirection is completely transparent to the user and the application.
For example if you create two folders, C:\Folder1 and C:\Folder2, and create a junction called C:\Folder3, and then link the junction back to Folder1, Windows Explorer displays three folders: \Folder1 \Folder2 \Folder3 If you open Folder3, Windows Explorer is redirected to Folder1 and displays the contents of Folder1. You receive no indication of the redirection because it is transparent to the user and to Windows Explorer. If you look at the contents of Folder1, you see that it is exactly the same as the contents displayed when you open Folder3. If you open a command prompt and list a directory, all three folders appear in the output. The first two are type <DIR> and Folder3 is type <JUNCTION>. If you list a directory of Folder3, you see the contents of Folder1. Note To create or update junctions, you need the Linkd.exe tool supplied with the Windows 2000 Server Resource Kit. Linkd allows you to create, delete, update, and view the links that are stored in junction points. By default, the system volume is contained in the %systemroot%\SYSVOL folder. The tree of folders contained within this folder can be extensive, depending on how your network uses FRS. When relocating folders in the system volume, ensure that you move all folders (including any hidden folders) and ensure that the relationships of the folders do not change unintentionally. When you relocate folders, you need to be concerned with the first three levels of subdirectories in order to properly update the parameters used by FRS. These levels are affected by junction points and parameter settings. These folders include: %systemroot%\SYSVOL %systemroot%\SYSVOL\Domain
%systemroot%\SYSVOL\Domain\DO_NOT_REMOVE_Ntfrs_ Preinstalled_Directory %systemroot%\SYSVOL\Domain\Policies %systemroot%\SYSVOL\Domain\Scripts %systemroot%\SYSVOL\Staging %systemroot%\SYSVOL\Staging\Domain %systemroot%\SYSVOL\Staging Areas %systemroot%\SYSVOL\Staging Areas FQDN
(where FQDN is the fully qualified domain name of the domain that this domain controller hosts.) Note If any of the folders do not appear in Windows Explorer, click Tools and then click Folder Options. On the View tab, select Show hidden files and folders. If you use Windows Explorer to view these folders, they appear to be typical folders. If you open a command prompt and type dir to list these folders, you will notice two special folders are listed as <JUNCTION>. Both folders labeled FQDN are junction points. The junction in %systemroot%\SYSVOL\Sysvol links to %systemroot%\SYSVOL\Domain. The junction in %systemroot%\SYSVOL\Staging Areas is linked to %systemroot %\SYSVOL\Staging\Domain. If you change the path to the folders to which the junctions are linked, you must also update the junctions, including drive letter changes and folder changes. Besides junction points linking to folders within the system volume tree, the registry and the directory also store references to folders. These references contain paths that you must update if you change the location of the folder. FRS uses two values that are stored in the directory. The first value, fRSRootPath, points to the location of the policies and scripts that are stored in SYSVOL. By default, this location is the %systemroot%\SYSVOL\Domain folder. The second value, fRSStagingPath, points to the location of the folders used as the staging area. By default, this location is the %systemroot%\SYSVOL\Staging\Domain folder. The Net Logon service uses a parameter stored in the registry to identify the location of the folder that it uses to create the SYSVOL and NETLOGON share points. By default, this path is %systemroot%\SYSVOL\Sysvol. If you change the paths to these folders, you must update these values. When relocating SYSVOL, you first move the entire folder structure to a new location; then you update all the junction points and the parameters that are stored in the registry and the directory in order to maintain the relationships between the parameters, the folders, and the junctions. Optionally, you can relocate the staging area and leave the rest of the system volume at its original location. In this case, you must update the fRSStagingPath parameter in the directory and the junction point stored at %systemroot%\SYSVOL\staging areas.
Managing SYSVOL
The following tasks for managing SYSVOL are described in this objective:
Changing the Space Allocated to the Staging Area Relocating the Staging Area Relocating SYSVOL Manually Updating the System Volume Path Restoring and Rebuilding SYSVOL
To complete this task, perform the following procedures in order: 1. Stop the File Replication service 2. Change the space allocated to the Staging Area folder 3. Start the File Replication service
rs. 4. Double-click Staging Space Limit in KB to open the Edit DWord Value dialog box. 5. In the Base frame, select Decimal. 6. For Value Data enter a value from 10000 through 2000000000. Do not use commas. Click OK. 7. Close the Registry Editor.
Staging Areawhich FRS uses for the staging process. When you relocate the staging area, you can change the name. Ensure that you identify the proper area in case it is renamed in your environment. Two parameters determine the location of the staging area. One parameter, fRSStagingPath, is stored in the directory and contains the path to the actual location that FRS uses to stage files. The other parameter is a junction point stored in the Staging Area folder in SYSVOL that links to the actual location that FRS uses to stage files. When relocating the staging area, you must update these two parameters to point to the new location. Except where noted, perform these procedures on the domain controller that contains the Staging Area folder that you want to relocate. Task requirements To perform this task it is necessary that you understand the folder structure used by the system volume. For more information, see Introduction to Administering SYSVOL. The following tools are required to perform the procedures for this task: Active Directory Sites and Services (Administrative Tool) Event Viewer Net.exe Dcdiag.exe (Windows Support Tools) Regedit.exe ADSI Edit.msc (Windows Support Tools) Linkd.exe (Windows Server 2003 Resource Kit Tools)
Note To create or update junctions, you need the Linkd.exe tool supplied with Windows Server 2003 Resource Kit Tools on the Microsoft Web site at http://go.microsoft.com/fwlink/?LinkId=16544. Linkd allows you to create, delete, update, and view the links that are stored in junction points. To complete this task, perform the following procedures in order: 1. Identify replication partners 2. Check the status of the shared SYSVOL You do not need to perform the test on every partner, but you need to perform enough tests to be confident that the shared system volumes on the partners are healthy.
3. Verify replication with other domain controllers 4. Gather the SYSVOL path information 5. Reset the File Replication service staging folder to a different logical drive
the path information stored in the registry and the SYSVOL directory itself see Introduction to Administering SYSVOL. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. Use the procedures below to locate the system volume path information and record the current values in the following table. To relocate the staging area, record the information for rows 2 and 5. Note To restore and rebuild SYSVOL, you will need the information from the domain controller that you are repairing recorded in rows 1, 2, and 3. Use the junctions located on the domain controller that you are copying from the SYSVOL folder structure to record the current value for rows 4 and 5. The new values for rows 4 and 5 are based on the domain controller that you are repairing. Parameter 1 2 3 4 5 fRSRootPath fRSStagingPath Sysvol parameter in registry Sysvol junction Staging junction Current Value New Value
4. Double-click OU=Domain Controllers to display the containers that represent the domain controllers. 5. Double-click the container that represents this domain controller (CN=computername) to display more containers. 6. Click the CN=NTFRS Subscriptions container. 7. In the details pane, right-click CN=Domain System Volume, and then click Properties. 8. Ensure that Show mandatory attributes is selected. Select it if it is not. 9. In Attributes, locate fRSRootPath and fRSStagingPath and record the current values in the table above. 10. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 11. Click Cancel to close the dialog box. SYSVOL parameter in the registry 1. Click Start, click Run, type regedit and then press ENTER. 2. In Registry Editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Paramete rs. 3. Sysvol appears in the details pane. The current value is listed in the Data column. 4. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 5. Exit Registry Editor. SYSVOL junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Sysvol. Note This assumes that the system volume is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name
(FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. Staging junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Staging Areas. Note This assumes that the staging area is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name (FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table.
Reset the File Replication service staging folder to a different logical drive
Use this procedure to reset the FRS Staging folder to a different logical drive. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory.
To reset the File Replication service staging folder to a different logical drive 1. Click Start, click Run, type adsiedit.msc, and then press ENTER. 2. Under Domain [computername], locate the NtFrs Subscriber object under the host computer account in Active Directory. The generic path for this attribute is: CN=Replica Set Name,CN=NTFRS Subscriptions,CN=Computername,DC=Domain Name,DC=COM. For example, to reset the staging path for the SYSVOL replica set of domain controller \\DC1 in the contoso.com domain, the distinguished name (also known as DN) path for the FrsStagingPath parameter is: CN=Domain System Volume (SYSVOL share), CN=NTFRS Subscriptions,CN=DC1,DC=CONTOSO,DC=COM Where (when you read the distinguished name path from right to left): DC=CONTOSO,DC=COM is the domain hosting the computer account. CN=DC1 is the host computer account in the domain naming context (NC). CN=NTFRS Subscriptions is the NtfrsSubscriber object that holds the FrsStagingPath parameter. CN=Domain System Volume (SYSVOL share) is the FRS subscriber object. 3. Right-click the CN=Domain System Volume container, and click Properties. 4. Ensure that the Show mandatory attributes check box is selected. Select it if it is not. 5. In Attributes, click fRSStagingPath, and then click Edit. The current value appears in the Value box in the String Attribute Editor dialog box. 6. Enter the path to the new location for the FRS Staging folder in the Value box and click OK. 7. Click OK to close Properties. 8. To make sure that the staging path has been updated in the registry: a. Click Start, click Run, and type regedit on the server where you are changing the staging path and then press ENTER. b. Locate the following subkey: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Replica Sets c. Double-click Replica Sets. All replica sets are displayed as a GUID.
d. To locate the replica set you are updating the staging area for, click a GUID and, in the details pane, find the Replica Set Name. Repeat until you find the correct replica set. e. After you locate the correct GUID and replica set name, right-click Replica Set Stage and
then click Modify. f. In the Value data box, type the new staging area path, and then click OK.
When the service detects a change in the staging path, event ID 13563 is logged with a series of self-explanatory steps on how to proceed: Event Type: Warning Event Source: NtFrs Event Category: None Event ID: 13563 Date: 3/6/2005 Time: 7:13:01 PM User: N/A Computer: <Computer name> Description: The File Replication service has detected that the staging path for the replica set DOMAIN SYSTEM VOLUME (SYSVOL SHARE) has changed. Current staging path = E:\Windows\Sysvol\Staging\Domain New staging path = E:\Frsstage The service will start using the new staging path after it restarts. The service is set to restart after every restart. It is recommended that you manually restart the service to prevent loss of data in the Staging folder. To manually restart the service do the following: [1] Run "net stop ntfrs" or use the Services snap-in to stop File Replication service. [2] Move all the staging files corresponding to replica set DOMAIN SYSTEM VOLUME (SYSVOL SHARE) to the new staging location. If more than one replica set are sharing the current staging folder then it is safer to copy the staging files to the new staging folder. [3] Run "net start ntfrs" or use the Services snap-in to start File Replication service, followed by "net start ntfrs". 9. To perform steps 1 through 3 in the event message, open a Command Prompt. 10. Type the following command and then press ENTER: net stop ntfrs 11. Move all the staging files corresponding to replica set DOMAIN SYSTEM VOLUME (SYSVOL
SHARE) to the new staging location. If more than one replica set is sharing the current Staging folder, then it is safer to copy the staging files to the new Staging folder. 12. At a command prompt type the following command and then press ENTER: net start ntfrs Microsoft recommends that you follow step 11 (step 2 in the preceding event message) because the FRS Staging folder may contain thousands or tens of thousands of files in the original Staging folder, all of which may be destined for one or more downstream partners. In Windows Explorer, you can view the files in the staging folder. On the Folder Options menu, click the View tab, and then click to select the Show hidden files and folders check box. Copy the files to the new Staging folder, and then follow the remaining steps in the event log message.
Active Directory Sites and Services (Administrative Tools) Event Viewer Windows Explorer Dcdiag.exe (Windows Support Tools) Regedit.exe ADSI Edit.msc (Windows Support Tools) Linkd.exe (Windows Server 2003 Resource Kit Tools) Net.exe Secedit.exe Notepad.exe
Note To create or update junctions, you need the Linkd.exe tool supplied with Windows Server 2003 Resource Kit Tools on the Microsoft Web site at http://go.microsoft.com/fwlink/?LinkId=16544. Linkd allows you to create, delete, update, and view the links that are stored in junction points. To complete this task, perform the following procedures: 1. Identify replication partners 2. Check the status of the shared SYSVOL 3. Verify replication with other domain controllers 4. Gather the SYSVOL path information 5. Stop the File Replication service 6. Create the SYSVOL folder structure 7. Set the SYSVOL path 8. Set the staging area path If you have moved the Staging Area folder to a different location already, you do not need to do this step. 9. Prepare a domain controller for nonauthoritative SYSVOL restart 10. Update security on the new SYSVOL 11. Start the File Replication service 12. Check the status of the shared SYSVOL
Note You do not need to perform this procedure on every replication partner, but you need to perform it enough times to be confident that the shared system volumes on the replication partners are healthy. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. To check the status of the shared SYSVOL 1. Open Event Viewer. 2. In the Event Viewer tree, click File Replication Service to display the FRS events. 3. Look for an event 13516 with a date and time stamp that corresponds with the recent restart. It can take 15 minutes or more to appear. An event 13508 indicates that FRS is in the process of starting the service. An event 13509 indicates that the service has started successfully. Event 13516 indicates that the service is started, the folders are shared, and the domain controller is functional. 4. To verify the shared folder is created, open a command prompt and type net share to display a list of the shared folders on this domain controller, including Net Logon and SYSVOL. 5. At a command prompt, type dcdiag /test:netlogons and press ENTER. 6. Look for a message that states computername passed test NetLogons where computername is the name of the domain controller. If you do not see the test passed message, some problem will prevent replication from functioning. This test verifies that the proper logon privileges are set to allow replication to occur. If this test fails, verify the permissions set on the Net Logon and SYSVOL shared folders.
the path information stored in the registry and the SYSVOL directory itself see Introduction to Administering SYSVOL. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. Use the procedures below to locate the system volume path information and record the current values in the following table. To relocate the staging area, record the information for rows 2 and 5. Note To restore and rebuild SYSVOL, you will need the information from the domain controller that you are repairing recorded in rows 1, 2, and 3. Use the junctions located on the domain controller that you are copying from the SYSVOL folder structure to record the current value for rows 4 and 5. The new values for rows 4 and 5 are based on the domain controller that you are repairing. Parameter 1 2 3 4 5 fRSRootPath fRSStagingPath Sysvol parameter in registry Sysvol junction Staging junction Current Value New Value
4. Double-click OU=Domain Controllers to display the containers that represent the domain controllers. 5. Double-click the container that represents this domain controller (CN=computername) to display more containers. 6. Click the CN=NTFRS Subscriptions container. 7. In the details pane, right-click CN=Domain System Volume, and then click Properties. 8. Ensure that Show mandatory attributes is selected. Select it if it is not. 9. In Attributes, locate fRSRootPath and fRSStagingPath and record the current values in the table above. 10. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 11. Click Cancel to close the dialog box. SYSVOL parameter in the registry 1. Click Start, click Run, type regedit and then press ENTER. 2. In Registry Editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Paramete rs. 3. Sysvol appears in the details pane. The current value is listed in the Data column. 4. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 5. Exit Registry Editor. SYSVOL junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Sysvol. Note This assumes that the system volume is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name
(FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. Staging junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Staging Areas. Note This assumes that the staging area is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name (FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table.
2. Type the following command and then press Enter: net stop ntfrs
Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. To set the staging area path 1. Double-click Domain [computername] (where computername is the name of this domain controller). Verify that the Domain expands to display the domain component (DC=) folder. 2. Click the domain component to display the containers and OUs in the details pane. 3. Double-click OU=Domain Controllers to display the containers that represent the domain controllers. 4. Double-click the container that represents this domain controller (CN=computername) to display more containers. 5. Click the CN=NTFRS Subscriptions container. 6. In the details pane, right-click CN=Domain System Volume, and then click Properties. 7. Ensure that Show mandatory attributes is selected. Select it if it is not. 8. In Attributes, click fRSStagingPath, and then click Edit. The current value appears in the Value box in the String Attribute Editor dialog box. 9. In the Value box, enter the complete path to the new location where you want to locate the Staging Area folder (the path to the new folder that you created earlier), including the drive letter and click OK. 10. Close ADSI Edit. 11. Open a Command Prompt. 12. Change the directory to %systemroot%\SYSVOL\staging areas. 13. Type the following command to list the contents of the directory and then press ENTER: dir Verify that <JUNCTION> appears in the DIR output. 14. Update the junction so that it points to the new location by typing the following command and then pressing ENTER: linkd junctionname newpath
where newpath specifies the same value that you entered for fRSStagingPath earlier.
To prepare a domain controller for nonauthoritative SYSVOL restart 1. Click Start, click Run, type regedit and then click OK. 2. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters 3. Expand Parameters. 4. Modify one of the BurFlags entries as follows: To modify the global BurFlags entry: a. Expand Backup/Restore and then click Process at Startup. b. In the details pane, right-click BurFlags and click Modify. c. In the Value data box, type D2 hexadecimal or 210 decimal.
d. Click OK and close Registry Editor. To modify the replica-set-specific BurFlags entry: a. Expand both Cumulative Replica Sets and Replica Sets. b. Match the GUID under Replica Sets to the identical GUID under Cumulative Replica Sets, and click the matching GUID under Cumulative Replica Sets. c. In the details pane, right click BurFlags and click Modify.
d. In the Value data box, type D2 hexadecimal or 210 decimal. e. Click OK and close Registry Editor.
To perform this procedure, you must be a member of the Domain Admins group in Active Directory. To update security on the new SYSVOL 1. Click Start, click Run, type regedit and then press ENTER. 2. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Netlogon\Parameters. Note the path stored under SysVol. 3. In Control Panel, double-click System. 4. On the Advanced tab, click Environment Variables. 5. Under System Variables, click New. 6. For Variable name, type sysvol. 7. For Variable value, type the path that you noted in step 2. 8. Click OK twice. Click OK again to close Properties.
9. Open Notepad and enter the following information: [Unicode] Unicode=yes [Version] signature="$CHICAGO$" Revision=1 [Profile Description] Description=default perms for sysvol [File Security] ;"%SystemRoot%\SYSVOL",0,"D:AR(A;OICI;FA;;;BA)" "%Sysvol%",2,"D:P(A;CIOI;GRGX;;;AU)(A;CIOI;GRGX;;;SO) (A;CIOI;GA;;;BA) (A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)" "%Sysvol%\domain\policies",2,"D:P(A;CIOI;GRGX;;;AU) (A;CIOI;GRGX;;;SO) (A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY) (A;CIOI;GA;;;CO)(A;CIOI;GRGWGXSD;;;PA)" Use this file to apply the security settings to the new SYSVOL folders. Save this file as Sysvol.inf.
Note Do not include a space after (A;CIOI;GRGX;;;SO), (A;CIOI;GRGX;;;AU), or (A;CIOI;GA;;;SY). 10. Open a new Command Prompt. Do not use an existing command prompt that has been open on your desktop because it will not have the proper environment settings. Change the directory to the folder where you saved the Sysvol.inf file. 11. Type the following command all on one line and then press ENTER: SECEDIT /Configure /cfg sectemplatepath\sysvol.inf /db sectemplatepath\sysvol.db /overwrite where sectemplatepath specifies the path to where you saved Sysvol.inf.
To complete this task, perform the following procedures in order: 1. Gather the SYSVOL path information 2. Stop the File Replication service 3. Set the SYSVOL path 4. Set the staging area path 5. Start the File Replication service
the path information stored in the registry and the SYSVOL directory itself see Introduction to Administering SYSVOL. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. Use the procedures below to locate the system volume path information and record the current values in the following table. To relocate the staging area, record the information for rows 2 and 5. Note To restore and rebuild SYSVOL, you will need the information from the domain controller that you are repairing recorded in rows 1, 2, and 3. Use the junctions located on the domain controller that you are copying from the SYSVOL folder structure to record the current value for rows 4 and 5. The new values for rows 4 and 5 are based on the domain controller that you are repairing. Parameter 1 2 3 4 5 fRSRootPath fRSStagingPath Sysvol parameter in registry Sysvol junction Staging junction Current Value New Value
4. Double-click OU=Domain Controllers to display the containers that represent the domain controllers. 5. Double-click the container that represents this domain controller (CN=computername) to display more containers. 6. Click the CN=NTFRS Subscriptions container. 7. In the details pane, right-click CN=Domain System Volume, and then click Properties. 8. Ensure that Show mandatory attributes is selected. Select it if it is not. 9. In Attributes, locate fRSRootPath and fRSStagingPath and record the current values in the table above. 10. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 11. Click Cancel to close the dialog box. SYSVOL parameter in the registry 1. Click Start, click Run, type regedit and then press ENTER. 2. In Registry Editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Paramete rs. 3. Sysvol appears in the details pane. The current value is listed in the Data column. 4. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 5. Exit Registry Editor. SYSVOL junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Sysvol. Note This assumes that the system volume is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name
(FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. Staging junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Staging Areas. Note This assumes that the staging area is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name (FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table.
2. Type the following command and then press Enter: net stop ntfrs
ENTER: dir Verify that <JUNCTION> appears in the DIR output. 14. Update the junction so that it points to the new location by typing the following command and then pressing ENTER: linkd junctionname newpath where newpath specifies the same value that you entered for fRSStagingPath earlier.
To complete this task, perform the following procedures in order: 1. Identify replication partners 2. Check the status of the shared SYSVOL Because you will be copying the system volume from one of the partners, you need to make sure that the system volume you copy from the partner is up to date. 3. Verify replication with other domain controllers 4. Restart the domain controller in Directory Services Restore Mode locally If you are sitting at the console of the domain controller, locally restart a domain controller in Directory Services Restore Mode. If you are accessing the domain controller remotely using Terminal Services, remotely restart a domain controller in Directory Services Restore Mode.
5. Gather the SYSVOL path information 6. Stop the File Replication service 7. Prepare a domain controller for nonauthoritative SYSVOL restart 8. Import the SYSVOL folder structure 9. Start the File Replication service 10. Check the status of the shared SYSVOL
When you start Windows Server 2003 in Directory Services Restore Mode, the local Administrator account is authenticated by the local Security Accounts Manager (SAM) database. Therefore, logging on requires that you use the local administrator password, not an Active Directory domain password. This password is set during Active Directory installation when you provide the password for Directory Services Restore Mode. Administrative credentials To perform this procedure, you must provide the Administrator password for Directory Services Restore Mode. To restart the domain controller in Directory Services Restore Mode locally 1. Restart the domain controller. 2. When the screen for selecting an operating system appears, press F8. 3. On the Windows Advanced Options menu, select Directory Services Restore Mode. 4. When you are prompted, log on as the local administrator.
See Also
Restart the domain controller in Directory Services Restore Mode Remotely
Use the procedures below to locate the system volume path information and record the current values in the following table. To relocate the staging area, record the information for rows 2 and 5. Note To restore and rebuild SYSVOL, you will need the information from the domain controller that you are repairing recorded in rows 1, 2, and 3. Use the junctions located on the domain controller that you are copying from the SYSVOL folder structure to record the current value for rows 4 and 5. The new values for rows 4 and 5 are based on the domain controller that you are repairing. Parameter 1 2 3 4 5 fRSRootPath fRSStagingPath Sysvol parameter in registry Sysvol junction Staging junction Current Value New Value
7. In the details pane, right-click CN=Domain System Volume, and then click Properties. 8. Ensure that Show mandatory attributes is selected. Select it if it is not. 9. In Attributes, locate fRSRootPath and fRSStagingPath and record the current values in the table above. 10. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 11. Click Cancel to close the dialog box. SYSVOL parameter in the registry 1. Click Start, click Run, type regedit and then press ENTER. 2. In Registry Editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Paramete rs. 3. Sysvol appears in the details pane. The current value is listed in the Data column. 4. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. 5. Exit Registry Editor. SYSVOL junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Sysvol. Note This assumes that the system volume is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name (FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure
discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table. Staging junction 1. Open a Command Prompt. 2. Change the directory to %systemroot%\SYSVOL\Staging Areas. Note This assumes that the staging area is still in the default location. If it has been relocated, substitute the appropriate paths into these instructions. 3. At the command prompt, type dir. Verify that the fully qualified domain name (FQDN) is listed as type <JUNCTION>. 4. At the command prompt, type linkd fqdn (where fqdn is the domain name listed in the Dir output). This displays the value stored in the junction point. Press ENTER. 5. Record the current value in table above. Based on the folder structure discussed in detail in Introduction to Administering SYSVOL and the new location, record the new path value for this parameter in the table.
3. Expand Parameters. 4. Modify one of the BurFlags entries as follows: To modify the global BurFlags entry: a. Expand Backup/Restore and then click Process at Startup. b. In the details pane, right-click BurFlags and click Modify. c. In the Value data box, type D2 hexadecimal or 210 decimal.
d. Click OK and close Registry Editor. To modify the replica-set-specific BurFlags entry: a. Expand both Cumulative Replica Sets and Replica Sets. b. Match the GUID under Replica Sets to the identical GUID under Cumulative Replica Sets, and click the matching GUID under Cumulative Replica Sets. c. In the details pane, right click BurFlags and click Modify.
d. In the Value data box, type D2 hexadecimal or 210 decimal. e. Click OK and close Registry Editor.
Caution Never copy information from the system volume on one domain controller to the system volume on another domain controller unless you have stopped the File Replication service and configured SYSVOL for a non-authoritative restore during startup. Failure to do so can cause invalid data to be replicated and cause the system volumes on various domain controllers to become inconsistent. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. To import the SYSVOL folder structure 1. Open Windows Explorer. 2. Navigate to the existing %systemroot%\SYSVOL folder that you are rebuilding and delete it. 3. Connect to the Admin$ share on the domain controller that you identified earlier as the replication partner from which you plan to copy the SYSVOL folder structure. 4. Once you are connected to the Admin$ share point, verify that a folder labeled SYSVOL appears. Right-click the SYSVOL folder, and click Copy. 5. In the same directory, find some blank space and right-click. Click Paste. You might see a dialog box stating that some files already exist and a prompt asking whether you want to continue copying the folder. At each such prompt, click No. 6. Verify that the original SYSVOL folder and a new folder labeled Copy of SYSVOL both appear. Right-click Copy of SYSVOL and click Rename. Type SYSVOL2 and press ENTER. 7. Open a command prompt. Change to the drive letter that represents the connection to the remote domain controller where you created the SYSVOL2 folder. 8. Change the directory to SYSVOL2\sysvol. 9. Type dir and press ENTER. Verify that <JUNCTION> appears in the Dir output and is followed by the name of the domain. 10. You must update the path in this junction so that it points to the new location. Type the following command: linkd junctionname newpath
where newpath is the new value you recorded in row 4 of the table in Gather the SYSVOL path information. Press ENTER. 11. If the staging area has been relocated and is no longer inside the SYSVOL folder, skip steps 10 and 11 and proceed to step 12. At a command prompt, change the directory to \SYSVOL2\staging areas under the copy of SYSVOL that you created. Type dir to list the contents and verify that <JUNCTION> appears in the Dir output. 12. Update the junction so that it points to the new location. Type the following command: linkd junctionname newpath where newpath is the new value that you recorded in row 5 of Table 1 while gathering system volume path information. Press ENTER. 13. At the command prompt, change back to the %systemroot% for the domain controller that you are repairing. 14. From the command prompt, use the Xcopy command to copy the contents of the \SYSVOL2 folder you created to a new SYSVOL folder on your local drive. Type the following command: xcopy drive:\sysvol2\*.* sysvol\*.* /s /e /h /c /y where drive is the letter representing the connection to the remote domain controller. Press ENTER. 15. Verify that the folder structure copied correctly. Compare the new folder structure to the SYSVOL (not the SYSVOL2) on the remote domain controller. Open a command prompt and type dir to list the contents of the folders. Ensure that all folders exist. 16. Remove the SYSVOL2 folder that you created on the remote domain controller. 17. Disconnect from the remote domain controller. If you had to create a shared folder on that domain controller in order to connect to it, remove the shared folder. Some organizations consider it a security risk to retain shared folders that are not in use. 18. Restart the domain controller in normal mode.
Acknowledgements Published: March 2005 Applies to: Windows Server 2003 SP1 Produced by: Microsoft Windows Server User Assistance team Writer: Mary Hillman
What domain controllers are designated as global catalog servers in a particular site?
potentially affects network performance only when adding the first global catalog server in the site and the impact varies depending on the following conditions: The speed and reliability of the wide area network (WAN) link or links to the site. The size of the forest.
For example, in a forest that has a large hub site, five domains, and thirty small branch sites (some of which are connected by only dial-up connections), global catalog replication to the small sites takes considerably longer than replication of one or two domains to a few well-connected sites.
The Net Logon service on the domain controller has updated DNS with global catalogspecific SRV resource records. At this point, the global catalog server begins accepting queries on ports 3268 and 3269.
catalog partial, read-only directory partitions are removed in the background, receiving a low priority so that high-priority services are not interrupted. One reason that you might want to remove the global catalog from a domain controller is the availability of universal group membership caching in Windows Server 2003, which might eliminate the requirement for a global catalog server in a particular site. Minimum hardware requirements for global catalog servers depend upon the numbers of users in the site. For disk space requirements and directory database storage guidelines, see "Assessing Disk Space and Memory Requirements" in Designing and Deploying Directory and Security Services on the Microsoft Web site (http://go.microsoft.com/fwlink/? LinkId=45434).
See Also
Windows Server 2003 Technical Reference
The following tools are required to perform the procedures for this task: Active Directory Sites and Services Repadmin.exe Dcdiag.exe
To complete this task, perform the following procedures: Note Some procedures are performed only when you are configuring the first global catalog server in a site. 1. Determine whether a domain controller is a global catalog server 2. Designate a domain controller to be a global catalog server 3. Monitor global catalog replication progress 4. Verify successful replication to a domain controller
The Name Service Provider Interface (NSPI) must be running on a global catalog server to enable MAPI access to Active Directory. To enable NSPI, you must restart the global catalog server after replication of the partial directory partitions is complete, or after occupancy requirements are met. Administrative Credentials To perform this procedure you must be a member of the Domain Admins group in Active Directory. To monitor global catalog replication progress 1. Open a Command Prompt. 2. Type the following command and then press ENTER: dcdiag /v /s:servername| find "%" Value servername Description Specifies the name of the new global catalog server.
3. Repeat this command periodically to monitor progress. If the test shows no output, then replication has completed.
DNS snap-in
Note The global catalog server must be restarted after replication has completed and before readiness is determined. To complete this task, perform the following procedures: 1. Verify global catalog readiness 2. Verify global catalog DNS registrations
Using the Windows interface 1. Click Start, click Run, type Ldp, and then click OK. 2. On the Connection menu, click Connect. 3. In the Connect box, type the name of the server whose global catalog readiness you want to verify. 4. In the Port box, if 389 is not showing, type 389. 5. If the Connectionless box is selected, clear it, and then click OK. 6. In the details pane, verify that the isGlobalCatalogReady attribute has a
value of TRUE. 7. On the Connection menu, click Disconnect, and then close Ldp.
Using a command prompt 1. Open a Command Prompt. 2. Type the following command and then press ENTER: nltest /server:servername /dsgetdc:domainname Value servername Description Specifies the name of the domain controller you have designated as a global catalog server. Specifies the name of the domain to which the server belongs.
domainname
3. In the Flags: line of the output, if GC appears, then the global catalog server has satisfied its replication requirements
2. Expand Forward Lookup Zones and then expand the forest root domain. 3. Click the _tcp container. 4. In the details pane, look in the Name column for _gc and in the Data column for the name of the server. The records that begin with _gc are global catalog SRV records.
To complete this task, perform the following procedures: 1. Clear the global catalog setting 2. Monitor global catalog removal in Event Viewer
2. Expand the Sites container, and then expand the site from which you are removing a global catalog server. 3. Expand the Servers container and then expand the Server object for the domain controller that you want to remove as a global catalog server. 4. Right-click the NTDS Settings object for the target server, and then click Properties. 5. If the Global Catalog check box is selected, clear the check box, and then click OK.
Acknowledgements Published: March 2005 Applies to: Windows Server 2003 Produced by: Microsoft Windows Server User Assistance team Writer: Shala Brandolini Editor: Jim Becker
The domain naming master, which adds and removes domains and application partitions to and from the forest. To perform these functions, the domain controllers hosting these operations master roles must be consistently available and be located in areas where network reliability is high. Careful placement of your operations masters becomes more important as you add more domains and sites to build your forest.
Choose an additional domain controller as the standby operations master for the forest-level roles and choose an additional domain controller as the standby for the domain-level roles. Forest-level role placement in the forest root domain
The first domain controller created in the forest is assigned the schema master and domain naming master roles. To ease administration and backup and restore procedures, leave these roles on the original forest root domain controller. Moving the roles to other domain controllers does not improve performance. Separating the roles creates additional administrative overhead when you must identify the standby operations masters and when you implement a backup and restore policy. Unlike the PDC emulator role, forest-level roles rarely place a significant burden on the domain controller. Keep these roles together to provide easy, predictable management. Forest-level role placement on a Global Catalog server In addition to hosting the schema master and domain naming master roles, the first domain controller created in a forest also hosts the global catalog. Domain-level role placement on the same domain controller The three domain-level roles are assigned to the first domain controller created in a new domain. Except for the forest root domain, leave the roles at that location. Keep the roles together unless the workload on your operations master justifies the additional management burden of separating the roles. Because all clients prior to Active Directory submit updates to the PDC emulator, the domain controller holding that role uses a higher number of RIDs. Place the PDC emulator and RID master roles on the same domain controller so that these two roles interact more efficiently. If you must separate the roles, you can still use a single standby operations master for all three roles. However, you must ensure that the standby is a replication partner of all three of the role holders. Backup and restore procedures also become more complex if you separate the roles. Special care must be taken to restore a domain controller that hosted an operations master role. By hosting the roles on a single computer, you minimize the steps that are required to restore a role holder. Domain-level role absence on a Global Catalog server Do not host the infrastructure master on a domain controller that is acting as a global catalog server. The infrastructure master updates the names of security principals for any domain-named linked attributes. For example, if a user from one domain is a member of a group in a second domain and the users name is changed in the first domain, then the second domain is not notified that the users name must be updated in the groups membership list. Because domain controllers in one domain do not replicate security principals to domain controllers in another domain, the second domain never becomes aware of the change.
The infrastructure master constantly monitors group memberships, looking for security principals from other domains. If it finds one, it checks with the security principals domain to verify that the information is updated. If the information is out of date, the infrastructure master performs the update and then replicates the change to the other domain controllers in its domain. Two exceptions apply to this rule. First, if all the domain controllers are global catalog servers, the domain controller that hosts the infrastructure master role is insignificant because global catalogs do replicate the updated information regardless of the domain to which they belong. Second, if the forest has only one domain, the domain controller that hosts the infrastructure master role is not needed because security principals from other domains do not exist. Because it is best to keep the three domain-level roles together, avoid putting any of them on a global catalog server. Domain-level role placement on a higher performance domain controller Host the PDC emulator role on a powerful and reliable domain controller to ensure that it is available and capable of handling the workload. Of all the operations master roles, the PDC emulator creates the most overhead on the server that is hosting the role. It has the most intensive daily interaction with other systems on the network. The PDC emulator has the greatest potential to affect daily operations of the directory. Domain controllers can become overloaded while attempting to service client requests on the network, manage their own resources, and handle any specialized tasks such as performing the various operations master roles. This is especially true of the domain controller holding the PDC emulator role. Again, clients prior to Active Directory and domain controllers running Windows NT 4.0 rely more heavily on the PDC emulator than Active Directory clients and Windows 2000 Server domain controllers. If your networking environment has clients and domain controllers prior to Active Directory, you might need to reduce the workload of the PDC emulator. If a domain controller begins to indicate that it is overloaded and its performance is affected, you can reconfigure the environment so that some tasks are performed by other, less-used domain controllers. By adjusting the domain controllers weight in the DNS environment, you can configure the domain controller to receive fewer client requests than other domain controllers on your network. Optionally, you can adjust the domain controllers priority in the DNS environment so that it processes client requests only if other DNS servers are unavailable. With fewer DNS client requests to process, the domain controller can use more resources to perform operations master services for the domain.
a new domain controller. A domain controller is eligible to host the domain-level roles if it is a member of the same domain. A domain controller is eligible to host a forest-level role if it is a member of the same forest. Configuration changes Configuration changes to domain controllers or the network topology can result in the need to transfer master operations roles. Except for the infrastructure master, you can assign operations master roles to any domain controller regardless of any other tasks that the domain controller performs. Do not host the infrastructure master role on a domain controller that is also acting as a global catalog server unless all of the domain controllers in the domain are global catalog servers or unless only one domain is in the forest. If the domain controller hosting the infrastructure master role is configured to be a global catalog server, you must transfer the infrastructure master role to another domain controller. Changes to the network topology can result in the need to transfer operations master roles in order to keep them in a particular site. You can reassign an operations master role by transfer or, as a last resort, by seizure. Important If you must seize an operations master role, never reattach the previous role holder to the network without following the procedures in this guide. Incorrectly reattaching the previous role holder to the network can result in invalid data and corruption of data in the directory.
The following tools are required to perform the procedures for this task: Active Directory Sites and Services Repadmin.exe
To complete this task, perform the following procedures: 1. Determine whether a domain controller is a global catalog server 2. Create a connection object on the current operations master 3. Create a connection object on the standby operations master 4. Verify successful replication to a domain controller
replication you are checking, you can specify a destination domain controller in the command. Repadmin lists INBOUND NEIGHBORS for the current or specified domain controller. INBOUND NEIGHBORS shows the distinguished name of each directory partition for which inbound directory replication has been attempted, the site and name of the source domain controller, and whether replication succeeded or not, as follows: Last attempt @ YYYY-MM-DD HH:MM.SS was successful. Last attempt @ [Never] was successful.
If @ [Never] appears in the output for a directory partition, replication of that directory partition has never succeeded from the identified source replication partner over the listed connection. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group in the domain of the destination domain controller. To verify successful replication to a domain controller 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl servername /u:domainname\username /pw:* Term servername domainname Definition Specifies the name of the destination domain controller. Specifies the single-label name of the domain of the destination domain controller. (You do not have to use a fully qualified Domain Name System (DNS) name.) Specifies the name of an administrative account in that domain.
username
3. When you are prompted for a password, type the password for the user account that you provided, and then press ENTER. You can also use Repadmin to generate the details of replication to and from all replication partners in a spreadsheet. The spreadsheet displays data in the following columns:
Showrepl_COLUMNS Destination DC Site Destination DC Naming Context Source DC Site Source DC Transport Type Number of Failures Last Failure Time Last Success Time Last Failure Status The following procedure shows how to create this spreadsheet and set column headers for improved readability. To generate a repadmin /showrepl spreadsheet for all replication partners 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl * /csv >showrepl.csv 3. Open Microsoft Excel. 4. On the File menu, click Open, navigate to showrepl.csv, and then click Open. 5. Hide or delete column A as well as the Transport Type column, as follows: 6. Select a column that you want to hide or delete. To hide the column, on the Format menu, click Column, and then click Hide. Or To delete the column, right-click the selected column, and then click Delete. 7. Select row 1 beneath the column heading row, and then, on the Window menu, click Freeze Panes. 8. Select the entire spreadsheet. On the Data menu, click Filter, and then click
AutoFilter. 9. In the Last Success Time column, click the down arrow, and then click Sort Ascending. 10. In the Source DC column, click the down arrow, and then click Custom. 11. In the Custom AutoFilter dialog box, under Show rows where, click does not contain. In the adjacent text box, type del to eliminate from view the results for deleted domain controllers. 12. Repeat step 10 for the Last Failure Time column, but use the value does not equal, and type the value 0. 13. Resolve replication failures. The last successful attempt should agree with the replication schedule for intersite replication, or the attempt should be within the last hour for intrasite replication. If Repadmin reports any of the following conditions, see Troubleshooting Active Directory Replication Problems: The last successful intersite replication was prior to the last scheduled replication. The last intrasite replication was longer than one hour ago. Replication was never successful.
See Also
Troubleshooting Active Directory Replication Problems
In addition, you must determine if the domain controller that you intend to assume an operations master role is a global catalog server. However, the infrastructure master for each domain must not host the global catalog. Do not change the global catalog configuration on the domain controller that you intend to assume an operations master role unless your IT management authorizes that change. Changing the global catalog configuration can cause changes that can take days to complete, and the domain controller might not be available during that period. Instead, transfer the operations master roles to a different domain controller that is already properly configured. Transferring to a standby ops master By following the recommendations for operations master role placement, the standby operations master is a direct replication partner and is ready to assume the roles. Remember to designate a new standby for the domain controller that assumes the roles. Transferring an ops master role when no standby is ready If you do not follow the recommendations for role placement and you have not designated a standby operations master, you must properly prepare a domain controller to which you intend to transfer the operations master roles. Preparing the future role holder is the same process as preparing a standby operations master. You must manually create a Connection object to ensure that it is a replication partner with the current role holder and that replication between the two domain controllers is updated. In addition, you must determine whether the domain controller intended to assume an operations master role is a global catalog server. The infrastructure master for each domain must not host the global catalog. Task Requirements The following tools are required to perform the procedures for this task: Repadmin.exe Active Directory Sites and Services Active Directory Domains and Trusts Active Directory Schema snap-in Active Directory Users and Computers Ntdsutil.exe
To complete this task, perform the following procedures: 1. Verify successful replication to a domain controller
2. Determine whether a domain controller is a global catalog server 3. Install the Schema snap-in 4. Transfer the schema master 5. Transfer the domain naming master 6. Transfer the domain-level operations master roles 7. View the current operations master role holders
If @ [Never] appears in the output for a directory partition, replication of that directory partition has never succeeded from the identified source replication partner over the listed connection. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group in the domain of the destination domain controller. To verify successful replication to a domain controller 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl servername /u:domainname\username /pw:*
Definition Specifies the name of the destination domain controller. Specifies the single-label name of the domain of the destination domain controller. (You do not have to use a fully qualified Domain Name System (DNS) name.) Specifies the name of an administrative account in that domain.
username
3. When you are prompted for a password, type the password for the user account that you provided, and then press ENTER. You can also use Repadmin to generate the details of replication to and from all replication partners in a spreadsheet. The spreadsheet displays data in the following columns: Showrepl_COLUMNS Destination DC Site Destination DC Naming Context Source DC Site Source DC Transport Type Number of Failures Last Failure Time Last Success Time Last Failure Status The following procedure shows how to create this spreadsheet and set column headers for improved readability. To generate a repadmin /showrepl spreadsheet for all replication partners 1. Open a Command Prompt. 2. Type the following command, and then press ENTER:
repadmin /showrepl * /csv >showrepl.csv 3. Open Microsoft Excel. 4. On the File menu, click Open, navigate to showrepl.csv, and then click Open. 5. Hide or delete column A as well as the Transport Type column, as follows: 6. Select a column that you want to hide or delete. To hide the column, on the Format menu, click Column, and then click Hide. Or To delete the column, right-click the selected column, and then click Delete. 7. Select row 1 beneath the column heading row, and then, on the Window menu, click Freeze Panes. 8. Select the entire spreadsheet. On the Data menu, click Filter, and then click AutoFilter. 9. In the Last Success Time column, click the down arrow, and then click Sort Ascending. 10. In the Source DC column, click the down arrow, and then click Custom. 11. In the Custom AutoFilter dialog box, under Show rows where, click does not contain. In the adjacent text box, type del to eliminate from view the results for deleted domain controllers. 12. Repeat step 10 for the Last Failure Time column, but use the value does not equal, and type the value 0. 13. Resolve replication failures. The last successful attempt should agree with the replication schedule for intersite replication, or the attempt should be within the last hour for intrasite replication. If Repadmin reports any of the following conditions, see Troubleshooting Active Directory Replication Problems: The last successful intersite replication was prior to the last scheduled replication. The last intrasite replication was longer than one hour ago. Replication was never successful.
See Also
Troubleshooting Active Directory Replication Problems
2. Type the following command and then press ENTER: Regsvr32 schmmgmt.dll This command will register schmmgmt.dll on your computer. 3. Click Start, click Run, type mmc /a, and then click OK. 4. On the File menu, click Add/Remove Snap-in, and then click Add. 5. Under Available Standalone Snap-ins, double-click Active Directory Schema, click Close, and then click OK. 6. To save this console, on the File menu, click Save. 7. In Save in, point to the systemroot\system32 directory. 8. In File name, type schmmgmt.msc, and then click Save. 9. To create a shortcut on your Start menu: a. Right-click Start, click Open All Users, double-click the Programs folder, and then double-click the Administrative Tools folder. b. On the File menu, point to New, and then click Shortcut. c. In the Create Shortcut Wizard, in Type the location of the item, type schmmgmt.msc, and then click Next. d. On the Select a Title for the Program page, in Type a name for this shortcut, type Active Directory Schema, and then click Finish. Caution Modifying the schema is an advanced operation best performed by experienced programmers and system administrators. For detailed information about modifying the schema, see the Active Directory programmer's Guide at the Microsoft Web site.
Note This procedure is performed by using the Microsoft Management Console (MMC), although you can also transfer this role by using Ntdsutil.exe. For information about using Ntdsutil.exe to transfer operations master roles, type ? at the Ntdsutil.exe command prompt. Administrative Credentials To perform this procedure, you must be a Schema Administrator in Active Directory. Transfer the schema master 1. Open the Active Directory Schema snap-in. 2. In the console tree, right-click Active Directory Schema, and click Change Domain Controller. 3. In the Change Domain Controller dialog box, click Specify Name. Then, in the text box, type the name of the server to which you want to transfer the schema master role. Click OK. 4. In the console tree, right-click Active Directory Schema. Click Operations Master. The Change Schema Master box displays the name of the server that is currently holding the role. The targeted domain controller is listed in the second box. 5. Click Change. Click Yes to confirm your choice. The system confirms the operation. Click OK again to confirm that the operation succeeded. 6. Click Close to close the Change Schema Master dialog box. Note Hosting the infrastructure master on a global catalog server is not recommended. If you attempt to transfer the infrastructure master role to a domain controller that is a global catalog, the system displays a warning stating that this is not recommended.
Note This procedure is performed by using the Microsoft Management Console (MMC), although you can also transfer this role by using Ntdsutil.exe. For information about using Ntdsutil.exe to transfer operations master roles, type ? at the Ntdsutil.exe command prompt. Administrative Credentials To perform this procedure, you must be a member of the Enterprise Admins group in Active Directory. To transfer the domain naming master 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click Active Directory Domains and Trusts, and then click Connect to Domain Controller. 3. Ensure that the proper domain name is entered in the Domain box. The available domain controllers from this domain are listed. 4. In the Name column, click the domain controller (to select it) to which you want to transfer the role. Click OK. 5. Right-click Active Directory Domains and Trusts, and then click Operations Master. 6. The name of the current domain naming master appears in the first text box. The server to which you want to transfer the role should appear in the second text box. If this is not the case, repeat steps 1 through 4. 7. Click Change. To confirm the role transfer, click Yes. Click OK again to close the message box indicating the transfer took place. Click Close to close the Change Operations Master dialog box.
Note These procedures are performed by using MMC, although you can also transfer these roles by using Ntdsutil.exe. For information about using Ntdsutil.exe to transfer the operations master roles, type ? at the Ntdsutil.exe command prompt. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. To transfer a domain-level operations master role 1. Open Active Directory Users and Computers. 2. At the top of the console tree, right-click Active Directory Users and Computers. Click Connect to Domain Controller. 3. In the list of available domain controllers, click the name of the server to which you want to transfer the role, and then click OK. 4. At the top of the console tree, right-click Active Directory Users and Computers, point to All Tasks, and then click Operations Masters. The name of the current operations master role holder appears in the Operations master box. The name of the server to which you want to transfer the role appears in the lower box. 5. Click the tab for the role you want to transfer: RID, PDC, or Infrastructure. Verify the computer names that appear and then click Change. Click Yes to transfer the role, and then click OK. 6. Repeat steps 4 and 5 for each role that you want to transfer.
Administrative Credentials To perform this procedure, you must be logged on as a User or an Administrator. To view the current operations master role holder 1. Click Start, click Run, type ntdsutil, and then press ENTER. 2. At the ntdsutil: prompt, type roles and press ENTER. 3. At the fsmo maintenance: prompt, type connections and press ENTER. 4. At the server connections: prompt, type connect to server servername (where servername is the name of the domain controller that belongs to the domain containing the operations masters). 5. After receiving confirmation of the connection, type quit and press ENTER to exit this menu. 6. At the fsmo maintenance: prompt, type select operation target and press ENTER. 7. At the select operations target: prompt, type list roles for connected server and press ENTER. The system responds with a list of the current roles and the Lightweight Directory Access Protocol (LDAP) name of the domain controllers currently assigned to host each role. 8. Type quit and press ENTER to exit each prompt in Ntdsutil.exe. Type quit and press ENTER at the ntdsutil: prompt to close the window.
original role holder went offline. This can cause data loss or introduce data inconsistency into the directory database. To minimize the risk of losing data to incomplete replication, do not perform a role seizure until enough time has passed to complete at least one complete end-to-end replication cycle across your network. Allowing enough time for complete end-to-end replication ensures that the domain controller that assumes the role is as up-to-date as possible. Second, the original role holder is not informed that it is no longer the operations master role holder, which is not a problem if the original role holder stays offline. However, if it comes back online (for example, if the hardware is repaired or the server is restored from a backup), it might try to perform the operations master role that it previously owned. This can result in two domain controllers performing the same operations master role simultaneously. Depending on the role that was seized, the severity of duplicate operations master roles varies from no visible effect to potential corruption of the Active Directory database. Seize the operations master role to a domain controller that has the most recent updates from the current role holder to minimize the impact of the role seizure. Task Requirements Repadmin.exe Ntdsutil.exe
To complete this task, perform the following procedures: 1. Verify successful replication to a domain controller This needs to be the domain controller that will be seizing the role. 2. Seize the operations master role 3. View the current operations master role holders
Last attempt @ YYYY-MM-DD HH:MM.SS was successful. Last attempt @ [Never] was successful.
If @ [Never] appears in the output for a directory partition, replication of that directory partition has never succeeded from the identified source replication partner over the listed connection. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group in the domain of the destination domain controller. To verify successful replication to a domain controller 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl servername /u:domainname\username /pw:* Term servername domainname Definition Specifies the name of the destination domain controller. Specifies the single-label name of the domain of the destination domain controller. (You do not have to use a fully qualified Domain Name System (DNS) name.) Specifies the name of an administrative account in that domain.
username
3. When you are prompted for a password, type the password for the user account that you provided, and then press ENTER. You can also use Repadmin to generate the details of replication to and from all replication partners in a spreadsheet. The spreadsheet displays data in the following columns: Showrepl_COLUMNS Destination DC Site Destination DC Naming Context
Source DC Site Source DC Transport Type Number of Failures Last Failure Time Last Success Time Last Failure Status The following procedure shows how to create this spreadsheet and set column headers for improved readability. To generate a repadmin /showrepl spreadsheet for all replication partners 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl * /csv >showrepl.csv 3. Open Microsoft Excel. 4. On the File menu, click Open, navigate to showrepl.csv, and then click Open. 5. Hide or delete column A as well as the Transport Type column, as follows: 6. Select a column that you want to hide or delete. To hide the column, on the Format menu, click Column, and then click Hide. Or To delete the column, right-click the selected column, and then click Delete. 7. Select row 1 beneath the column heading row, and then, on the Window menu, click Freeze Panes. 8. Select the entire spreadsheet. On the Data menu, click Filter, and then click AutoFilter. 9. In the Last Success Time column, click the down arrow, and then click Sort Ascending. 10. In the Source DC column, click the down arrow, and then click Custom. 11. In the Custom AutoFilter dialog box, under Show rows where, click does
not contain. In the adjacent text box, type del to eliminate from view the results for deleted domain controllers. 12. Repeat step 10 for the Last Failure Time column, but use the value does not equal, and type the value 0. 13. Resolve replication failures. The last successful attempt should agree with the replication schedule for intersite replication, or the attempt should be within the last hour for intrasite replication. If Repadmin reports any of the following conditions, see Troubleshooting Active Directory Replication Problems: The last successful intersite replication was prior to the last scheduled replication. The last intrasite replication was longer than one hour ago. Replication was never successful.
See Also
Troubleshooting Active Directory Replication Problems
2. At the ntdsutil: prompt, type roles and press ENTER. 3. At the fsmo maintenance: prompt, type connections and press ENTER. 4. At the server connections: prompt, type connect to server servername (where servername is the name of the domain controller that will assume the operations master role), and press ENTER. 5. After you receive confirmation of the connection, type quit and press ENTER\. 6. Depending on the role you want to seize, at the fsmo maintenance: prompt, type the appropriate command and press ENTER. Role Domain naming master Schema master Infrastructure master PDC emulator RID master Credentials Enterprise Admins Enterprise Admins Domain Admins Domain Admins Domain Admins Command Seize domain naming master Seize schema master Seize infrastructure master Seize pdc Seize rid master
The system asks for confirmation. It then attempts to transfer the role. When the transfer fails, some error information appears and the system proceeds with the seizure. After the seizure is complete, a list of the roles and the LDAP name of the server that currently holds each role appears. During seizure of the RID master, the current role holder attempts to synchronize with its replication partners. If it cannot establish a connection with a replication partner during the seizure operation, it displays a warning and confirms that you want the role seizure to proceed. Click Yes to proceed. 7. Type quit and press ENTER. Type quit again and press ENTER to exit Ntdsutil.exe.
To complete this task, perform the following procedures: 1. Change the weight for DNS SRV records in the registry 2. Change the priority for DNS SRV records in the registry
Acknowledgements Produced by: Microsoft Windows Server User Assistance team Writer: Mary Hillman Editor: Jim Becker
Class registration database of component services. The Component Object Model (COM) is a binary standard for writing component software in a distributed systems environment. System volume (SYSVOL). SYSVOL provides a default location for files that must be shared for common access throughout a domain. The SYSVOL folder on a domain controller contains the following: Net Logon shared folders. These folders usually host user logon scripts and policy settings for network clients that are running preWindows 2000 operating systems. User logon scripts for Active Directoryenabled clients System policies Group Policy settings File system junctions
File Replication service (FRS) staging directories and files that are required to be available and synchronized between domain controllers Active Directory, including the following: The Active Directory database (Ntds.dit) The checkpoint file (Edb.chk) The transaction logs, each 10 megabytes (MB) in size (Edb*.log) Reserved transaction logs (Res1.log and Res2.log)
If you installed Windows Clustering or Certificate Services on your domain controller, they are also backed up as part of system state. Details of these components are not discussed in this guide.
Install Active Directory from backup media (using the dcpromo /adv command). You can use this installation option of Dcpromo to install Active Directory on a server running Windows Server 2003 to make that server an additional domain controller. Use this method to quickly add a domain controller to a domain that has a large database or that is located in sites that are separated by slow network links. Perform a forest recovery if forest-wide failure occurs.
Backup Guidelines
The following guidelines for backup include the performance of appropriate backups to ensure redundancy of Active Directory data: Perform normal backup. Normal backup is the only type of backup that is available and supported for Active Directory. The Backup tool in Windows Server 2003 supports multiple types of backup: normal, copy, incremental, differential, and daily. You must use normal backup because Active Directory is backed up as part of system state. Perform daily backups of each unique partition on at least two unique domain controllers, with special emphasis on single-domain controller forests, single-domain controller domains, and empty root domains. Where partitions exist in only one site, you can ship backup files offsite to a secure location so that no backup file of a unique directory partition exists in only one physical site at any point in time. This provides an extra level of redundancy. Make sure your backups are stored in a secure location at all times.
Back up Domain Name System (DNS) zones. You must be aware of the location of DNS zones and back up DNS servers accordingly. If you use Active Directoryintegrated DNS, DNS zone data is captured as part of system state on domain controllers that are also DNS servers. If you do not use Active Directory-integrated DNS, you must back up the zone file directories on a representative set of DNS servers for each DNS zone to ensure fault tolerance for the zone. Note The DNS server stores settings in the registry, so system state backup is required for DNS regardless of whether the zone data is Active Directory-integrated or stored in the file system. If you have application partitions in your forest, make sure that you take a backup of the domain controllers that hold those application partitions. Create additional backups in every geographic location where: Mission-critical work is performed. A wide area network (WAN) outage would disrupt business.
The elapsed time that it takes to perform either of the following tasks would be cost-prohibitive because of slow link speeds, the size of the directory database, or both: To create a domain controller in its intended domain over the network. Or To copy or transport a system state backup from a site where a backup exists to a site that has no backup, for the purpose of performing an installation from backup media. Note A backup can be used to restore only the domain controller on which the backup was generated or to create a new additional domain controller in the same domain by installing from backup media. A backup cannot be used to restore a different domain controller or to restore a domain controller onto different hardware. Likewise, a backup that is made on a domain controller running Windows 2000 Server cannot be used to restore a domain controller running Windows Server 2003.
Backup Frequency
Backup frequency depends on criteria that vary for individual environments. In most Active Directory environments, users, computers, and administrators make daily changes to directory objects. For example, computer accounts, including domain controller accounts, change their passwords every 30 days by default. Therefore, every day a percentage of computer passwords changes for domain controllers. Rolling the computer password of a domain controller back to a former state affects authentication and replication. A percentage of user passwords might also expire on a daily basis, and if they are lost as a result of domain controller failure, they must be reset manually. Generally, no record of these changes exists except in Active Directory. Therefore, the more frequently you back up domain controllers, the fewer problems you will encounter if you need to restore. The more Active Directory objects and domain controllers you have, the more frequent your backups should be. For example, in a large organization, to recover from the inadvertent deletion of a large organizational unit (OU) by restoring the domain from a backup that is days or weeks old, you might have to re-create hundreds of accounts that were created in that OU since the backup was taken. To avoid re-creating accounts and potentially performing large numbers of manual password resets, ensure that recent system state backups are always available to recover recent Create, Modify, and Delete operations.
Frequency Criteria
Use the following criteria to assess backup frequency: Small environments with a single domain controller in the forest, or domains that exist in a single physical location (that is, that have a single point of failure): create backups at least daily. Medium (10 to 49 domain controllers) and large environments (50 to 1,000 or more domain controllers): Create backups of each unique directory partition in the forest on two different computers at least daily with an emphasis on backing up application directory partitions, empty root domains, domain partitions in a single geographic site, and sites that have large populations of users or that host mission-critical work. Make backups with increasing frequency until you are confident that if you were to lose the objects that were created or modified since the last backup, the loss would not create an operational disruption. For this reason, major changes to the environment should always be immediately followed by a new system state backup.
Note It is always recommended that you have at least two domain controllers in each domain of your Active Directory forest
Immediate Backup
In addition to regularly scheduled backups, perform an immediate backup when: You have moved the Active Directory database, log files, or both to a different location on a disk. A domain controller is upgraded from Windows 2000 Server to Windows Server 2003 or there are any other operating system upgrades. A Service Pack is installed. A hotfix is installed that makes changes to the Active Directory database.
A current backup is required for installing from backup media for a new domain controller. The tombstone lifetime is changed administratively.
See Also
Installing a Domain Controller in an Existing Domain Using Restored Backup Media
Restoring a Domain Controller Through Reinstallation and Subsequent Restore from Backup Restoring a Domain Controller Through Reinstallation
Whether the backup domain controller contains MD5 checksum data to source the Sysvol tree The date that the backup was performed
For example, you might use a file name format that is similar to the following: X:\Fully_Qualified_Computer_Name.Build_Number.Service_Pack_Revision. [No]GC. [No]MD5.TSL.YYYYMMDD.bkf where Fully_Qualified_Computer_Name is the host name and the domain name of the domain controller. This must be the domain name of the domain where the system state was backed up. Build Number is the build number of the operating system that was backed up.
Service_Pack_Revision is the service pack build number and the service pack version for the operating system that was backed up. [No]GC indicates whether the backup originated from a global catalog or not.
[No]MD5 indicates whether the system state backup contains MD5 checksum data for the files and folders in the SYSVOL tree. For more information about the need for MD5 data, see Preparing a Server Computer for Shipping and Installation from Backup Media. TSL is the value in days for the tombstoneLifetime attribute when the backup was performed. The tombstoneLifetime attribute for the forest determines both the useful life of a system state backup and how frequently garbage collection occurs. (Garbage collection removes tombstones from the directory permanently when their tombstone lifetime expires.) YYYYMMDD is the year, month, and day that the backup was performed.
For example, suppose that you create a system state backup of a global catalog domain controller on July 1, 2005. The domain controller is in the Contoso.com domain, and its name is DC1. The value of the tombstone lifetime is 60 days, and MD5 data is included in the backup. In this scenario, you might use a file name that is similar to the following: DC1.CONTOSO.COM.3790.SP0.GC.MD5.60.2005.07.01.BKF A system state backup that you make of DC1 on July 1, 2005, remains valid until August 29, 2005. For the next 60 days, you can use the backup to restore an existing domain controller or to install an additional domain controller in the Contoso.com domain. You can save the .bkf file to a local volume or to a network share. The network share can be on a server computer that can be installed later as a domain controller by using the
restored backup. For more information about using restored backup media for installing domain controllers, see Installing a Domain Controller in an Existing Domain Using Restored Backup Media. Task requirements The following tools are required to perform the procedures for this task: Backup or Restore Wizard (Ntbackup) Tape drive or other backup media
To complete this task, perform one of the following procedures, depending on your backup needs: Back up system state Back up system state and the system disk
See Also
Installing a Domain Controller in an Existing Domain Using Restored Backup Media Adding Domain Controllers in Remote Sites
Note To back up system state, you must log on locally to the domain controller, or Remote Desktop must be enabled on the remote domain controller so that you can connect remotely. Administrative credentials To perform the following two procedures, you must be a member of the Domain Admins group or a member of the Backup Operators group. To back up system state including system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. This procedure provides steps for backing up in Wizard Mode. By default, the Always Start in Wizard Mode check box is selected in the Backup or Restore Wizard. If the Welcome to the Backup Utility Advanced Mode page appears, click Wizard Mode to open the Backup or Restore Wizard. 2. On the Welcome to the Backup or Restore Wizard page, click Next. 3. Select Back up files and settings, and then click Next. 4. Select Let me choose what to back up, and then click Next. 5. In the Items to Back Up window, double-click My Computer. 6. In the expanded list below My Computer, check System State, and then click Next. 7. Select a location to store the backup: If you are backing up to a file, type the path and file name for the backup (.bkf) file (or click Browse to find a folder or file). If you are backing up to a tape unit, choose the tape that you want to use. Note You should not store the backup on the local hard drive. Instead, store it in a location, such as a tape drive, away from the computer that you are backing up. 8. Type a name for this backup according to the recommendations in Backing Up Active Directory Components, and then click Next. 9. On the last page of the wizard, click Advanced. 10. Do not change the default options for Type of Backup. Normal should be
selected, and the check box for Backup migrated remote storage data should remain cleared. Click Next. 11. Select Verify data after backup, and then click Next. 12. In the Backup Options dialog box, select a backup option, and then click Next. 13. If you are replacing the existing backups, select the option to allow only the owner and administrator access to the backup data and to any backups that are appended to this medium, and then click Next. 14. In the When to back up box, select the appropriate option for your needs, and then click Next. 15. If you are satisfied with all of the options that are selected, click Finish to perform the backup operation according to your selected schedule. Note The system state can also be backed up by using Ntbackup from a command line with appropriate parameters. For more information, at a command prompt type ntbackup /?. The following procedure produces a smaller .bkf file that does not include system boot files. By using this procedure, you can reduce the time that is required to perform the backup and subsequent restore, as well as the amount of disk space that is required. This method is recommended when the restored backup is to be used for installing additional domain controllers. To back up system state excluding system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. 2. On the Welcome to the Backup or Restore Wizard page, click Advanced Mode, and then click the Backup tab. 3. In the console tree, select the System State check box. 4. In Backup media or file name, type a name for this backup according to the recommendations in Backing Up Active Directory Components. 5. Click Start Backup, and then click Advanced. 6. Clear the Automatically back up System Protected Files with the System State check box, and then click OK. 7. Click Start Backup.
See Also
Enable Remote Desktop Create a Remote Desktop Connection
In the Select the backup type box, click File if you want to back up to a file. If you do not have a tape backup unit installed, File is selected automatically. Or Select a tape device if you want to back up to tape.
7. In the Choose a place to save your backup box, select one of the following options, and then click Next: If you are backing up to a file, if you want to change the current backup file location, click Browse to find a folder or file. If the destination folder or file does not exist, the system creates it. Or If you are backing up to a tape unit, select the tape that you want to use.
8. On the Completing the Backup Wizard page, click Advanced. Do not change the default options for Type of Backup. Normal should be selected, and the check box should remain cleared for Backup migrated remote storage data. Click Next. 9. Click Verify data after backup, and then click Next. 10. In the Backup Options dialog box, select a backup option, and then click Next. 11. If you are replacing the existing backups, select the option to allow only the owner and administrator access to the backup data and to any backups that are appended to this medium, and then click Next. 12. In the When to back up box, select the appropriate option for your needs, and then click Next. 13. If you are satisfied with all of the options that are selected, click Finish to perform the backup operation according to your selected schedule.
See Also
Enable Remote Desktop Create a Remote Desktop Connection
1. Restart the domain controller in Directory Services Restore Mode by using one of the following methods: Restart the domain controller in Directory Services Restore Mode locally Restart the domain controller in Directory Services Restore Mode Remotely
Note In cases in which you have to reinstall the operating system, before you restore the directory, you do not have to perform a nonauthoritative restore in Directory Services Restore Mode. After you reinstall the operating system, you can perform a restore after the computer boots normally. 2. Restore from backup media 3. Verify Active Directory restore
See Also
Performing an Authoritative Restore of Active Directory Objects Enable Remote Desktop Create a Remote Desktop Connection
To restart the domain controller in Directory Services Restore Mode locally 1. Restart the domain controller. 2. When the screen for selecting an operating system appears, press F8. 3. On the Windows Advanced Options menu, select Directory Services Restore Mode. 4. When you are prompted, log on as the local administrator.
See Also
Restart the domain controller in Directory Services Restore Mode Remotely
2. Right-click My Computer, click Properties, and then click the Advanced tab. 3. Click Settings for startup and recovery. 4. Click the Edit button to edit the startup options file. 5. Modify the default entry to include the /SAFEBOOT:DSREPAIR switch, as shown in the following example: multi(0)disk(0)rdisk(0)partition(2)\WINNT="W2K DC \\your server name" /fastdetect /SAFEBOOT:DSREPAIR Note The /SAFEBOOT:DSREPAIR switch works for domain controllers running Windows 2000 Server and Windows Server 2003. 6. Save the modified Boot.ini file, and then close Notepad. 7. On the Start menu, click Shut Down, and then click Restart. During the restart process, the Terminal Services client reports that the session is disconnected. Caution Be sure to click Restart and not Shut Down at this step. If you click Shut Down, you cannot restart the domain controller remotely. 8. Wait until the restart process completes on the remote domain controller, and then reconnect the client session. 9. When the client session is reconnected, log on as the local administrator. 10. Right-click My Computer, click Properties, and then click the Advanced tab. 11. Click Settings for startup and recovery. 12. Click the Edit button to edit the startup options file. 13. Delete the /SAFEBOOT:DSREPAIR switch from the default entry in the Boot.ini file, save the file, and then close Notepad. Important If you restart the domain controller before you modify the Boot.ini file, the domain controller remains offline. The Boot.ini file is now returned to its original state, which starts the domain controller normally.
See Also
Enable Remote Desktop Create a Remote Desktop Connection Restart the domain controller in Directory Services Restore Mode locally
8. Click Leave existing files (Recommended), and then click Next. 9. In Advanced Restore Options, select the following check boxes, and then click Next: Restore security settings
Restore junction points, but not the folders and file data they reference Preserve existing volume mount points
10. For a primary restore of SYSVOL, also select the following check box: When restoring replicated data sets, mark the restored data as the primary data for all replicas. A primary restore is required only if the domain controller that you are restoring is the only domain controller in the domain. A primary restore is required on the first domain controller that is being restored in a domain if you are restoring the entire domain or forest. 11. Click Finish. 12. When the restore process is complete, click Close, and then do one of the following: If you do not want to authoritatively restore any objects, click Yes to restart the computer. The system will restart and replicate any new information that is received since the last backup with its replication partners. If you want to authoritatively restore any objects or if you want to create an LDAP Data Interchange Format (LDIF) file to restore back-links on this domain controller, click No to remain in Directory Services Restore Mode. For information about how to proceed with authoritative restore, see Performing an Authoritative Restore of Active Directory Objects.
See Also
Restart the domain controller in Directory Services Restore Mode locally Enable Remote Desktop Create a Remote Desktop Connection Restart the domain controller in Directory Services Restore Mode Remotely Restore system state to an alternate location Performing an Authoritative Restore of Active Directory Objects
replication system. This change ensures that any data that you restore authoritatively is replicated from the restored domain controller to other domain controllers in the forest. An authoritative restore should not be used to restore an entire domain controller, nor should it be used as part of a change-control infrastructure. Proper delegation of administration and change enforcement will optimize data consistency, integrity, and security. It is important to ensure successful recovery of the information that is being restored. Group membership is particularly sensitive and can be affected greatly by the procedures that are followed during an authoritative restore.
restoring the membership on a user object necessarily involves updating the member attribute on the group object to include the distinguished name of the restored user. Note Only the forward-link attribute value can be updated and replicated. The back-link attribute value is generated only when it is accessed. It is not stored on the object, and it is not replicated. When you use the Ntdsutil command-line tool to authoritatively restore a subtree or single object, the ability of Ntdsutil to restore the group memberships of an object that is authoritatively restored depends on whether the group was created before or after LVR was implemented. For example, if a user object is restored and the user belongs to group G1 that was created before LVR was implemented and the user belongs to group G2 that was created after LVR was implemented (the functional level of the forest was raised to Windows Server 2003 interim or Windows Server 2003), the member attribute of G2 is updated during authoritative restore (and, therefore, the memberOf attribute of the restored user is updated), but the member attribute of G1 is not updated. However, improvements in the version of Ntdsutil that is included with Windows Server 2003 Service Pack 1 (SP1) provide the ability to also restore the memberships of groups that were created before LVR was implemented.
Procedures for Domain Controllers Running Windows Server 2003 with SP1
These procedures include the use of an LDIF file to restore group memberships following authoritative restore of the objects. If you are restoring objects that can belong to groups in more than one domain, additional steps are required. Task requirements The following tools are required to perform the procedures for this task: Ntbackup.exe Ntdsutil.exe Repadmin.exe
To complete this task, perform the following procedures in order: 1. Restore from backup media Restore system state to return the domain controller to its state at the time of the backup. To ensure that replication does not occur, click No at the end of the procedure so that the domain controller does not restart. 2. Mark the object or objects authoritative Mark the object or objects that you want to restore so that replication does not overwrite them when you restart the domain controller. 3. Restart the domain controller normally. 4. Synchronize replication with all partners For the newly restored object to become available and be instantiated in its restored form on all domain controllers, successful replication must occur between the domain controller that originates the restored changes and its partners. Make sure that all domain controllers in the domain and all global catalog servers in the forest have received the restored objects. 5. Use the following procedure to run the LDIF file that was created in step 2 on this domain controller to add the missing group memberships in the domain that you have just restored: Run an LDIF file to recover back-links 6. If you are restoring user or group objects in a forest that has more than one domain, perform the following steps on a domain controller in another domain: a. Restart the domain controller in Directory Services Restore Mode locally
b. Restore from backup media c. While still in Directory Services Restore Mode, use Ntdsutil to Create an LDIF file for recovering back-links for authoritatively restored objects d. Restart the domain controller normally (not in Directory Services Restore Mode). e. Run an LDIF file to recover back-links in this domain on a different domain controller than the one on which you created the LDIF file 7. Repeat step 6 for each additional domain.
Procedures for Domain Controllers Running Windows Server 2003 with No Service Pack Installed
To complete this task, perform the following procedures in order: Note If the objects that were deleted do not include group objects, you do not have to perform steps 3 through 10. In addition, if the groups that were deleted do not have members among the list of deleted objects, you do not have to perform steps 3 through10. 1. Restore from backup media Restore system state to return the domain controller to its state at the time of the backup. To ensure that replication does not occur, click No at the end of the procedure so that the domain controller does not restart. 2. Mark the object or objects authoritative Mark the object or objects that you want to restore so that replication does not overwrite them when you restart the domain controller. 3. Restart the computer normally, but in isolation. This step allows you to control replication so that inbound replication does not update any restored object before forcing outbound replication. You cannot turn off inbound replication in Directory Services Restore Mode. The most common way to start a computer in isolation is to remove the network connection from the domain controller by physically removing the network cable. Alternative methods may be possible, depending on your network hardware and enterprise practices.
It is important to prevent the domain controller from communicating with any other domain controller in the domain or forest. You should also isolate the domain controller from any clients that might change an object in the directory. 4. Turn off inbound replication This step is required only if the domain or forest functional level is Windows 2000 native or earlier. By turning off inbound replication, you ensure that no changes replicate in to the domain controller and alter group membership. 5. Reconnect the computer to the network. After you turn off inbound replication, it is safe to reconnect the domain controller to the network. If you isolated your computer by removing the network cable or by disconnecting the network connection from the domain controller, reconnect it to bring the domain controller back onto the network. If you followed other procedures based on your enterprise network equipment, follow the equipment's recommendations for reconnecting the domain controller to the network. 6. Synchronize replication with all partners For the newly restored object to become available and be instantiated in its restored form on all domain controllers, successful replication must occur between the domain controller that originates the restored changes and its partners. Make sure that all domain controllers in the domain and all global catalog servers in the forest have received the restored objects. 7. Restart the domain controller in Directory Services Restore Mode locally 8. Mark the object or objects authoritative One of the challenges of restoring objects, and their group memberships, is the fact that the membership and object may replicate in different orders. If the membership replicates before a user is restored, the receiving domain controller will not update the membership because the user does not exist. To overcome the effects of this behavior, it is necessary to mark the objects that have been restored as authoritative a second time and once again have the information replicated out. 9. Restart the computer normally (not in Directory Services Restore Mode). After the authoritative restore of the object or objects has completed a second time, you can restart the domain controller in normal mode. 10. Turn on inbound replication
Restore junction points, but not the folders and file data they reference
10. For a primary restore of SYSVOL, also select the following check box: When restoring replicated data sets, mark the restored data as the primary data for all replicas. A primary restore is required only if the domain controller that you are restoring is the only domain controller in the domain. A primary restore is required on the first domain controller that is being restored in a domain if you are restoring the entire domain or forest. 11. Click Finish. 12. When the restore process is complete, click Close, and then do one of the following: If you do not want to authoritatively restore any objects, click Yes to restart the computer. The system will restart and replicate any new information that is received since the last backup with its replication partners. If you want to authoritatively restore any objects or if you want to create an LDAP Data Interchange Format (LDIF) file to restore back-links on this domain controller, click No to remain in Directory Services Restore Mode. For information about how to proceed with authoritative restore, see Performing an Authoritative Restore of Active Directory Objects.
See Also
Restart the domain controller in Directory Services Restore Mode locally Enable Remote Desktop Create a Remote Desktop Connection Restart the domain controller in Directory Services Restore Mode Remotely Restore system state to an alternate location Performing an Authoritative Restore of Active Directory Objects
Directory Services Restore Mode. To complete this procedure, you must know the full distinguished name of the object or objects that you want to restore. Administrative credentials To perform this procedure, you must provide the Administrator password for Directory Services Restore Mode. To mark a subtree or individual object authoritative 1. In Directory Services Restore Mode, click Start, click Run, type ntdsutil, and then press ENTER. 2. At the ntdsutil: prompt, type authoritative restore, and then press ENTER. 3. To restore a subtree or individual object, type one of the following commands, as appropriate, and then press ENTER: To restore a subtree (for example, an organizational unit and all child objects): restore subtree DistinguishedName To restore a single object: restore object DistinguishedName
DistinguishedName
The distinguished name of the subtree or object that is to be marked authoritative 4. Click Yes in the message box to confirm the command. For example, if you want to restore a deleted organizational unit named Marketing NorthAm in the corp.contoso.com domain, type: restore subtree OU=Marketing NorthAm,DC=corp,DC=contoso,DC=com (Always enclose the distinguished name in quotes when there is a space or other special characters within the distinguished name.) Ntdsutil attempts to mark the object as authoritative. The output message indicates the status of the operation. The most common cause of failure is an incorrectly specified distinguished name or a backup for which the distinguished name does not exist (which occurs if you try to restore a deleted user that was created after the backup). If you are running this command on a domain controller running Windows Server 2003 with Service Pack 1 (SP1), Ntdsutil provides output that indicates whether a restored object has back-links that must be restored. If objects
that have back-links are found, Ntdsutil generates a set of files that you can use to restore the back-links in this domain and in other domains, if necessary. The following sample output on a domain controller running Windows Server 2003 with SP1 shows that Ntdsutil created a text file (.txt) and an LDAP Data Interchange Format (LDIF) file (.ldf) when the marked object was found to have back-links:
Successfully updated 3 records. The following text file with a list of authoritatively restored objects has been created in the current working directory: ar_20050209-091249_objects.txt One or more specified objects have back-links in this domain. The following LDIF files with link restore operations have been created in the current working directory: ar_20050209-091249_links_Test1.com.ldf Authoritative Restore completed successfully.
5. Make a note of the location of the .txt and .ldf files, if any. You will use the .ldf file to restore back-links in this domain. You will use the .txt file to generate an LDIF file to restore back-links in a different domain, if necessary. If you have other domains in which you want to restore back-links for this restored object, make a copy of this .txt file to use on a domain controller in another domain. 6. At the authoritative restore: and ntdsutil: prompts, type quit, and then press ENTER. 7. Restart the domain controller in normal operating mode, as follows: a. For a domain controller running Windows Server 2003 with no service pack installed: Disconnect the domain controller from the network, and then restart normally. Follow the instructions in "Procedures for Domain Controllers Running Windows Server 2003 with No Service Pack Installed" as described in Performing an Authoritative Restore of Active Directory Objects. b. For a domain controller running Windows Server 2003 with SP1: Restart the domain controller normally, and then follow the instructions in "Procedures for Domain Controllers Running Windows Server 2003 with SP1" as described in Performing an Authoritative Restore of Active Directory Objects.
/e /d /A /P /q
2. Check for replication errors in the output of the command in the previous step. If there are no errors, replication is successful. For replication to complete, any errors must be corrected.
See Also
Verify successful replication to a domain controller
The name of the .ldf file that you want to run, for example, ar_20050609174604_links_corp.contoso.com.ldf
See Also
Create an LDIF file for recovering back-links for authoritatively restored objects
See Also
Restart the domain controller in Directory Services Restore Mode Remotely
Create an LDIF file for recovering backlinks for authoritatively restored objects
If you have authoritatively restored objects that have back-links in another domain, you can use this procedure to create an LDAP Data Interchange Format (LDIF) file that you can run
against a domain controller in that domain to restore the back-links. Perform this procedure on a domain controller in the domain that has the back-links. Before you perform this procedure, you must: Copy the .txt file that Ntdsutil created during the authoritative restore procedure, which you performed on the first domain controller, to a location on this domain controller or a network share. Restore this domain controller from backup media.
After you restore this domain controller from backup media, perform this procedure while the domain controller is still running in Directory Services Restore Mode. Administrative credentials To perform this procedure, you must provide the Administrator password for Directory Services Restore Mode. To create an LDIF file for restoring back-links for authoritatively restored objects 1. In Directory Services Restore Mode, click Start, click Run, type ntdsutil, and then press ENTER. 2. At the ntdsutil: prompt, type authoritative restore, and then press ENTER. 3. At the authoritative restore: prompt, type the following command, and then press ENTER: create ldif files from TextFilePath where TextFilePath is the location and file name of the .txt file that Ntdsutil created during the initial authoritative restore of the object whose back-links you want to restore, for example, d:\ldif\ar_20050609_091558_objects.txt. Ntdsutil displays a message stating that one or more specified objects have backlinks in this domain and an LDIF file has been created in the current working directory. 4. At the authoritative restore: and ntdsutil: prompts, type quit.
See Also
Restore from backup media Run an LDIF file to recover back-links
See Also
Turn on inbound replication
2. Type the following command, and then press ENTER: repadmin /options ServerName -DISABLE_INBOUND_REPL where ServerName is the network basic input/output system (NetBIOS) name of the domain controller. 3. Verify that the option is set. The following message should appear: Current DC options: DISABLE_INBOUND_REPL New DC Options: <none> Current DC Options displays the conditions that were in effect at the time that you ran the command. New DC Options shows the effect of the command, which is that the option to disable replication is not set.
See Also
Turn off inbound replication
To complete this task, perform the following procedures: 1. Restore from backup media 2. Mark the application directory partition as authoritative 3. Restart the computer
Once the authoritative restore of the object or objects has been completed a second time, the domain controller can be restarted in normal mode.
Restore junction points, but not the folders and file data they reference Preserve existing volume mount points
10. For a primary restore of SYSVOL, also select the following check box: When restoring replicated data sets, mark the restored data as the primary data for all replicas. A primary restore is required only if the domain controller that you are restoring is the only domain controller in the domain. A primary restore is required on the first domain controller that is being restored in a domain if you are restoring the entire domain or forest. 11. Click Finish. 12. When the restore process is complete, click Close, and then do one of the following: If you do not want to authoritatively restore any objects, click Yes to restart the computer. The system will restart and replicate any new information that is received since the last backup with its replication partners. If you want to authoritatively restore any objects or if you want to create an LDAP Data Interchange Format (LDIF) file to restore back-links on this domain controller, click No to remain in Directory Services Restore Mode. For information about how to proceed with authoritative restore, see Performing an Authoritative Restore of Active Directory Objects.
See Also
Restart the domain controller in Directory Services Restore Mode locally Enable Remote Desktop Create a Remote Desktop Connection Restart the domain controller in Directory Services Restore Mode Remotely Restore system state to an alternate location Performing an Authoritative Restore of Active Directory Objects
The restore operation does not restore links to a SOM (Scope of Management). Any existing links will continue to be usedfor example, when restoring an existing GPO to a previous state. However, if the user has deleted a GPO and all links to the GPO, the user must recreate these links after restoring the GPO. To facilitate recreating these links, you can view the report in the backup to identify all links in the domain of the GPO. For more information, see Administering Group Policy with the GPMC on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=17528). Task Requirements The following tool is required to perform the procedures for this task: Group Policy Management Console
To complete this task, perform the following procedure: Restore a Group Policy Object
Restoring a Domain Controller Through Reinstallation and Subsequent Restore from Backup
If you cannot restart a domain controller in Directory Services Restore Mode, you can restore it through reinstallation of the operating system and subsequent restore of Active Directory from backup. After you reinstall Windows Server 2003, perform a nonauthoritative restore of the system state and the system disk. You do not need to join the computer to the domain before performing the restore procedure. During the restore, the computer account is reestablished automatically.
Note The restore procedure must be performed by using the same backup tool with which the backup was made. Procedures in this task describe using Ntbackup to restore Active Directory, but you must use the tool that you used to create the backup file if it is not Ntbackup. Restore a domain controller through reinstallation and restore the system state from backup if the following conditions exist: A domain controller has failed and you cannot restart in Directory Services Restore Mode. If the failure was caused by a hardware failure, you have resolved the hardware problem (for example, by replacing the disk). You have a previous backup for the failed domain controller that is not older than the tombstone lifetime for the forest. The domain controller is running other server services such as Exchange, or it contains other data that you must restore from a backup. You have the following information about the failed domain controller: Disk configuration. You need a record of the volumes and sizes of the disks and partitions. In the case of a complete disk failure, use this information to recreate the disk configuration. Windows Server 2003 must be reinstalled to the same drive letter and with at least the same amount of physical drive space. Before you restore the system state, you must recreate all disk configurations. Failure to recreate all disk configurations can cause the restore process to fail and can prevent you from starting the domain controller after the restore. Computer name. You need the computer name to restore a domain controller of the same name and avoid changing client configuration settings. Password for the local computer Administrator account. You must know the local Administrator password that was used when the backup was created. The local Administrator password is also required to restore the system state on a domain controller. Task requirements The following tool is required to perform the procedures for this task: Ntbackup.exe
To complete this task, perform the following procedures: 1. Install Windows Server 2003.
Note This guide does not provide information for the installation of Windows Server 2003. 2. Restore from backup media a. Begin with step 2 of this procedure. You cannot start the server in Directory Services Restore Mode because Active Directory is not installed. b. This operation requires that you log on as the local Administrator, not the Administrator for Directory Services Restore Mode. c. Restore the System State as described, but in normal mode.
d. When you are prompted to restart the server after you complete the restore operation, click Yes to restart the server normally. 3. Verify Active Directory restore
appears, click Wizard Mode to open the Backup or Restore Wizard. 3. On the Welcome to the Backup or Restore Wizard page, click Next. 4. Click Restore files and settings, and then click Next. 5. Select System State, and then click Next. 6. On the Completing the Backup or Restore Wizard page, click Advanced. 7. In Restore files to, click Original Location, and then click Next. 8. Click Leave existing files (Recommended), and then click Next. 9. In Advanced Restore Options, select the following check boxes, and then click Next: Restore security settings
Restore junction points, but not the folders and file data they reference Preserve existing volume mount points
10. For a primary restore of SYSVOL, also select the following check box: When restoring replicated data sets, mark the restored data as the primary data for all replicas. A primary restore is required only if the domain controller that you are restoring is the only domain controller in the domain. A primary restore is required on the first domain controller that is being restored in a domain if you are restoring the entire domain or forest. 11. Click Finish. 12. When the restore process is complete, click Close, and then do one of the following: If you do not want to authoritatively restore any objects, click Yes to restart the computer. The system will restart and replicate any new information that is received since the last backup with its replication partners. If you want to authoritatively restore any objects or if you want to create an LDAP Data Interchange Format (LDIF) file to restore back-links on this domain controller, click No to remain in Directory Services Restore Mode. For information about how to proceed with authoritative restore, see Performing an Authoritative Restore of Active Directory Objects.
See Also
Restart the domain controller in Directory Services Restore Mode locally Enable Remote Desktop Create a Remote Desktop Connection Restart the domain controller in Directory Services Restore Mode Remotely Restore system state to an alternate location Performing an Authoritative Restore of Active Directory Objects
To complete this task, perform the following procedures: 1. If you plan to give the newly reinstalled domain controller the same name as the failed computer, use the following procedure to clean up server metadata to remove the NTDS Settings object of the failed domain controller: Clean up server metadata If you plan to give the new domain controller a different name, in addition to cleaning up server metadata, perform the following additional procedures: Delete a Server object from a site Delete a Computer object from the Domain Controllers OU 2. Install Windows Server 2003 It is assumed that you will perform a fresh installation of Windows Server 2003. Prepare for installation of the operating system by partitioning or reformatting your hard disk drive, if necessary. 3. Verify DNS registration and functionality 4. Verify communication with other domain controllers 5. Verify the availability of the operations masters 6. Install Active Directory During the installation process, replication occurs, which ensures that the domain controller has an accurate and up-to-date copy of Active Directory. You have the option to use the same information for this domain controller as the domain controller that it is replacing: site placement, domain controller name, and domain membership should remain the same. If you plan to install the domain controller under a different name, see Installing a Domain Controller in an Existing Domain. 7. Verifying Active Directory Installation
or seize any operations master roles that the retired domain controller holds. These additional processes are performed automatically. Administrative credentials To complete this procedure, you must be a member of the Enterprise Admins group. To clean up server metadata 1. Open a command prompt. 2. Type the following command, and then press ENTER: ntdsutil 3. At the ntdsutil: prompt, type: metadata cleanup 4. Perform metadata cleanup as follows: If you are performing metadata cleanup by using the version of Ntdsutil.exe that is included with Windows Server 2003 SP1, at the metadata cleanup: prompt, type: remove selected server ServerName Or remove selected server ServerName1 on ServerName2 Value ServerName, ServerName1 Definition The distinguished name of the domain controller whose metadata you want to remove, in the form cn=ServerName,cn=Servers,cn=SiteName, cn=Sites,cn=Configuration,dc=ForestRootDomain The DNS name of the domain controller to which you want to connect and from which you want to remove server metadata
ServerName2
If you are performing metadata cleanup by using the version of Ntdsutil.exe that is included with Windows Server 2003 with no service pack, perform metadata cleanup as follows: a. At the metadata cleanup: prompt, type:
connection b. At the server connections: prompt, type: connect to server Server c. At the server connections: prompt, type:
quit d. At the metadata cleanup: prompt, type: select operation target e. At the select operation target: prompt, type: list sites A numbered list of sites appears. f. At the select operation target: prompt, type:
select site SiteNumber g. At the select operation target: prompt, type: list domains in site A numbered list of domains in the selected site appears. h. At the select operation target: prompt, type: select domain DomainNumber i. At the select operation target: prompt, type:
list servers in site A numbered list of servers in a domain and site appears. j. At the select operation target: prompt, type:
Value Server
Description The DNS name of a domain controller that you want to connect to The number associated with the site of the server that you want to clean up that appears in the list The number associated with the domain of the server that you want to clean up that appears in the list The number associated with the server that you want to clean up that appears in the list
SiteNumber
DomainNumber
ServerNumber
At this point, Active Directory confirms that the domain controller was removed successfully. If you receive an error message that indicates that the object cannot be found, Active Directory might have already removed the domain controller. 5. At the metadata cleanup: and ntdsutil: prompts, type quit.
Important Do not delete a Server object that has a Child object. If an NTDS Settings or other Child object appears below the Server object you want to delete, either replication on the domain controller on which you are viewing the Configuration container has not occurred, or the server whose Server object you are removing has not been properly decommissioned. 4. Click Yes to confirm your choice.
See Also
Forcing the Removal of a Domain Controller Clean up server metadata
To verify communication with other domain controllers 1. Open a Command Prompt. 2. Type the following command and then press ENTER: netdiag /test:dsgetdc Note For a more detailed response from this command, add /v to the end of the command. If domain controllers are successfully located, the last line of the response is DC discovery test..: Passed. The verbose option lists the specific domain controllers that are located. If the test fails, do not attempt any additional steps until you determine and fix the problem that prevents communication with other domain controllers.
To verify the availability of the operations masters 1. Open a Command Prompt. 2. Type the following command to ensure that the operations masters can be located and then press ENTER: dcdiag /s: domaincontroller /test:knowsofroleholders /verbose where domaincontroller is the name of a domain controller in the domain in which you want to add the new domain controller. The verbose option provides a detailed list of the operations masters that were tested. Near the bottom of the screen, a message confirms that the test succeeded. If you use the verbose option, look carefully at the bottom part of the displayed output. The test confirmation message appears immediately after the list of operations masters. Press ENTER. 3. Type the following command to ensure that the operations masters are functioning properly and are available on the network: dcdiag /s: domaincontroller /test:fsmocheck where domaincontroller is the name of a domain controller in the domain in which you want to add the new domain controller. The verbose option provides a detailed list of the operations masters that were tested. Near the bottom of your screen, a message confirms that the test succeeded. Press ENTER. If these tests fail, do not attempt any additional steps until you determine and fix the problem that prevents locating operations masters and verifying that they are functioning properly.
Next. 3. For Domain Controller Type, select Additional domain controller for an existing domain. Click Next. 4. For Network Credentials, enter the user name, password, and domain for the user account that has permission to add this new domain controller to the domain. Click Next. 5. Enter the name of the domain that you want the new domain controller to host. Click Next. 6. For Database and Log Locations, enter the paths for the locations of the directory database (Ntds.dit) and the log files. For better performance, store the database and log files on separate physical disk drives. Click Next. 7. For Shared System Volume, enter the path where you want to locate the system volume (SYSVOL). Click Next. 8. Under Directory Services Restore Mode Administrator Password, enter the password that you want to use when you need to start Directory Services Restore Mode. Click Next. 9. The Summary screen displays a list of the items you chose. Verify that the information is correct, and then click Next to proceed with the installation. 10. The wizard proceeds to install Active Directory. When it finishes, the wizard displays a summary screen listing the domain and site in which the new domain controller is a member. Verify that this information is correct. Click Finish to close the wizard. 11. Click Restart to restart the domain controller. 12. Let the domain controller restart. If any message indicates that one or more services has failed to start, restart the domain controller one more time. If the initial replication cycles have not had enough time to complete during the first restart on a new domain controller, some services may be unable to start successfully. If the message appears during additional restarts, examine the event logs in Event Viewer to determine the cause of the problem.
Acknowledgements Published: March 2005 Applies to: Windows Server 2003 Produced by: Microsoft Windows Server User Assistance team Writer: Mary Hillman Editor: Jim Becker
Managing sites in Active Directory involves adding new subnet, site, and site link objects when the network grows, as well as configuring a schedule and cost for site links. You can modify the site link schedule, cost, or both, to optimize intersite replication. When conditions no longer require replication to a site, or clients no longer require the sites to discover network resources, you can remove the site and associated objects from Active Directory.
Note Managing large hub-and-spoke topology or using the SMTP intersite replication transport is beyond the scope of this documentation. Managing sites: Enables clients to discover network resources (printers, published shares, domain controllers) that are close to the physical location of the client, reducing network traffic over wide area network (WAN) links. Optimizes replication between domain controllers.
To complete this task, perform the following procedures: 1. Create a site object and add it to an existing site link 2. Associate a range of IP addresses with the site by using either of the following methods: Create a subnet object or objects and associate them with the new site
3. If you are creating both a new site and a new site link, after you create the new site and add it to an existing site link, Create a site link object and add the appropriate sites. Then, remove the site from the first site link that you added it to when you created the site, if appropriate. 4. Remove the site from the site link
Create a subnet object or objects and associate them with the new site
Create a Subnet object or objects and associate them with the new site you must have the following information: The site to which the subnet is to be associated. The network address or any IP address in the range.
Active Directory Sites and Services converts this information into the subnet address. Administrative Credentials To perform this procedure, you must be a member of the Enterprise Admins group in Active Directory. To create a subnet object or objects and associate them with the new site 1. Open Active Directory Sites and Services. 2. Expand the Sites container, right-click Subnets, and then click New Subnet. 3. In the New Object - Subnet dialog box, in the Address box, type the network address or any IP address within the range of IP addresses for the subnet. 4. In the Mask box, type the subnet mask. 5. In the Site Name box, click the site to which this subnet is being associated, and then click OK.
When you have temporarily associated the subnet with a different site and want to associate it with its permanent site. Administrative Credentials To perform this procedure, you must be a member of the Enterprise Admins group in Active Directory. To associate an existing subnet object with the new site 1. Open Active Directory Sites and Services. 2. Expand the Sites container, and then click the Subnets container. 3. In the details pane, right-click the subnet with which you want to associate the
site, and then click Properties. 4. In the Site box, click the site with which to associate the subnet, and then click OK.
To perform this procedure, you must be a member of the Enterprise Admins group in Active Directory. To remove a site from a site link 1. Open Active Directory Sites and Services. 2. Expand the Sites container and then the Inter-Site Transports container. 3. Click IP. In the details pane, right-click the site link from which you want to remove a site, and then click Properties. 4. In the Sites in this site link box, click the site you want to remove from the site link. 5. Click Remove, and then click OK.
To complete this task, perform the following procedures: 1. Create a site link object and add the appropriate sites 2. By default, the KCC runs every 15 minutes to generate the replication topology. To generate the intersite topology immediately, perform the following two procedures:
Determine the ISTG role owner for a site Generate the replication topology on the ISTG
To determine the ISTG role owner for a site 1. Open Active Directory Sites and Services. 2. Click the site object whose ISTG you want to determine. 3. In the details pane, right-click the NTDS Site Settings object, and then click Properties. The current role owner appears in the Server box under Inter-Site Topology Generator.
To complete this task, perform the following procedures: 1. Configure the site link schedule to identify times during which intersite replication can occur 2. Configure the site link interval to identify how often replication polling can occur during the schedule window 3. Configure the site link cost to establish a priority for replication routing 4. Generate the intersite topology by performing the following two procedures: Determine the ISTG role owner for a site Generate the replication topology on the ISTG
Configure the site link schedule to identify times during which intersite replication can occur
Use the properties on the Site Link object to define when replication is allowed. Obtain the schedule from your design team. Administrative Credentials To perform this procedure, you must be a member of the Enterprise Admins group in Active Directory. To configure the site link schedule 1. Open Active Directory Sites and Services. 2. Expand the Sites container and the Inter-Site Transports container, and then click the IP container. 3. In the details pane, right-click the Site Link object you want to configure, and then click Properties. 4. In the SiteLinkName Properties dialog box, click Change Schedule. 5. In the Schedule for SiteLinkName dialog box, select the block of days and hours during which you want replication to occur or not occur (available or not available), and then click the appropriate option. 6. Click OK twice.
Configure the site link interval to identify how often replication polling can occur during the schedule window
Use the properties on the Site Link object to determine how often during the available replication schedule you want bridgehead servers to poll their intersite replication partners for changes. Obtain the interval value from your design team. Administrative Credentials
To perform this procedure, you must be a member of the Enterprise Admins group in Active Directory. To configure the site link interval 1. Open Active Directory Sites and Services. 2. Expand the Sites container and the Inter-Site Transports container, and then click the IP container. 3. In the details pane, right-click the Site Link object you want to configure, and then click Properties. 4. In the Replicate every _____ minutes box, specify the number of minutes for the intervals at which replication polling occurs during an open schedule, and then click OK.
Configure the site link cost to establish a priority for replication routing
When creating or modifying site links, use the object properties to configure the relative cost of using the site link. Administrative Credentials To perform this procedure, you must be a member of the Enterprise Admins group in Active Directory. To configure the site link cost 1. Open Active Directory Sites and Services. 2. Expand the Sites container and the Inter-Site Transports container, and then click the IP container. 3. In the details pane, right-click the Site Link object you want to configure, and then click Properties. 4. In the Cost box, specify the number for the comparative cost of using the site link, and then click OK.
2. Expand the Sites container, and then expand the site that contains the server on which you want to run the KCC. 3. Expand the Servers container, and then click the Server object for the ISTG. 4. In the details pane, right-click NTDS Settings, click All Tasks, and then click Check Replication Topology. 5. In the Check Replication Topology message box, click OK.
TCP/IP Settings
When you move a domain controller to a different site, if an IP address of the domain controller is statically configured, then you must change the TCP/IP settings accordingly. The IP address of the domain controller must map to a Subnet object that is associated with the site to which you are moving the domain controller. If the IP address of a domain controller does not match the site in which the Server object appears, the domain controller might be forced to communicate over a potentially slow WAN link to locate resources rather than locating resources in its own site. Prior to moving the domain controller, ensure that the following TCP/IP client values are appropriate for the new location: IP address, including the subnet mask and default gateway DNS server addresses WINS server addresses (if appropriate)
If the domain controller that you are moving is a DNS server, you must also:
Change the TCP/IP settings on any clients that have static references to the domain controller as the preferred or alternate DNS server. Determine whether the parent DNS zone of any zone that is hosted by this DNS server contains a delegation to this DNS server. If yes, update the IP address in all such delegations. For information about creating DNS delegations, see Verifying Active Directory Installation.
To complete this task, perform the following procedures in order: 1. Change the static IP address of a domain controller 2. Create a delegation for a domain controller If the parent DNS zone of any zone that is hosted by this DNS server contains a delegation to this DNS server, use this procedure to update the IP address in all such delegations. If your forest root domain has a parent DNS domain, perform this procedure on a DNS server in the parent domain. If you just added a new domain controller to a child domain, perform this procedure on a DNS server in the DNS parent domain. By following recommended practices, the parent domain is the forest root domain. 3. Verify that an IP address maps to a subnet and determine the site association 4. Determine whether the server is a preferred bridgehead server 5. Configure the server to not be a preferred bridgehead server 6. Move the Server object to the new site
To change the static IP address of a domain controller 1. Log on locally to the domain controller whose IP address you want to change. 2. On the desktop, right-click My Network Places and then click Properties. 3. In the Network Connections dialog box, right-click Local Area Connection, and then click Properties. 4. In the Local Area Connection Properties dialog box, double-click Internet Protocol (TCP/IP). 5. In the Internet Protocol (TCP/IP) Properties dialog box, in the IP address box, type the new address. 6. In the Subnet mask box, type the subnet mask. 7. In the Default gateway box, type the default gateway. 8. In the Preferred DNS server box, type the address of the DNS server that this computer contacts. 9. In the Alternate DNS server box, type the address of the DNS server that this computer contacts if the preferred server is unavailable. 10. If this domain controller uses WINS servers, click Advanced and then, in the Advanced TCP/IP Settings dialog box, click the WINS tab. 11. If an address in the list is no longer appropriate, click the address, and then click Edit. 12. In the TCP/IP WINS Server dialog box, type the new address, and then click OK. 13. Repeat steps 11 and 12 for all addresses that need to be changed, and then click OK twice to close the TCP/IP WINS Server dialog box and the Advanced TCP/IP Settings dialog box. 14. Click OK to close the Internet Protocol (TCP/IP) Properties dialog box.
Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group. To create a delegation for a domain controller 1. Open the DNS snap-in. 2. Navigate to ChildDomain (where ChildDomain is the name of the child domain) in the console tree. 3. In the console tree, right-click ChildDomain, and then click Properties. 4. In the ChildDomain Properties sheet, on the Name Servers tab, click Add. 5. In the New Resource Record dialog box, in the Server fully qualified domain name (FQDN) box, type ChildDC.ChildDomain.ParentDomain (where ChildDC is the name of the new domain controller, ChildDomain is the name of the child domain, and ParentDomain is the name of the parent domain). 6. In the New Resource Record dialog box, in the IP address box, type IPAddress (where IPAddress is the IP address of the child domain controller), click Add, and then click OK.
Verify that an IP address maps to a subnet and determine the site association
Use this procedure to determine the site to which you want to add a Server object prior to installing Active Directory, or to verify the appropriate site prior to moving a Server object to it. To be associated with a site, the IP address of a domain controller must map to a Subnet object that is defined in Active Directory. The site to which the subnet is associated is the site of the domain controller. The subnet address, which is computed from the IP network address and the subnet mask, is the name of a Subnet object in Active Directory. When you know the subnet address, you can locate the Subnet object and determine the site to which the subnet is associated. Administrative Credentials
To perform this procedure, you must be a member of the Domain Users group. To verify that an IP address maps to a subnet and determine the site association 1. Log on locally or open a Terminal Services connection to the server for which you want to check the IP address. 2. On the desktop, right-click My Network Places, and then click Properties. 3. In the Network Connections dialog box, right-click Local Area Connection, and then click Properties. 4. Double-click Internet Protocol (TCP/IP). 5. Use the values in IP address and Subnet mask to calculate the subnet address and then click OK. 6. Click OK again and close the Network Connections dialog box. 7. Open Active Directory Sites and Services. 8. Expand the Sites container, and then click the Subnets container. 9. In the Name column in the details pane, find the Subnet object that matches the subnet address. 10. In the Site column, note the site to which the IP subnet address is associated. If the site that appears in the Site box is not the appropriate site, contact a supervisor and find out whether the IP address is incorrect or whether to move the Server object to the site indicated by the subnet.
adsiedit.msc 2. In ADSI Edit, expand the Configuration Container and then expand CN=Configuration,DC=ForestRootDomainName, CN=Sites, and CN=Inter-Site Transports. 3. Right-click CN=IP and then click Properties. 4. In the Attributes box, double-click bridgeheadServerListBL. 5. If any preferred bridgehead servers are selected in any site in the forest, the Values box displays the distinguished name for each server object that is currently selected as a preferred bridgehead server.
Removing a Site
If domain controllers are no longer needed in a network location, you can remove them from the site and then delete the Site object. Before deleting the site, you must remove
domain controllers from the site either by removing it entirely or by moving it to a new location. To remove the domain controller, remove Active Directory from the server and then delete the Server object from the site in Active Directory. To retain the domain controller in a different location, move the domain controller to a different site and then move the Server object to the respective site in Active Directory. Domain controllers can host other applications that depend on site topology and publish objects as Child objects of the respective Server object. For example, when MOM or Message Queuing is running on a domain controller, these applications create Child objects beneath the Server object. In addition, a server running Message Queuing that is not a domain controller and is configured to be a routing server running Message Queuing creates a Server object in the Sites container. Removing the application from the server automatically removes the Child object below the respective Server object. However, the Server object is not removed automatically. When all applications have been removed from the server (no Child objects appear beneath the Server object), you can remove the Server object. After the application is removed from the server, a replication cycle might be required before Child objects are no longer visible below the Server object. After you delete or move the Server objects but before you delete the Site object, reconcile the following objects: IP addresses: If the addresses are being reassigned to a different site, associate the Subnet object or objects with that site. Any clients using the addresses for the decommissioned site will thereafter be assigned automatically to the other site. If the IP addresses will no longer be used on the network, delete the corresponding Subnet object or objects. Site Link objects: If the site you are removing is added to a site link containing only two sites, delete the Site Link object. If the site you are removing is added to a site link that contains more than two sites, do not delete this Site Link object. Before removing a site, you need to consider the implications. If the site you are removing is added to more than one site link, it might be an interim site between other sites that are added to this site link. Deleting the site might disconnect the outer sites from each other. In this case, the site links must be reconciled according to the instructions of the design team.
Task Requirements The following tool is required to perform the procedures for this task: Active Directory Sites and Services
To complete this task, perform the following procedures: 1. Determine whether a Server object has child objects 2. Delete a Server object from a site 3. Delete the Site Link object 4. Associate the subnet or subnets with the appropriate site 5. Delete the Site object 6. To avoid replication errors on bridgehead servers in other sites that received replication from the site that has been removed, generate the intersite topology in those sites by performing the following two procedures: Determine the ISTG role owner for a site Generate the replication topology on the ISTG
2. Expand the Sites container and the Inter-Site Transports container, and then click the IP container. 3. In the details pane, right-click the Site Link object you want to delete, and then click Delete. 4. Click Yes to confirm your choice.
When you have temporarily associated the subnet with a different site and want to associate it with its permanent site. Administrative Credentials To perform this procedure, you must be a member of the Enterprise Admins group. To associate the subnet or subnets with the appropriate site 1. Open Active Directory Sites and Services. 2. Expand the Sites container, and then click the Subnets container. 3. In the details pane, right-click the subnet with which you want to associate the site, and then click Properties. 4. In the Site box, click the site with which to associate the subnet, and then click OK. If the IP addresses are no longer in use, delete the Subnet object or objects with which the addresses are associated.
Introduction to Administering the Active Directory Database Managing the Active Directory Database
Acknowledgements Published: March 2005 Applies to: Windows Server 2003 Produced by: Microsoft Windows Server User Assistance team Writer: Mary Hillman Editor: Jim Becker
A need to recover physical space following bulk deletion or removal of the global catalog Monitor free disk space on the partition or partitions that store the directory database and logs. The following are the recommended parameters for free space: Ntds.dit partition: The greater of 20 percent of the Ntds.dit file size or 500 megabytes (MB). Log file partition: The greater of 20 percent of the combined log files size or 500 MB. Ntds.dit and logs on the same volume: The greater of 1 gigabyte (GB) or 20 percent of the combined Ntds.dit and log files sizes.
During ordinary operation, the customer will delete objects from Active Directory. When an object is deleted, it results in white space (or unused space) being created in the database. On a regular basis, the database will consolidate this white space through a process called defragmentation, and this white space will be reused when new objects are added (without adding any size to the file itself). This automatic online defragmentation redistributes and retains white space for use by the database, but does not release it to the file system. Therefore, the database size does not shrink, even though objects might be deleted. In cases where the data is decreased significantly, such as when the global catalog is removed from a domain controller, white space is not automatically returned to the file system. Although this condition does not affect database operation, it does result in large amounts of white space in the database. You can use offline defragmentation to decrease the size of the database file by returning white space from the database file to the file system. Managing the Active Directory database also allows you to upgrade or replace the disk on which the database or log files are stored or to move the files to a different location, either permanently or temporarily. Prior to performing any procedures that affect the directory database, be sure that you have a current system state backup. For information about performing system state backup, see Back up system state. To manage the database file itself, you must take the domain controller offline by restarting in Directory Services Restore Mode, and then use Ntdsutil.exe to manage the file. Note NTFS disk compression is not supported for the database and log files.
Returning Unused Disk Space from the Active Directory Database to the File System
The registry entry that Ntdsutil.exe updates when you move the log files is as follows: In HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\ Parameters: Database log files path
Note If you replace or reconfigure a drive that stores the SYSVOL folder, you must first move the SYSVOL folder manually. For information about moving SYSVOL manually, see Relocating SYSVOL Manually. To complete this task, perform the following procedures: Note The domain controller will not be available during the time in which files are being moved and until the move is verified. Ensure that alternate domain controllers are available during the file relocation to handle the capacity. 1. Determine the size and location of the Active Directory database by using one of the following procedures: Determine the database size and location online Determine the database size and location offline
2. Compare the size of the directory database files to the volume size 3. Back up system state System state includes the database file and log files as well as SYSVOL and Net Logon shared folders, among other things. Always ensure that you have a current backup prior to moving database files. 4. Restart the domain controller in Directory Services Restore Mode by using one of the following methods: Restart the domain controller in Directory Services Restore Mode locally Restart the domain controller in Directory Services Restore Mode Remotely
5. Move or copy the directory database and log files by performing one of the following procedures: Move the directory database and log files to a local drive Copy the directory database and log files to a remote share
The shared folder on a remote drive must have enough free space to hold the database file (Ntds.dit) and log files. Create separate subdirectories for copying the database file and the log files. 6. Back up system state
H:\NTDS>dir Volume in drive H has no label. Volume Serial Number is 003D-0E9E Directory of H:\NTDS 01/29/2002 11:04 AM 01/29/2002 11:04 AM 01/28/2002 03:03 PM 01/29/2002 10:29 AM 01/29/2002 10:29 AM 01/29/2002 10:29 AM 01/29/2002 10:29 AM 01/28/2002 02:54 PM 01/28/2002 02:54 PM 7 File(s) 3 Dir(s) <DIR> <DIR> <DIR> . .. Drop
8,192 edb.chk 10,485,760 edb.log 10,485,760 edb00001.log 14,696,448 ntds.dit 10,485,760 res1.log 10,485,760 res2.log
If you have set garbage collection logging to report free disk space, then event ID 1646 in the Active Directory service log also reports the size of the database file: Total allocated hard disk space (megabytes): Alternatively, you can determine the size of the database file by listing the contents of the directory that contains the files. Administrative Credentials To perform this procedure, you must be an administrator on the local computer. To determine the database size and location offline 1. With the domain controller in Directory Services Restore Mode, open a command prompt, type ntdsutil and then press ENTER 2. At the ntdsutil: prompt, type files and then press ENTER. 3. At the file maintenance: prompt, type info and press ENTER. 4. At the file maintenance: prompt, type quit and then press ENTER. Type quit and then press ENTER again to quit Ntdsutil.exe.
Compare the size of the directory database files to the volume size
Before moving any files in response to low disk space, verify that no other files on the volume are responsible for the condition of low disk space. You might need to relocate the database file, the log files, or both, if disk space on the volume on which they are stored becomes low. Before moving the database file or log files, examine the size of the database folder, logs folder, or both, if they are stored in the same location, relative to the size of the volume to verify that these files are the cause of low disk space. Include the size of the SYSVOL folder if it is on the same partition. Administrative Credentials If you are online when comparing the size of the directory database files, you must be a member of the Domain Users group. If you are offline, you must be an administrator on the local computer.
To compare the size of the directory database files to the volume size 1. In Windows Explorer, click My Computer. 2. On the View menu, click Details. 3. In the Name column in the details pane, locate the volume. Make a note of the value in the Total Size column. 4. Navigate to the folder that stores the database file, the log files, or both. 5. Right-click the folder, and then click Properties. Make a note of the value in Size on disk. 6. If the volume includes SYSVOL, navigate to that folder and repeat step 5. 7. Compare the sizes. If the combined size of the relevant database files and SYSVOL files (if appropriate) is significantly smaller than the volume size, then check the contents of the volume for other files. 8. If other files are present, move those files and reassess the disk space on the volume.
Note To back up system state, you must log on locally to the domain controller, or Remote Desktop must be enabled on the remote domain controller so that you can connect remotely. Administrative credentials To perform the following two procedures, you must be a member of the Domain Admins group or a member of the Backup Operators group. To back up system state including system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. This procedure provides steps for backing up in Wizard Mode. By default, the Always Start in Wizard Mode check box is selected in the Backup or Restore Wizard. If the Welcome to the Backup Utility Advanced Mode page appears, click Wizard Mode to open the Backup or Restore Wizard. 2. On the Welcome to the Backup or Restore Wizard page, click Next. 3. Select Back up files and settings, and then click Next. 4. Select Let me choose what to back up, and then click Next. 5. In the Items to Back Up window, double-click My Computer. 6. In the expanded list below My Computer, check System State, and then click Next. 7. Select a location to store the backup: If you are backing up to a file, type the path and file name for the backup (.bkf) file (or click Browse to find a folder or file). If you are backing up to a tape unit, choose the tape that you want to use. Note You should not store the backup on the local hard drive. Instead, store it in a location, such as a tape drive, away from the computer that you are backing up. 8. Type a name for this backup according to the recommendations in Backing Up Active Directory Components, and then click Next. 9. On the last page of the wizard, click Advanced. 10. Do not change the default options for Type of Backup. Normal should be
selected, and the check box for Backup migrated remote storage data should remain cleared. Click Next. 11. Select Verify data after backup, and then click Next. 12. In the Backup Options dialog box, select a backup option, and then click Next. 13. If you are replacing the existing backups, select the option to allow only the owner and administrator access to the backup data and to any backups that are appended to this medium, and then click Next. 14. In the When to back up box, select the appropriate option for your needs, and then click Next. 15. If you are satisfied with all of the options that are selected, click Finish to perform the backup operation according to your selected schedule. Note The system state can also be backed up by using Ntbackup from a command line with appropriate parameters. For more information, at a command prompt type ntbackup /?. The following procedure produces a smaller .bkf file that does not include system boot files. By using this procedure, you can reduce the time that is required to perform the backup and subsequent restore, as well as the amount of disk space that is required. This method is recommended when the restored backup is to be used for installing additional domain controllers. To back up system state excluding system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. 2. On the Welcome to the Backup or Restore Wizard page, click Advanced Mode, and then click the Backup tab. 3. In the console tree, select the System State check box. 4. In Backup media or file name, type a name for this backup according to the recommendations in Backing Up Active Directory Components. 5. Click Start Backup, and then click Advanced. 6. Clear the Automatically back up System Protected Files with the System State check box, and then click OK. 7. Click Start Backup.
See Also
Enable Remote Desktop Create a Remote Desktop Connection
See Also
Restart the domain controller in Directory Services Restore Mode Remotely
6. Save the modified Boot.ini file, and then close Notepad. 7. On the Start menu, click Shut Down, and then click Restart. During the restart process, the Terminal Services client reports that the session is disconnected. Caution Be sure to click Restart and not Shut Down at this step. If you click Shut Down, you cannot restart the domain controller remotely. 8. Wait until the restart process completes on the remote domain controller, and then reconnect the client session. 9. When the client session is reconnected, log on as the local administrator. 10. Right-click My Computer, click Properties, and then click the Advanced tab. 11. Click Settings for startup and recovery. 12. Click the Edit button to edit the startup options file. 13. Delete the /SAFEBOOT:DSREPAIR switch from the default entry in the Boot.ini file, save the file, and then close Notepad. Important If you restart the domain controller before you modify the Boot.ini file, the domain controller remains offline. The Boot.ini file is now returned to its original state, which starts the domain controller normally.
See Also
Enable Remote Desktop Create a Remote Desktop Connection Restart the domain controller in Directory Services Restore Mode locally
move logs to drive:\directory where Drive:\directory specifies the path to the new location. If the directory does not exist, then Ntdsutil.exe creates it. Note If the directory path contains any spaces, the entire path must be surrounded by quotation marks (for example, move db to "g:\new folder").
6. After the move completes, at the file maintenance: prompt, type quit and press ENTER. Type quit again and press ENTER to quit Ntdsutil.exe. 7. Change to the destination directory and then run the dir command to confirm the presence of the files. If you have moved the database file, then check the size of the Ntds.dit file against the file size you noted in step 2 to be sure that you are focused on the correct file. 8. If you are moving the database file or log files permanently, go to step 9. If you are moving the database file or log files temporarily, you can now perform any required updates to the original drive. After you update the drive, repeat steps 1 through 7 to move the files back to the original location. If the path to the database file or log files has not changed, go to step 10. 9. If the path to the database file or log files has changed from the original location, check permissions on the database folder or logs folder while still in Directory Services Restore Mode, as follows: a. In Windows Explorer, right-click the folder to which you have moved the database file or log files, and then click Properties. b. Click the Security tab, and verify that the permissions are: Administrators group has Allow Full Control. System has Allow Full Control. Inheritable permissions are not allowed (checkbox is cleared). No Deny permissions are selected. c. If the permissions in step 9b are in effect, then go to step 10. If permissions other than those described in step 9b are in effect, then perform steps 9d through 9k. d. If Allow inheritable permissions from parent to propagate to this object is selected, click to clear it. e. When prompted, click Copy to copy previously inherited permissions to this object. f. If Administrators or SYSTEM, or both, are not in the Name list, click Add. g. On the Select Users or Groups page, in the Look in: box, be sure the name of the local computer is selected. h. In the Name list, click System if needed, and then click Add. Repeat to
add Administrators, if needed, and then click OK. i. On the Security tab, click System and then in the Allow column, click Full Control. Repeat for Administrators. j. In the Name box, click any name that is not SYSTEM or Administrators, and then click Remove. Repeat until the only remaining accounts are Administrators and SYSTEM, and then click OK. Note Some accounts might appear in the form of security identifiers (SIDs). Remove any such accounts. k. Click OK to close Properties.
10. At the command prompt, type ntdsutil and then press ENTER. 11. At the ntdsutil: prompt, type files and then press ENTER. 12. At the file maintenance: prompt, type integrity and then press ENTER. If the integrity check fails, perform semantic database analysis with a fixup record. 13. If the integrity check succeeds, type quit and press ENTER to quit the file maintenance: prompt. Type quit again and press ENTER to quit Ntdsutil.exe. 14. Restart the domain controller normally. If you are performing this procedure remotely over a Terminal Services connection, be sure that you have modified the Boot.ini file for normal restarting before you restart the domain controller. If errors appear when you restart the domain controller: a. Restart the domain controller in Directory Services Restore Mode. b. Check the errors in Event Viewer. If the following events are logged in Event Viewer on restarting the domain controller, address the events as follows: Event ID 1046. The Active Directory database engine caused an exception with the following parameters. In this case, Active Directory cannot recover from this error and you must restore from backup media. Event ID 1168. Internal error: An Active Directory error has occurred. In this case, information is missing from the registry and you must restore from backup media.
H:\>net use K: \\SERVER1\NTDS /user:domainName\userName * Type the password for \\SERVER1\NTDS: Drive K: is now connected to \\SERVER1\NTDS The command completed successfully. 4. Use the xcopy command to copy the database file and log files to the location you established in step 3. In the example where the database file is located in H:\WINNT\NTDS and the share has the subdirectory database, the text you type is shown in bold: H:>xcopy WINNT\NTDS K:\DB The command copies the contents of WINNT\NTDS to the subfolder database in the shared folder described as drive K:. If the database file and log files are in different locations, repeat the xcopy command for the log files, specifying the subfolder for the log files. 5. Change drives to the new location and run the dir command to compare the file sizes to those listed in step 2. Use this step to ensure that you copy the correct set of files back to the local computer. 6. At this point, you can safely destroy data on the original local drive. 7. After the destination drive is prepared, re-establish a connection to the network drive as described in step 3, if necessary. 8. Copy the database and log files from the remote shared folder back to the original location on the domain controller. 9. At the command prompt, type ntdsutil and then press ENTER. 10. At the ntdsutil: prompt, type files and then press ENTER. 11. At the file maintenance: prompt, type integrity and then press ENTER. 12. If the integrity check fails, perform semantic database analysis with a fixup record. 13. If the integrity check succeeds, type quit and press ENTER to quit the file maintenance: prompt. Type quit again and press ENTER to quit Ntdsutil.exe. 14. Restart the domain controller normally. If you are performing this procedure remotely over a Terminal Services connection, be sure that you have modified the Boot.ini file for normal restarting before you restart the domain controller. If errors appear when you restart the domain controller: 1. Restart the domain controller in Directory Services Restore Mode.
2. Check the errors in Event Viewer. If the following events are logged in Event Viewer on restarting the domain controller, respond to the events as follows: Event ID 1046. The Active Directory database engine caused an exception with the following parameters. In this case, Active Directory cannot recover from this error and you must restore from backup media. Event ID 1168. Internal error: An Active Directory error has occurred. In this case, information is missing from the registry and you must restore from backup media.
Returning Unused Disk Space from the Active Directory Database to the File System
During ordinary operation, the white space in the Active Directory database file becomes fragmented. Each time garbage collection runs (every 12 hours, by default), white space is automatically defragmented online to optimize its use within the database file. The unused disk space is thereby maintained for the database; it is not returned to the file system. Only offline defragmentation can return unused disk space from the directory database to the file system. When database contents have decreased considerably through a bulk deletion (for example, you remove the global catalog from a domain controller), or if the size of the database backup is significantly increased due to the white space, use offline defragmentation to reduce the size of the Ntds.dit file. You can determine how much free disk space is recoverable from the Ntds.dit file by setting the garbage collection logging level in the registry. Changing the garbage collection logging level from the default value of 0 to a value of 1 results in event ID 1646 being logged in the directory service log. This event describes the total amount of disk space used by the database file as well as the amount of free disk space that is recoverable from the Ntds.dit file through offline defragmentation. At garbage collection logging level 0, only critical events and error events are logged in the directory service log. At level 1, high-level events are logged as well. Events can include one message for each major task that is performed by the service. At level 1, the following events are logged for garbage collection: Event IDs 700 and 701: report when online defragmentation begins and ends, respectively.
Event ID 1646: reports the amount of free space available in the database out of the amount of allocated space. Caution Setting the value of entries in the Diagnostics subkey to greater than 3 can degrade server performance and is not recommended. Following offline defragmentation, perform a database integrity check. The integrity command in Ntdsutil.exe detects binary-level database corruption by reading every byte in the database file. The process ensures that the correct headers exist in the database itself and that all of the tables are functioning and consistent. Therefore, depending upon the size of your Ntds.dit file and the domain controller hardware, the process might take considerable time. In testing environments, the speed of 2 GB per hour is considered to be typical. When you run the command, an online graph displays the percentage completed. Task requirements The following tools are required to perform the procedures for this task: Regedit.exe Backup software Ntdsutil.exe
To complete this task, perform the following procedures: 1. Change the garbage collection logging level to 1 2. Back up system state 3. Use one of the following procedures: Restart the domain controller in Directory Services Restore Mode locally
If you are logged on to the domain controller locally, restart the domain controller in Directory Services Restore Mode. Restart the domain controller in Directory Services Restore Mode Remotely
If you are using Remote Desktop Connection for remote administration, you can restart the domain controller remotely in Directory Services Restore Mode after modifying the Boot.ini file on the remote server. 4. Compact the directory database file (offline defragmentation) As part of the offline defragmentation procedure, check directory database integrity. 5. If database integrity check fails, perform semantic database analysis with fixup
Use these procedures to back up the system state only. These procedures do not back up the system disk or any other data on the domain controller except for the system-protected files. Use the first procedure, "To back up system state including system-protected files," for routine system state backup. Use the second procedure, "To back up system state excluding system-protected files," if you want to create a smaller backup that is effective for installing domain controllers from restored backup media. Note To back up system state, you must log on locally to the domain controller, or Remote Desktop must be enabled on the remote domain controller so that you can connect remotely. Administrative credentials To perform the following two procedures, you must be a member of the Domain Admins group or a member of the Backup Operators group. To back up system state including system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. This procedure provides steps for backing up in Wizard Mode. By default, the Always Start in Wizard Mode check box is selected in the Backup or Restore Wizard. If the Welcome to the Backup Utility Advanced Mode page appears, click Wizard Mode to open the Backup or Restore Wizard. 2. On the Welcome to the Backup or Restore Wizard page, click Next. 3. Select Back up files and settings, and then click Next. 4. Select Let me choose what to back up, and then click Next. 5. In the Items to Back Up window, double-click My Computer. 6. In the expanded list below My Computer, check System State, and then click Next. 7. Select a location to store the backup: If you are backing up to a file, type the path and file name for the backup (.bkf) file (or click Browse to find a folder or file). If you are backing up to a tape unit, choose the tape that you want to use. Note
You should not store the backup on the local hard drive. Instead, store it in a location, such as a tape drive, away from the computer that you are backing up. 8. Type a name for this backup according to the recommendations in Backing Up Active Directory Components, and then click Next. 9. On the last page of the wizard, click Advanced. 10. Do not change the default options for Type of Backup. Normal should be selected, and the check box for Backup migrated remote storage data should remain cleared. Click Next. 11. Select Verify data after backup, and then click Next. 12. In the Backup Options dialog box, select a backup option, and then click Next. 13. If you are replacing the existing backups, select the option to allow only the owner and administrator access to the backup data and to any backups that are appended to this medium, and then click Next. 14. In the When to back up box, select the appropriate option for your needs, and then click Next. 15. If you are satisfied with all of the options that are selected, click Finish to perform the backup operation according to your selected schedule. Note The system state can also be backed up by using Ntbackup from a command line with appropriate parameters. For more information, at a command prompt type ntbackup /?. The following procedure produces a smaller .bkf file that does not include system boot files. By using this procedure, you can reduce the time that is required to perform the backup and subsequent restore, as well as the amount of disk space that is required. This method is recommended when the restored backup is to be used for installing additional domain controllers. To back up system state excluding system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. 2. On the Welcome to the Backup or Restore Wizard page, click Advanced Mode, and then click the Backup tab.
3. In the console tree, select the System State check box. 4. In Backup media or file name, type a name for this backup according to the recommendations in Backing Up Active Directory Components. 5. Click Start Backup, and then click Advanced. 6. Clear the Automatically back up System Protected Files with the System State check box, and then click OK. 7. Click Start Backup.
See Also
Enable Remote Desktop Create a Remote Desktop Connection
Restore Mode. 4. When you are prompted, log on as the local administrator.
See Also
Restart the domain controller in Directory Services Restore Mode Remotely
5. Modify the default entry to include the /SAFEBOOT:DSREPAIR switch, as shown in the following example: multi(0)disk(0)rdisk(0)partition(2)\WINNT="W2K DC \\your server name" /fastdetect /SAFEBOOT:DSREPAIR Note The /SAFEBOOT:DSREPAIR switch works for domain controllers running Windows 2000 Server and Windows Server 2003. 6. Save the modified Boot.ini file, and then close Notepad. 7. On the Start menu, click Shut Down, and then click Restart. During the restart process, the Terminal Services client reports that the session is disconnected. Caution Be sure to click Restart and not Shut Down at this step. If you click Shut Down, you cannot restart the domain controller remotely. 8. Wait until the restart process completes on the remote domain controller, and then reconnect the client session. 9. When the client session is reconnected, log on as the local administrator. 10. Right-click My Computer, click Properties, and then click the Advanced tab. 11. Click Settings for startup and recovery. 12. Click the Edit button to edit the startup options file. 13. Delete the /SAFEBOOT:DSREPAIR switch from the default entry in the Boot.ini file, save the file, and then close Notepad. Important If you restart the domain controller before you modify the Boot.ini file, the domain controller remains offline. The Boot.ini file is now returned to its original state, which starts the domain controller normally.
See Also
Enable Remote Desktop Create a Remote Desktop Connection
Remote directory: If you are compacting the database file to a shared folder on a remote computer, establish a network connection to the shared
folder as shown below. Because you are logged on as the local administrator, unless permissions on the shared folder include the built-in Administrator account, you must provide a domain name, user name, and password for a domain account that has Write permissions on the shared folder. In the example below, \\SERVER1\NTDS is the name of the shared folder, and K: is the drive that you are mapping to the shared folder. After typing the first line and pressing ENTER, Ntdsutil.exe prompts you for the password. Type the password and then press ENTER. H:\>net use K: \\SERVER1\NTDS /user:domainName\userName * Type the password for \\SERVER1\NTDS: Drive K: is now connected to \\SERVER1\NTDS The command completed successfully. 2. Type the following command at a command prompt and then press ENTER: ntdsutil 3. At the ntdsutil: prompt, type files and then press ENTER. 4. At the file maintenance: prompt, type compact to drive:\ LocalDirectoryPath (where drive:\ LocalDirectoryPath is the path to a location on the local computer) and then press ENTER. If you have mapped a drive to a shared folder on a remote computer, type the drive letter only (for example, compact to K:\). Note When compacting to a local drive, you must provide a path. If the path contains any spaces, enclose the entire path in quotation marks (for example, compact to "c:\new folder"). If the directory does not exist, Ntdsutil.exe creates it and creates the file named Ntds.dit in that location. 5. If defragmentation completes successfully, type quit and press ENTER to quit the file maintenance: prompt. Type quit again and press ENTER to quit Ntdsutil.exe. Go to step 6. If defragmentation completes with errors, go to step 9. Caution Do not overwrite the original Ntds.dit file or delete any log files. 6. If defragmentation succeeds with no errors, then follow the Ntdsutil.exe onscreen instructions to: a. Delete all of the log files in the log directory by typing:
del drive:\pathToLogFiles\*.log Note You do not need to delete the Edb.chk file. b. If space allows, either rename the original Ntds.dit file to preserve it or else copy it to a different location. Avoid overwriting the original Ntds.dit file. c. Manually copy the compacted database file to the original location, as follows: copy temporaryDrive:\ntds.dit originalDrive:\pathToOriginalDatabaseFile\ntds.dit 7. Type ntdsutil and then press ENTER. 8. At the ntdsutil: prompt, type files and then press ENTER. 9. At the file maintenance: prompt, type integrity and then press ENTER. If the integrity check fails, the likely cause is that an error occurred during the copy operation in step 6.3. Repeat steps 6.3 through step 9. If the integrity check fails again: -or Copy the original version of the Ntds.dit file that you preserved in step 6.2. to the original database location and repeat the offline defragmentation procedure. 10. If the integrity check succeeds, proceed as follows: If the initial compact to command failed, go back to step 4 and perform steps 4 through 9. If the initial compact to command succeeded, type quit and press ENTER to quit the file maintenance: prompt, and then type quit and press ENTER again to quit Ntdsutil.exe. 11. Restart the domain controller normally. If you are connected remotely through a Terminal Services session, be sure that you have modified the Boot.ini file for normal restarting before you restart the domain controller. If errors appear when you restart the domain controller: 1. Restart the domain controller in Directory Services Restore Mode. 2. Check the errors in Event Viewer. Contact Microsoft Product Support Services.
If the following events are logged in Event Viewer on restarting the domain controller, respond to the events as follows: Event ID 1046. The Active Directory database engine caused an exception with the following parameters. In this case, Active Directory cannot recover from this error and you must restore from backup media. Event ID 1168. Internal error: An Active Directory error has occurred. In this case, information is missing from the registry and you must restore from backup media. 3. Check database integrity and then proceed as follows: If the integrity check fails, try repeating step 6.3 through step 9 above, and then repeat the integrity check. If the integrity check fails again: -or Copy the original version of the Ntds.dit file that you preserved in step 6.2. to the original database location and repeat the offline defragmentation procedure. If the integrity check succeeds, perform semantic database analysis with fixup. 4. If semantic database analysis with fixup succeeds, quit Ntdsutil.exe and restart the domain controller normally. If semantic database analysis with fixup fails, contact Microsoft Product Support Services. Contact Microsoft Product Support Services.
If database integrity check fails, perform semantic database analysis with fixup
When you run semantic database analysis with the Go Fixup command instead of the Go command, errors are written into Dsdit.dmp.xx log files. A progress indicator reports the status of the check. Note To perform this procedure, the domain controller must be started in Directory Services Restore Mode. Administrative Credentials To perform this procedure, you must be an administrator on the local computer.
To perform semantic database analysis with fixup 1. In Directory Services Restore Mode, open a Command Prompt. 2. Type the following command and then press ENTER: ntdsutil: 3. At the ntdsutil: prompt, type semantic database analysis and then press ENTER. 4. At the semantic checker: prompt, type verbose on and then press ENTER. 5. At the semantic checker: prompt, type go fixup and then press ENTER. If errors are reported during the semantic database analysis Go Fixup phase, perform directory database recovery. Caution Do not confuse the recover command with the repair command. Never use the repair command in Ntdsutil.exe. Forest-wide data loss can occur. If semantic database analysis with fixup succeeds, type quit and then type quit again to close Ntdsutil.exe, and then restart the domain controller normally. If you are performing this procedure remotely over a Terminal Services connection, be sure that you have modified the Boot.ini file for normal restarting before you restart the domain controller.
Produced by: Microsoft Windows Server User Assistance team Writer: Shala Brandolini Editor: Jim Becker
that a domain controller suffers a hardware failure and you plan to never return it to service, you must use a procedure that forces Active Directory removal and then take additional steps to remove the server object and its metadata from the directory.
Assuming that the remote site is connected to a hub site by a WAN link and does not contain a domain controller for the domain, you might want to avoid the additional time and the performance impact of replicating the full replica of Active Directory over the WAN when you add a new domain controller to the remote site. In this case, you can use backup media to install Active Directory. If you want to install a domain controller from backup media, both the source of the backup and the target server that is to be promoted to a domain controller must be running Windows Server 2003 or Windows Server 2003 with SP1, and the operating system of the source of the backup and the target server must be the same. The hardware platform (32bit or 64-bit) of the two computers must also match. Restoring from backup media eliminates the need to use replication to create the Active Directory replica on the new domain controller.
Rename a domain controller. You can now rename a domain controller without removing Active Directory. New functionality is available in the Netdom tool when the domain functional level is Windows Server 2003. This new functionality provides better preparation for DNS and service recognition of the new domain controller name. You can also use System Properties, which does not require a domain functional level and does not provide the same preparation, but which relies solely on replication to update the domain controller DNS name and service principal name (SPN). This method can result in a longer delay before clients can use the renamed domain controller. In addition, to protect domain controllers from infection by viruses that can corrupt directory data or cause software or hardware failure, an integral step in installing any domain controller is to install antivirus software.
Note Test the chosen antivirus software solution thoroughly in a lab environment to ensure that the software does not compromise the stability of the system. Antivirus software must be installed on all domain controllers in the enterprise. Ideally, such software should also be installed on all other server and client systems that have to interact with the domain controllers. Catching the virus at the earliest point, at the firewall, or the client system on which the virus is first introduced is bestthat will prevent the virus from ever reaching the infrastructure systems upon which all clients depend. Use a version of antivirus software that is confirmed to work with Active Directory and uses the correct APIs for accessing files on the server. Older versions of most vendors software inappropriately modified file metadata as it was scanned, causing the FRS replication engine to think the file was changed and to schedule it for replication. Newer versions prevent this problem. For more information about antivirus software versions and FRS, see article 815263, "Antivirus, backup, and disk optimization programs that are compatible with the File Replication service" in the Microsoft Knowledge Base on the Microsoft Web site (http://go.microsoft.com/fwlink/? LinkID=4441), and see the vendor-specific sites for compliant versions. Prevent the use of domain controller systems as general workstations. Users should not be using a domain controller to surf the Web or perform any other activities that could allow the introduction of malicious code. When possible, do not use the domain controller as a file sharing server. Virus scanning software must be run against all files in those shares and could place an unsatisfactory load on the processor and memory resources of the server.
Main NTDS database files. The location of these files is specified in:
HKLM\System\Services\NTDS\Parameters\DSA Database File Default location is %windir%\ntds. The file to be excluded is: NTDS.dit (on Windows 2000). Active Directory transaction log files. The log directory on any given server is specified in: HKLM\System\Services\NTDS\Parameters\Database Log Files Path Default location is %windir%\ntds. The specific files to be excluded are: EDB*.log (notice the wildcardthere can be several) RES1.log RES2.log
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\ Working Directory Files to be excluded: FRS Working Dir\jet\sys\edb.chk FRS Working Dir\jet\ntfrs.jdb FRS Working Dir\jet\log\*.log
FRS Working Dir\jet\log\*.log (if registry key is not set) DB Log File Directory\log\*.log (if registry key is set)
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\NtFrs\Parameters\R eplica Sets\GUID\Replica Set Stage FRS Preinstall directory located at:
<Replica_root>\DO_NOT_REMOVE_NtFrs_PreInstall_Directory. The Preinstall directory is always open exclusively when FRS is running. The following tasks for managing domain controllers are described in this objective: Preparing for Active Directory Installation Installing a Domain Controller in an Existing Domain Adding Domain Controllers in Remote Sites
Installing a Domain Controller in an Existing Domain Using Restored Backup Media Performing an Unattended Installation of Active Directory Verifying Active Directory Installation Renaming a Domain Controller Decommissioning a Domain Controller Forcing the Removal of a Domain Controller
Domain Name System (DNS) configuration, placement of the domain controller in a site, and connectivity for the Active Directory Installation Wizard. After you have gathered all the information that you need to run the Active Directory Installation Wizard and you have performed the tests to verify that all the necessary domain controllers are available, you are ready to install Active Directory on your server and create an additional domain controller in the domain. Preparation includes installing and configuring DNS and gathering information that you need for the installation.
Configuring DNS
The DNS client is always present on a server running Windows Server 2003. A DNS server must be present in the forest that stores DNS data for the server. You should properly configure both the DNS client and the DNS server to ensure that name resolution and related dependencies will function as expected during the installation of Active Directory. Ensure that any required configuration, forwarders, or zones are present and accessible prior to installation. For more information about DNS configuration best practices, see Designing the Active Directory Logical Structure on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=25466).
Site Placement
During installation, the Active Directory Installation Wizard attempts to place the new domain controller in the appropriate site. The appropriate site is determined by the domain controllers IP address and subnet mask. The wizard uses the IP information to calculate the subnet address of the domain controller and checks to see if a Subnet object exists in the directory for that subnet address. If the Subnet object exists, the wizard uses it to place the new Server object in the appropriate site. If not, the wizard places the new Server object in the same site as the domain controller that is being used as a source to replicate the directory database to the new domain controller. Make sure the Subnet object has been created for the desired site prior to running the wizard. A site is allocated according to the following rules: 1. If you specify a site in the Unattended text file that is used to create the new domain controller, the domain controller will be placed directly into that site when it is built.
2. If no site is specified in the Unattended text file when the new domain controller is built, then by default the domain controller will be placed in a site based on its IP address. 3. If you specify a replica partner in the Unattended text file but do not specify a site, the new domain controller should be placed in the replica partner's site. 4. If the replica partner or site is not specified, then the allocation of the site is random. It will depend on the replica partner selected for initial replication.
Domain Connectivity
During the installation process, the Active Directory Installation Wizard needs to communicate with other domain controllers to join the new domain controller to the domain. The wizard needs to communicate with a member of the domain to receive the initial copy of the directory database for the new domain controller. It communicates with the domain naming master for domain installs only, so that the new domain controller can be added to the domain. The wizard also needs to contact the relative ID (RID) master so that the new domain controller can receive its RID pool, and it needs to communicate with another domain controller in order to populate the SYSVOL shared folder on the new domain controller. All of this communication depends on proper DNS installation and configuration. By using Netdiag.exe and Dcdiag.exe, you can test all of these connections prior to starting the Active Directory Installation Wizard. Task requirements During the installation process, the wizard needs to communicate with other domain controllers to add this new domain controller to the domain and get the appropriate information into the Active Directory database. To maintain security, you must provide credentials that allow administrative access to the directory. Before you begin your installation, the following conditions must exist in your environment: Your Active Directory forest root domain must already exist.
If you are installing a new domain controller in a child domain, there should be at least two properly functioning domain controllers in the forest root domain. DNS must be functioning properly. In this guide, it is assumed that you are using Active Directoryintegrated DNS zones. You must have configured at least one domain controller as a DNS server. Creating or removing a domain or forest is beyond the scope of this guide. The following information and tools are necessary to complete this task:
The Active Directory Installation Wizard asks for the following specific configuration information before it begins installing Active Directory: A domain administrators user name and password A location to store the directory database and log files A location to store the shared system volume files (SYSVOL) The password to use for Directory Services Restore Mode
The fully qualified DNS name of the domain to which the new domain controller will be added My Network Places Adsiedit.msc Netdiag.exe Active Directory Sites and Services Dcdiag.exe
To complete this task, perform the following procedures: 1. Install the DNS Server service 2. Verify DNS registration and functionality 3. Verify that an IP address maps to a subnet and determine the site association 4. Verify communication with other domain controllers 5. Verify the availability of the operations masters Caution If any verification test fails, do not continue until you determine what went wrong and fix the problems. If these tests fail, the installation is also likely to fail.
To perform this procedure, you must be a member of either the Domain Admins group or the Enterprise Admins group. To install the DNS server service 1. Ensure that the computer is using a static IP address by right-clicking My Network Places and then clicking Properties. 2. In the Network Connections dialog box, right-click the connection that represents the connection this computer uses to attach to your network. The default label is Local Area Connection, but this can be changed, so it might not be labeled the same on your computer. Click Properties. 3. In the Local Area Connection Properties dialog box, click once on Internet Protocol (TCP/IP) to highlight it (be sure that you do not clear the check box in front of it), and then click Properties. 4. In the Internet Protocol (TCP/IP) Properties dialog box, ensure that Use the following IP address: is selected and that a valid IP address, subnet mask, and default gateway appear. Click OK to close the dialog box. Click OK again to return to your desktop. 5. In Control Panel, click Add or Remove Programs. Click Add/Remove Windows Components. 6. Scroll down to Networking Services. Highlight it and click Details. 7. In the Networking Services dialog box, select the check box in front of Domain Name System (DNS). Click OK. 8. Click Next. Provide the location of the installation files, if necessary. After the installation is complete, click Finish to end the wizard, and then click Close to exit Add or Remove Programs.
To verify DNS registration and functionality 1. Open a Command Prompt. 2. Type the following command and then press ENTER: netdiag /test:dns Note For a more detailed response from this command, add /v to the end of the command. If DNS is functioning, the last line of the response is DNS Test..: Passed. The verbose option lists specific information about what was tested. This information can help with troubleshooting if the test fails. If the test fails, do not attempt any additional steps until you determine and fix the problem that prevents proper DNS functionality.
Verify that an IP address maps to a subnet and determine the site association
Use this procedure to determine the site to which you want to add a Server object prior to installing Active Directory, or to verify the appropriate site prior to moving a Server object to it. To be associated with a site, the IP address of a domain controller must map to a Subnet object that is defined in Active Directory. The site to which the subnet is associated is the site of the domain controller. The subnet address, which is computed from the IP network address and the subnet mask, is the name of a Subnet object in Active Directory. When you know the subnet address, you can locate the Subnet object and determine the site to which the subnet is associated. Administrative Credentials To perform this procedure, you must be a member of the Domain Users group. To verify that an IP address maps to a subnet and determine the site association 1. Log on locally or open a Terminal Services connection to the server for which
you want to check the IP address. 2. On the desktop, right-click My Network Places, and then click Properties. 3. In the Network Connections dialog box, right-click Local Area Connection, and then click Properties. 4. Double-click Internet Protocol (TCP/IP). 5. Use the values in IP address and Subnet mask to calculate the subnet address and then click OK. 6. Click OK again and close the Network Connections dialog box. 7. Open Active Directory Sites and Services. 8. Expand the Sites container, and then click the Subnets container. 9. In the Name column in the details pane, find the Subnet object that matches the subnet address. 10. In the Site column, note the site to which the IP subnet address is associated. If the site that appears in the Site box is not the appropriate site, contact a supervisor and find out whether the IP address is incorrect or whether to move the Server object to the site indicated by the subnet.
Note For a more detailed response from this command, add /v to the end of the command. If domain controllers are successfully located, the last line of the response is DC discovery test..: Passed. The verbose option lists the specific domain controllers that are located. If the test fails, do not attempt any additional steps until you determine and fix the problem that prevents communication with other domain controllers.
dcdiag /s: domaincontroller /test:knowsofroleholders /verbose where domaincontroller is the name of a domain controller in the domain in which you want to add the new domain controller. The verbose option provides a detailed list of the operations masters that were tested. Near the bottom of the screen, a message confirms that the test succeeded. If you use the verbose option, look carefully at the bottom part of the displayed output. The test confirmation message appears immediately after the list of operations masters. Press ENTER. 3. Type the following command to ensure that the operations masters are functioning properly and are available on the network: dcdiag /s: domaincontroller /test:fsmocheck where domaincontroller is the name of a domain controller in the domain in which you want to add the new domain controller. The verbose option provides a detailed list of the operations masters that were tested. Near the bottom of your screen, a message confirms that the test succeeded. Press ENTER. If these tests fail, do not attempt any additional steps until you determine and fix the problem that prevents locating operations masters and verifying that they are functioning properly.
You can also install Active Directory from installation media or by performing an unattended installation. For information about completing each of these tasks, see the following: Installing a Domain Controller in an Existing Domain Using Restored Backup Media Performing an Unattended Installation of Active Directory
information is correct, and then click Next to proceed with the installation. 10. The wizard proceeds to install Active Directory. When it finishes, the wizard displays a summary screen listing the domain and site in which the new domain controller is a member. Verify that this information is correct. Click Finish to close the wizard. 11. Click Restart to restart the domain controller. 12. Let the domain controller restart. If any message indicates that one or more services has failed to start, restart the domain controller one more time. If the initial replication cycles have not had enough time to complete during the first restart on a new domain controller, some services may be unable to start successfully. If the message appears during additional restarts, examine the event logs in Event Viewer to determine the cause of the problem.
required to complete the installation task. Follow the instructions for including application directory partitions in the installation media. Task requirements To begin the task to install a domain controller from restored backup media without application directory partitions, ensure that the following requirements are met: A Windows Server 2003based domain controller must be running in each domain where you will be performing installations from backup media. The restored system state backup that is used to create additional domain controllers must be taken from a domain controller in the same domain as the new additional domain controller. The server that is being installed as a domain controller must be running Windows Server 2003, and the version must be the same as the domain controller from which the backup was taken. For example, you cannot use backup media from a domain controller running Windows Server 2003 to create a domain controller running Windows Server 2003 with Service Pack 1 (SP1). The reverse is also true. The restored system state backup that is used to create additional domain controllers must be taken on a domain controller that matches the processor type of the new domain controller. System state backups that are taken on a domain controller that has a 32-bit processor cannot be used to install a domain controller that has a 64bit processor. The reverse is also true. During Active Directory installation, Dcpromo checks that the value of the tombstone lifetime in the restored system state backup matches the value on an existing domain controller. If you plan to change the value of the tombstone lifetime, change this value before you create the backup. If the domain controller that you are creating is to be a global catalog server, the system state backup that you restore must be taken from an existing global catalog server in the domain. On servers that are running Windows Server 2003 with SP1, you can use restored backup media to install a domain controller that is a DNS server (stores the DomainDNSZones and ForestDNSZones application directory partitions) or that stores other application directory partitions. In addition to the previous requirements, to begin the task to install a domain controller from restored backup media that includes application directory partitions, ensure that the following requirements are met: The forest functional level has been raised to Windows Server 2003.
The domain controller on which you created the system state backup is running Windows Server 2003 with SP1.
The domain controller on which you created the system state backup contains the application directory partitions that you want to include. The server computer that you are installing is running Windows Server 2003 with SP1. You have created an answer file that contains the distinguished names (or * for all names) of the application directory partitions that you want to include. The following tools are required to perform the procedures for this task: Ntbackup.exe Dcpromo.exe
Ref.chm or Unattend.txt file, or both, for installations that include application directory partitions. To complete this task, perform the procedures for the following methods: 1. Back up system state Back up the system state of an existing domain controller according to the requirements described above. 2. As an option, before you restore the backup, copy the .bkf file to a CD, DVD, or other removable media from which you will subsequently restore the backup to an alternate location on the local hard drive of the server on which Active Directory is being installed. You can use this media to restore the same backup to any number of servers that will be installed as domain controllers. With this method, you restore the backup for each domain controller that you install. Compare this method to method 3.2, in which you restore the backup only once and copy the restored files to the removable media. 3. Restore system state to an alternate location Select the location for the system state backup that you will use to install a new domain controller. Use one of the following locations for restoring the system state backup: Restore the .bkf file to a volume on the server that will be installed as a domain controller. We recommend restoring to a folder named \NTDSRESTORE on the volume that will host the Ntds.dit file when Dcpromo is run, if space permits. Otherwise, restore to a folder named \NTDSRESTORE on a volume that has sufficient free space. For additional criteria regarding the volume on which you restore the backup, see Adding Domain Controllers in Remote Sites. Restore the .bkf file to the local hard drive of any computer, and then burn the expanded restore tree to a CD, DVD, or other removable storage media. Install Active Directory directly from this media. You can use this media to directly install
any number of domain controllers. With this method, you restore the backup only once. 4. Install Active Directory from media. Install the domain controller from the system state backup that you restored in step 3 by using one of the following methods: Install Active Directory from restored backup media to create a new domain controller that does not include application directory partitions. Include application directory partitions in an Active Directory installation from backup media to create a new domain controller that contains application directory partitions. (See the special requirements described earlier in this section.) This method uses an answer file to specify the application directory partitions to include in the Active Directory installation. To use this method, you must first Create an answer file for domain controller installation. You can also include instructions to install the DNS Server service in the answer file.
See Also
Adding Domain Controllers in Remote Sites Create an answer file for domain controller installation
Note To back up system state, you must log on locally to the domain controller, or Remote Desktop must be enabled on the remote domain controller so that you can connect remotely. Administrative credentials To perform the following two procedures, you must be a member of the Domain Admins group or a member of the Backup Operators group. To back up system state including system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. This procedure provides steps for backing up in Wizard Mode. By default, the Always Start in Wizard Mode check box is selected in the Backup or Restore Wizard. If the Welcome to the Backup Utility Advanced Mode page appears, click Wizard Mode to open the Backup or Restore Wizard. 2. On the Welcome to the Backup or Restore Wizard page, click Next. 3. Select Back up files and settings, and then click Next. 4. Select Let me choose what to back up, and then click Next. 5. In the Items to Back Up window, double-click My Computer. 6. In the expanded list below My Computer, check System State, and then click Next. 7. Select a location to store the backup: If you are backing up to a file, type the path and file name for the backup (.bkf) file (or click Browse to find a folder or file). If you are backing up to a tape unit, choose the tape that you want to use. Note You should not store the backup on the local hard drive. Instead, store it in a location, such as a tape drive, away from the computer that you are backing up. 8. Type a name for this backup according to the recommendations in Backing Up Active Directory Components, and then click Next. 9. On the last page of the wizard, click Advanced. 10. Do not change the default options for Type of Backup. Normal should be
selected, and the check box for Backup migrated remote storage data should remain cleared. Click Next. 11. Select Verify data after backup, and then click Next. 12. In the Backup Options dialog box, select a backup option, and then click Next. 13. If you are replacing the existing backups, select the option to allow only the owner and administrator access to the backup data and to any backups that are appended to this medium, and then click Next. 14. In the When to back up box, select the appropriate option for your needs, and then click Next. 15. If you are satisfied with all of the options that are selected, click Finish to perform the backup operation according to your selected schedule. Note The system state can also be backed up by using Ntbackup from a command line with appropriate parameters. For more information, at a command prompt type ntbackup /?. The following procedure produces a smaller .bkf file that does not include system boot files. By using this procedure, you can reduce the time that is required to perform the backup and subsequent restore, as well as the amount of disk space that is required. This method is recommended when the restored backup is to be used for installing additional domain controllers. To back up system state excluding system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. 2. On the Welcome to the Backup or Restore Wizard page, click Advanced Mode, and then click the Backup tab. 3. In the console tree, select the System State check box. 4. In Backup media or file name, type a name for this backup according to the recommendations in Backing Up Active Directory Components. 5. Click Start Backup, and then click Advanced. 6. Clear the Automatically back up System Protected Files with the System State check box, and then click OK. 7. Click Start Backup.
See Also
Enable Remote Desktop Create a Remote Desktop Connection
contains removable media. 7. In the Select file for catalog dialog box, click the .bkf file that you want to restore, and then click Open. 8. In the Open Backup File dialog box, click OK. 9. In Items to restore, double-click File, and then double-click the .bkf file that you want to restore. 10. Below the .bkf file that you want to restore, select the System State check box, and then click Next. (You do not need to restore the system disk to an alternate location.) 11. On the Completing the Backup or Restore Wizard page, click Advanced. 12. In the Restore Files to drop-down list, click Alternate Location. 13. In Alternate Location, type the path (or browse) to the local folder to which you are restoring the backup, and then click Next. We recommend restoring to a folder named NTDSRESTORE, if space permits, on the volume that will host the Ntds.dit file when Dcpromo is run. Otherwise, restore to a folder named \NTDSRESTORE on another volume that has sufficient free space. 14. On the How to Restore page, accept the default selection Leave existing files (Recommended), and then click Next. 15. On the Advanced Restore Options page, accept the default selections Restore security settings and Preserve existing volume mount points, and then click Next. 16. On the Completing the Backup or Restore Wizard page, click Finish.
To install Active Directory from restored backup media 1. Click Start, click Run, type dcpromo /adv, and then press ENTER. 2. In the Active Directory Installation Wizard, select Additional domain controller for existing domain. 3. Select From these restored backup files, and point to the same location where you restored the system state data. 4. If the domain controller whose system state backup you are using is a global catalog server, the Active Directory Installation Wizard asks you whether you want this server to also be a global catalog server. 5. Give appropriate credentials for the operation. 6. Enter the domain of the new domain controller. This domain must be the domain of the domain controller whose system state backup you are using. 7. Complete the remaining pages of the Active Directory Installation Wizard. Dcpromo.exe will install Active Directory using the data present in the restored files, which eliminates the need to replicate every object from a partner domain controller. However, objects that were modified, added, or deleted since the backup was taken must be replicated. If the backup was recent, the amount of replication required will be considerably less than that required for a regular Active Directory installation. After the installation operation completes successfully and the computer is restarted, the folder and subfolders that contain the restored system state can be removed from the local disk.
See Also
Restore system state to an alternate location Include application directory partitions in an Active Directory installation from backup media
Include application directory partitions in an Active Directory installation from backup media
You can use this procedure to install Active Directory from restored backup media that includes application directory partitions to create an additional domain controller in an existing domain. In this procedure, you edit a domain controller installation answer file to provide instructions for including application directory partitions in the installation. You must have already created the answer file according to the directions in Create an answer file for domain controller installation. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group in the domain into which you are installing the additional domain controller. To include application directory partitions in an Active Directory installation from backup media 1. Open the answer file that you created to install the domain controller. 2. To include application directory partitions that are contained in the system state backup, add the following entry to the end of the answer file: ApplicationPartitionsToReplicate= 3. Provide a value for ApplicationPartitionsToReplicate as follows: If you want to include all application directory partitions, use the value *.
If you want to include specific application directory partitions, type the distinguished name of each directory partition. Separate each distinguished name with a space, and enclose the entire list in quotation marks, as shown in the following example: ApplicationPartitionsToReplicate="dc=app1,dc=contoso,dc=com dc=app2,dc=contoso,dc=com" 4. In the entry ReplicationSourcePath=, type the path to the folder that contains the restored system state backup files on the installation computer. 5. If you do not want Dcpromo to prompt the user for passwords, type the password in the Password= entry for the account that you will use to install the domain controller, type the password in the SafeModeAdminPassword= entry that you will use to provide access to Directory Services Restore Mode, and then
save the answer file. Note Passwords are automatically deleted from the answer file when Dcpromo runs. 6. Open a command prompt, and then change directories to the location of the answer file. 7. At the command prompt, type the following command, and then press ENTER: dcpromo /adv /answer:"Drive:\PathToAnswerFile\AnswerFileName" Active Directory installation occurs automatically. If you left passwords blank in the answer file, Dcpromo prompts you for your administrative password and for the Directory Services Restore Mode password. If you specified "no" for the RebootOnSuccess= entry in the answer file, Dcpromo prompts you to restart the server after installation.
Install Active Directory on the server in a hub or staging site, and ship the installed domain controller to the remote site.
Both methods have advantages and disadvantages, and both methods require care to ensure the secure transfer of Active Directory data, whether it is installed or in the form of backup files that are stored on the server or on removable media. For information about the advantages and disadvantages of shipping a server to a remote site before or after installing Active Directory, see Known Issues for Adding Domain Controllers in Remote Sites. For information about how best to manage adding domain controllers to remote sites for the method you are using, see Best Practices for Adding Domain Controllers in Remote Sites. By following the guidelines in this guide, you can decide the best method for your environment of adding domain controllers in remote sites. By following the instructions in this guide, you can safely and securely install domain controllers in remote sites, either locally or remotely. The following tasks for adding domain controllers in remote sites are described in this objective: Preparing a Server Computer for Shipping and Installation from Backup Media
Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection Reconnecting a Domain Controller After a Long-Term Disconnection
Important Do not attempt to perform actions based only on the recommendations that are discussed in this topic. Step-by-step guidance is provided in the task-based topics for all actions that are recommended in this topic. Follow the See Also links to the related task-based topics.
SYSVOL Replication
SYSVOL is a shared folder that stores files that must be available and synchronized among all domain controllers in a domain. SYSVOL contains the NETLOGON share, Group Policy settings, and File Replication service (FRS) staging directories and files. The SYSVOL share is required for Active Directory to function properly. The primary focus for both methods of installing additional domain controllers in remote sites is to avoid the replication of Active Directory over a wide area network (WAN) between the remote site and the hub site. Each method accomplishes this goal. However, depending on the size of your SYSVOL, you might also be concerned about replication of SYSVOL files over the network. Unless you follow specific instructions, the SYSVOL tree might be created on the new domain controller through replication of the entire tree from an existing domain controller in the domain. Regardless of which method you use to add domain controllers to remote sites, you might want to take additional steps to manage SYSVOL creation on the new domain controller to avoid replicating the full SYSVOL from another domain controller in the domain. When you install a domain controller from backup media, preliminary steps are required to ensure that SYSVOL is created from the local copy of the restored backup media. Similarly, preliminary steps are required to avoid full SYSVOL synchronization when you ship an installed domain controller and restart it in the remote site. These requirements are discussed for each method respectively in the following topics: Preparing a Server Computer for Shipping and Installation from Backup Media
1. Back up system state on a domain controller in the domain in which you are adding the new domain controller. If you want the additional domain controller to be a global catalog server, back up a global catalog server. If you want the additional domain controller to be a Domain Name System (DNS) server, back up a DNS server. 2. Restore the backup to an alternate location. You can restore the backup directly to the computer that you want to install as a domain controller, or you can transfer it to removable media. 3. Run Dcpromo with the /adv option and indicate the restored backup as the source for the Active Directory installation. This method of installing domain controllers in remote sites has several advantages. One of the primary advantages of this method is that it substantially reduces the network bandwidth requirement compared to network-based installations. This method also has a few issues that mostly affect deployments that have a large number of remote sites. If you deploy more than 100 remote sites, additional considerations might be necessary. For information about large branch office deployments, see the Windows Server 2003 Active Directory Branch Office Guide on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=42506).
If you enable Remote Desktop on the server before you ship it, you do not have to employ an administrator with Domain Admins credentials in the remote site.
Issues with Using Backup Media to Install Active Directory in Remote Sites
The following issues are associated with using backup media to install a domain controller in a remote site: Domain Admins credentials and remote installation. An administrator must have Domain Admins credentials to install Active Directory. Assuming that you do not employ a service administrator with this level of administrative credentials in each branch site, a domain administrator in the hub site must be able to connect remotely to the server to perform the installation. Therefore, you must be sure to enable Remote Desktop on the server before you ship it to the remote site. Time to restore the system state backup. The installation media is prepared by restoring a system state backup to an alternate location. Therefore, preparing the media requires taking the backup itself and restoring the backup. These tasks add time to the installation of a single domain controller. However, if you take advantage of the ability to transfer the restored backup files to removable media, you perform the preliminary backup and restore processes only once to install any number of domain controllers. In addition, you can follow instructions to prepare a smaller backup file to further decrease the time that is required for restoring and copying backup media. The volume on which you restore the backup on the target server also affects the speed of the installation. Moving the Ntds.dit file is faster than copying it. If you restore the media to the same location that will be used to host the Active Directory database, the Ntds.dit file will be moved (as opposed to being copied) into the new location, eliminating the additional time required to copy the file. For more information about the criteria that affect how long installation from backup media takes, see Preparing a Server Computer for Shipping and Installation from Backup Media. Backup source for application directory partitions. When DNS zone data is stored in application directory partitions, the replication impact can be significant if application directory partitions must be replicated over the corporate network. System state data that you restore from backup to an alternate location does not include application directory partitions if the backup is performed on servers running Windows Server 2003 with no service pack installed. Including application directory partitions in the backup media has the following requirements:
The domain controller that you back up and the computer that you intend to install as a domain controller must both be running Windows Server 2003 with Service Pack 1 (SP1). The forest functional level must be set to Windows Server 2003 because linked-value replication is required to ensure that cross-references are correctly updated for the application directory partition replica set. You must use an answer file to install Active Directory because the Dcpromo user interface (UI) does not provide an option for specifying application directory partitions. Use the answer file to provide the distinguished names of the application directory partitions that you want to include in the installation. For more information about how to include application directory partitions and create a DNS server, see Preparing a Server Computer for Shipping and Installation from Backup Media. Bridgehead server load balancing. If backup media are sent to many sites and if enough domain controllers are promoted at the same time, you might experience performance issues with the bridgehead servers that are the source for Active Directory and FRS replication. Note These issues are of concern only in situations in which hundreds of domain controllers might be promoted at the same time and their need for bridgehead server resources is very high. If you are deploying hundreds of domain controllers in branch sites, see the Windows Server 2003 Active Directory Branch Office Guide on the Microsoft Web site (http://go.microsoft.com/fwlink/? LinkId=42506). Active Directory intersite replication. You cannot load-balance intersite connections to and from the hub site until the domain controller is installed. If a large number of domain controllers are being installed in remote sites (more than 100), manual rebalancing of connections might be required after the domain controllers are installed. For information about how to use the Active Directory Load Balancing (ADLB) tool to rebalance connections, see the Windows Server 2003 Active Directory Branch Office Guide on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=42506). FRS replication. Because FRS on the source computer uses CPU, memory, and disk resources, the FRS recommendation is to perform a staged update on no more than 10 branch office domain controllers at a time per source hub domain controller. If a single domain controller functions as the source for SYSVOL replication to more than 10 destination domain controllers, performance on the
source domain controller can decrease significantly. To balance source domain controllers, you can use an answer file with Dcpromo to specify the source domain controller.
Advantages of Installing Domain Controllers Before Shipping Them to the Remote Site
The following advantages are associated with installing domain controllers before shipping them to the remote site: Standardization. The process for installing domain controllers can be automated and standardized in the hub or staging site, with the one additional step of packing and shipping the domain controller. If you follow the instructions for safe disconnection and reconnection, restarting the domain controller in the remote site is all that is required. Branch site personnel. The requirement for personnel with Domain Admins credentials is contained within the hub site; that is, intervention by personnel with Domain Admins credentials is not required at the branch site.
Issues with Installing Domain Controllers Before Shipping Them to the Remote Site
The following issues are associated with installing domain controllers and then disconnecting them from the network while they are shipped to the remote site: Disconnection error conditions. After disconnection, online domain controllers in the domain continue to attempt replication with the disconnected domain controller, causing Active Directory and FRS errors to be generated for as long as the domain controller is disconnected. Additional preparation. Additional preparation is required to ensure smooth reconnection:
Ensuring an adequate tombstone lifetime to avoid the possibility of objects remaining on the domain controller that have been permanently deleted from the directory on all other domain controllers. The tombstone lifetime is a forest-wide setting that determines how long an object deletion persists in the directory. Protection of existing accounts and metadata. You must ensure that computer accounts and metadata for the domain controller are not deleted or improperly modified while the domain controller is disconnected. Risk of lingering objects. A lingering object is an object that remains on a disconnected domain controller after the object has been permanently deleted from Active Directory on all connected domain controllers. Deletion updates are replicated as tombstone objects. These objects have a limited lifetime in Active Directory, which is defined by the tombstone lifetime. After a tombstone is permanently removed from Active Directory, replication of the deletion it represented is no longer possible. Therefore, if you restart a domain controller on which such an object remains, replication does not recognize that object as a deleted object, and it remains in Active Directory on only the reconnected domain controller and nowhere else. If you plan to disconnect a domain controller for longer than the period of time that a domain controller keeps track of object deletions (the tombstone lifetime), you must take additional steps to ensure directory consistency. For more information about lingering objects and their causes and effects, see Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042).
For procedures to ensure that all of these issues are addressed, see the following topics: Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection
SYSVOL Consistency
SYSVOL replication cannot be synchronized manually. For this reason, ensuring that SYSVOL is updated before you disconnect the domain controller is more difficult than simply updating SYSVOL when the domain controller is reconnected. Regardless of the length of the disconnection, to ensure that SYSVOL is synchronized when the domain controller is reconnected, prepare the domain controller to perform a nonauthoritative restart of SYSVOL before you disconnect the domain controller. When the domain controller restarts, nonauthoritative restart of SYSVOL occurs automatically.
See Also
Preparing a Server Computer for Shipping and Installation from Backup Media Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection Reconnecting a Domain Controller After a Long-Term Disconnection
backup files that reside on the server that you are installing. Updates to object attributes that occur since the system state backup was made will replicate over the network from an existing domain controller in the domain or forest. Although SYSVOL is part of the system state backup, under some conditions SYSVOL is not sourced from the backup media. Configuring SYSVOL to be sourced from local backup media is more challenging and might not prove worthwhile. For more information about the conditions that determine the need for SYSVOL replication, see Known Issues for Adding Domain Controllers in Remote Sites. To use restored backup files for installation of one or more additional domain controllers in a domain, you can either: Copy ("burn") either the unrestored .bkf file or the restored backup files onto removable media, such as a portable disk drive, CD, or DVD, which can be shipped with the workgroup computer when it leaves the staging site or shipped separately. Restore system state backup to the local hard drive of the workgroup computer before it leaves the staging site. For information about the advantages and disadvantages of these methods, see Preparing a Server Computer for Shipping and Installation from Backup Media. The Dcpromo /adv option in Windows Server 2003 to install a domain controller from backup media eliminates the Windows 2000 Server requirement to either promote the domain controller before shipping it to the remote site or promote the domain controller in the remote site by replicating the entire directory over a wide area network (WAN) connection when another domain controller for the domain is not present in the site. The following best practices are recommended to optimize data security and consistency when you add domain controllers in remote sites: Upgrade to Windows Server 2003 with Service Pack 1 (SP1). If you use Active Directory-integrated DNS or if you want other application directory partitions to be included in the domain controller replica, upgrade the server computer to Windows Server 2003 with SP1 before Active Directory installation. When you use restored backup media to install a computer running Windows Server 2003 with no service pack installed, the replica installation does not include application directory partitions. In the case of DNS application directory partitions, the impact of replicating these directory partitions over the WAN might be significant. When you use restored backup media to install a computer running Windows Server 2003 with SP1, you can use an answer file to include application directory partitions in the replica that you install. Back up the type of domain controller that you want to add. You must back up the type of domain controller that you want to add. If you want to add a global catalog
server in the remote site, back up a global catalog server in the domain. If you want to add a DNS server, back up a DNS server in the domain. Take the same security precautions for shipment of removable backup media or a server computer that contains a restored backup as you would take for shipping an installed domain controller. For information about securing domain controllers, see Best Practice Guide for Securing Windows Server Active Directory Installations on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=28521). Minimize the time between the backup and installation. Minimizing this delay reduces the number of updates that will be required to replicate after installation. Install the operating system before shipping the server to the remote site. Installing the operating system requires expertise that might not be available at branch sites. Ideally, installation routines are available in the staging site to automate the operating system installation process and ensure uniformity for all domain controllers (partition sizes, drive letter assignments, and so on). As part of the operating system installation, apply a standardized set of hotfixes plus any available service packs to ensure service consistency throughout the forest. Ship the server as a member of a workgroup rather than a member server in a domain. If the server is joined to a domain and then stolen during shipment, information about domain names, DNS suffixes, and number of domains in the forest can aid attackers in attempts to compromise or steal directory data. Ship computers with properly configured Internet Protocol (IP), subnet mask, and default gateway addresses. Remember to reconfigure the server with TCP/IP settings that are appropriate to the target site, not the staging site. Specifically, the domain controller must not point to itself for DNS. Enable Remote Desktop on the server computer before shipping. This best practice assumes that you need to be able to install and manage Active Directory remotely rather than employing an administrator with Domain Admins credentials in each remote site.
deleted from the directory on all other domain controllers in the domain. Such objects, called lingering objects, cause directory inconsistency and, under certain conditions, can be reintroduced into the directory. For information about the causes and effects of lingering objects and how to avoid them, see Known Issues for Adding Domain Controllers in Remote Sites. The following best practices reduce the possibility of Active Directory consistency problems due to lingering objects remaining on domain controllers that are disconnected for long periods of time. Take the following precautions to avoid directory consistency problems when you disconnect an existing domain controller and to ensure that if inadvertent long disconnections occur, lingering objects cannot be replicated. Upgrade all Windows 2000 Server domain controllers to Windows Server 2003. This process requires upgrading the forest schema by using the adprep /forestprep command. Thereafter, you can begin upgrading domain controllers to Windows Server 2003. The Windows Server 2003 schema update adds 25 indexed attributes to the schema directory partition. An update of this size can cause replication delays in a large database. For this reason, domain controllers that are running Windows 2000 Server must be running at a minimum Windows 2000 Service Pack 2 (SP2) plus all additional Windows updates. However, it is highly recommended that you install Windows 2000 Service Pack 3 (SP3) on all domain controllers before preparing your infrastructure for upgrade to the Windows Server 2003 operating system. For information about upgrading to Windows Server 2003, see "Upgrading from Windows 2000 Domains to Windows Server 2003 Domains" in the Windows Server 2003 Deployment Guide on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=46082). Enable strict replication consistency on all domain controllers. This registry setting, which stops inbound replication of a directory partition from a source domain controller that is suspected of having a lingering object, should be set for the forest to prevent the reintroduction of a lingering object into the directory. You can use the Repadmin /regkey command, which is available in the version of Windows Support Tools that is included with Windows Server 2003 SP1, to enable this setting on a specific domain controller or on all domain controllers in the forest, which eliminates the need to update the registry manually. Monitor the Knowledge Consistency Checker (KCC) topology and replication to ensure that unintended long disconnections are detected. By monitoring replication, you can detect disconnections that occur as a result of network failures, service failures, or configuration errors. Use the Active Directory Management Pack or other monitoring application to implement a monitoring solution for your Active Directory deployment. Event IDs to monitor include 1311, 1388, 1925, 1988, 2042, 2087, and 2088.
Ship computers with properly configured IP, subnet mask, and default gateway addresses. Remember to reconfigure the server with TCP/IP settings that are appropriate to the target site, not the staging site. Specifically, the domain controller must not point to itself for DNS. Configure the tombstone lifetime appropriately. Ensure that the tombstone lifetime is not lowered below the default. The default tombstone lifetime in a forest that was created on a domain controller running Windows 2000 Server or Windows Server 2003 is 60 days. The default tombstone lifetime in a forest that was created on a server running Windows Server 2003 with SP1 is 180 days. If you must disconnect a domain controller for a period of several weeks or months, before you disconnect the domain controller, do the following: Estimate the anticipated length of disconnection.
Determine the value of the tombstone lifetime for the forest. This value is stored in the tombstoneLifetime attribute of CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,DC=ForestRootDomain. Determine the maximum length of time that the domain controller can be safely disconnected. From the tombstone lifetime number of days, subtract a generous estimate of the number of days that are required for end-to-end replication latency. The resulting amount of time is the maximum period for which the domain controller can safely be disconnected. Determine whether to extend the tombstone lifetime for the forest. If you estimate the maximum time of disconnection to be longer than the tombstone lifetime, you must determine whether to extend the tombstone lifetime or perform the procedure to remove lingering objects from the domain controller after it is reconnected. If you extend the tombstone lifetime, you must also make sure that all domain controllers have adequate disk space to store additional tombstones. In addition, make sure that replication of the tombstone lifetime change has reached all potential source domain controllers before you run Dcpromo to install an additional domain controller. Prepare the registry for automatic nonauthoritative restart of SYSVOL when the domain controller restarts. SYSVOL cannot be updated manually before disconnection. By editing a registry setting, you can ensure that SYSVOL is updated as soon as the domain controller is restarted. Ensure that the domain controller replicates successfully with all replication partners. Immediately before you disconnect the domain controller, force replication with its partners. Check that replication has succeeded before you disconnect the domain controller.
Label the domain controller. When you disconnect the domain controller, attach a label to the computer that identifies the date and time of disconnection, the destination, and the IP settings. When you reconnect the domain controller, restore SYSVOL as quickly as possible. The domain controller does not serve as a domain controller until SYSVOL has been updated through replication. If the site has one or more other domain controllers in the same domain, start the domain controller anytime. If the site contains no other domain controller in the same domain, time the restart of the domain controller to coincide with the beginning of intersite replication. Do not allow an outdated Windows 2000 Server domain controller to replicate. If a domain controller running any version of Windows 2000 Server has been disconnected for longer than the maximum safe time of disconnection (the tombstone lifetime minus end-to-end replication latency), do not allow the domain controller to replicate. Instead, force the removal of Active Directory, perform metadata cleanup, and then reinstall Active Directory. As an alternative, you can reinstall the domain controller with Windows Server 2003. For more information about completing these tasks, see Reconnecting a Domain Controller After a Long-Term Disconnection. Note This recommendation applies to additional domain controllers in an existing domain. If the outdated domain controller is the only domain controller in the domain, the recommendation is to reconnect the domain controller and follow the instructions to remove lingering objects in article 314282, "Lingering objects may remain after you bring an out-of-date global catalog server back online," in the Microsoft Knowledge Base on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=37924). To avoid time skew issues, ensure that the system clock is synchronized with the domain source on startup. When you start the domain controller in the remote site, use the following command to set the hardware clock: net time /domain:DomainName /set /y
See Also
Known Issues for Adding Domain Controllers in Remote Sites Preparing a Server Computer for Shipping and Installation from Backup Media Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection Reconnecting a Domain Controller After a Long-Term Disconnection
Managing SYSVOL How the Active Directory Replication Model Works Active Directory Management Pack Technical Reference for MOM 2005
Preparing a Server Computer for Shipping and Installation from Backup Media
The specific guidelines for installing Active Directory from backup media are provided in the topic Installing a Domain Controller in an Existing Domain Using Restored Backup Media. Be sure to read that topic before performing the procedures that are specified in this topic. When you want to ship theserver to a remote site and install Active Directory by restoring from backup media in the remote site, you must make certain choices regarding the method that you use to restore the backup. You must also decide whether to use removable media or ship the backup on the server that will become the additional domain controller. You can use the information in this topic to make these decisions and to prepare the server for shipping. Use the information in Installing a Domain Controller in an Existing Domain Using Restored Backup Media to perform the actual backup, restore, and Active Directory installation procedures. Preparing a computer for installation in a remote site by using restored backup media requires that you perform the following tasks: Begin by backing up system state on a domain controller in the domain into which you are installing the domain controller according to the recommendations and requirements in Installing a Domain Controller in an Existing Domain Using Restored Backup Media. Determine whether to restore the system state backup onto the computer that will be promoted or use removable media to ship the backup files separately from the computer. Determine the volume on which to restore the backup media. If you have a large Ntds.dit file, this decision can affect the amount of time necessary for Active Directory installation. If you have a large SYSVOL, this decision can affect whether full replication of SYSVOL occurs during Active Directory installation. The ability to use the backup media to source SYSVOL depends on various factors. If you want to avoid full replication of SYSVOL, additional preparation is required, as described later in this section.
Before you ship the server, enable Remote Desktop access on the server so that you can install the domain controller and manage it remotely. You can also enable Remote Desktop remotely by using the registry, but this method should be used only as a fallback measure if, through some oversight, Remote Desktop is not enabled prior to shipping. If you are installing a domain controller that is running Windows Server 2003 with Service Pack 1 (SP1) in a forest that has a forest functional level of Windows Server 2003 or Windows Server 2003 interim and you want to include application directory partitions in the installation media, you can do so by creating an answer file that contains the location of the restored backup media and then running an unattended installation of Active Directory.
installation, restore the backup to a location that is on the same volume as the drive that will contain the SYSVOL share. If only one domain controller is installed in the domain (SYSVOL has not replicated at least once between two domain controllers in the domain), the ability to source SYSVOL from the restored backup media requires preliminary configuration of a "helper" domain controller to prepare the SYSVOL before you perform the system state backup. Note It is recommended that you deploy at least two domain controllers in each domain for redundancy and failover. For more information about how to ensure that SYSVOL is sourced from the restored backup, see "Seeding the SYSVOL tree from restored files during IFM promotion" in article 311078, "How to use the Install from Media feature to promote Windows Server 2003 based domain controllers," on the Microsoft Web site (http://go.microsoft.com/fwlink/? LinkId=37924). To assess the effect of replication, as opposed to additional configuration to source SYSVOL from the backup media, test both procedures in a lab environment that mirrors your production environment in terms of wide area network (WAN) speed and replication latency.
If you are installing a domain controller in a remote site that will also be a DNS server, you might want to include application directory partitions in the installation media rather than replicating them. You can include application directory partitions in the installation media if the following conditions apply: The forest has a functional level of Windows Server 2003 or Windows Server 2003 interim. The domain controller that you back up and the server that you are installing are both running Windows Server 2003 with SP1. For creating a DNS server, your forest uses Active Directory-integrated DNS (DNS zone data is stored in application directory partitions on DNS servers in the forest). The domain controller that you back up stores the application directory partitions that you want to include. Instructions for performing this type of installation are included in this task. Task requirements The following tools are necessary to complete this task: Ntbackup.exe System Control Panel Dcpromo.exe
Ref.chm on the Windows Server 2003 installation CD (for unattended installations only) To complete this task, perform the following procedures: 1. Back up system state on a domain controller in the domain into which you are installing the additional domain controller. The following requirements apply for the backup domain controller and the target server: The backup domain controller and target server must be running the same version of Windows Server 2003. For example, if the domain controller that you back up is running Windows Server 2003 with SP1, you cannot use this backup media to install Active Directory on a server that is running Windows Server 2003 with no service pack installed. The backup domain controller and target server must be running on the same hardware platform (32-bit or 64-bit). To install a domain controller that is a global catalog server, you must back up system state on a global catalog server.
To install a domain controller that is a DNS server (that is, a server that stores the DomainDNSZones and ForestDNSZones application directory partitions), you must back up system state on a DNS server that stores these directory partitions. 2. Restore system state to an alternate location. This location can be on the target server or in a different location, from which the backup files can be copied to removable media and then shipped to the remote site separately from the target server. Follow the guidelines described in "Determine the Restore Volume" earlier in this topic. As an alternative, you can copy the unrestored .bkf file to removable media and then ship the media to the remote site, where it can be restored to a location on the target server. When you restore, you must run Ntbackup on the server that has the alternate location. Therefore, if you are restoring to an alternate location that is not on the server on which the .bkf file is stored, before you run Ntbackup, do the following: a. Share the folder that contains the .bkf file. b. Map a connection to it from the computer on which you are running Ntbackup. 3. Enable Remote Desktop on the target server. 4. If you are installing a DNS server or a domain controller that will store any application directory partitions, Create an answer file for domain controller installation. 5. Ship the domain controller and any prepared removable media and answer file to the remote site. Ship these items separately and securely. 6. When the server is running in the remote site, install the domain controller as follows: Create a Remote Desktop Connection to the remote server.
If you are installing a domain controller that does not require application directory partitions to be included in the installation, Install Active Directory from restored backup media. If you are installing a domain controller that will be a DNS server or that requires other application directory partitions to be included in the installation media, perform the procedure to Include application directory partitions in an Active Directory installation from backup media. 7. If the domain controller is to be a DNS server, Install the DNS Server service after Active Directory has been installed.
See Also
Installing a Domain Controller in an Existing Domain Using Restored Backup Media
2. On the Welcome to the Backup or Restore Wizard page, click Next. 3. Select Back up files and settings, and then click Next. 4. Select Let me choose what to back up, and then click Next. 5. In the Items to Back Up window, double-click My Computer. 6. In the expanded list below My Computer, check System State, and then click Next. 7. Select a location to store the backup: If you are backing up to a file, type the path and file name for the backup (.bkf) file (or click Browse to find a folder or file). If you are backing up to a tape unit, choose the tape that you want to use. Note You should not store the backup on the local hard drive. Instead, store it in a location, such as a tape drive, away from the computer that you are backing up. 8. Type a name for this backup according to the recommendations in Backing Up Active Directory Components, and then click Next. 9. On the last page of the wizard, click Advanced. 10. Do not change the default options for Type of Backup. Normal should be selected, and the check box for Backup migrated remote storage data should remain cleared. Click Next. 11. Select Verify data after backup, and then click Next. 12. In the Backup Options dialog box, select a backup option, and then click Next. 13. If you are replacing the existing backups, select the option to allow only the owner and administrator access to the backup data and to any backups that are appended to this medium, and then click Next. 14. In the When to back up box, select the appropriate option for your needs, and then click Next. 15. If you are satisfied with all of the options that are selected, click Finish to perform the backup operation according to your selected schedule. Note The system state can also be backed up by using Ntbackup from a
command line with appropriate parameters. For more information, at a command prompt type ntbackup /?. The following procedure produces a smaller .bkf file that does not include system boot files. By using this procedure, you can reduce the time that is required to perform the backup and subsequent restore, as well as the amount of disk space that is required. This method is recommended when the restored backup is to be used for installing additional domain controllers. To back up system state excluding system-protected files 1. To start the Windows Server 2003 backup utility, click Start, click Run, type ntbackup, and then click OK. 2. On the Welcome to the Backup or Restore Wizard page, click Advanced Mode, and then click the Backup tab. 3. In the console tree, select the System State check box. 4. In Backup media or file name, type a name for this backup according to the recommendations in Backing Up Active Directory Components. 5. Click Start Backup, and then click Advanced. 6. Clear the Automatically back up System Protected Files with the System State check box, and then click OK. 7. Click Start Backup.
See Also
Enable Remote Desktop Create a Remote Desktop Connection
You can restore the system state backup to an alternate location on the domain controller from which the backup was made, a location on another computer, or a location on the computer that you want to install as a domain controller. Administrative credentials To perform this procedure, you must be a member of the Backup Operators group, as follows: Restore system state on a member or workgroup server: Backup Operators group on the local computer Restore system state on a domain controller: Backup Operators group in the domain To restore system state to an alternate location 1. Log on to the server that has the alternate location to which you are restoring system state backup files. 2. Click Start, click Run, type ntbackup, and then click OK. 3. On the Welcome to the Backup or Restore Wizard page, click Next. 4. Click Restore Files and settings, and then click Next. 5. On the What to Restore page, click Browse, and then, in the Open Backup File dialog box, click Browse again. 6. Navigate to the .bkf file that you want to restore to an alternate location. The .bkf file can be located in a folder on the current computer, in a shared folder on the backup computer or other network computer, or on an external drive that contains removable media. 7. In the Select file for catalog dialog box, click the .bkf file that you want to restore, and then click Open. 8. In the Open Backup File dialog box, click OK. 9. In Items to restore, double-click File, and then double-click the .bkf file that you want to restore. 10. Below the .bkf file that you want to restore, select the System State check box, and then click Next. (You do not need to restore the system disk to an alternate location.) 11. On the Completing the Backup or Restore Wizard page, click Advanced. 12. In the Restore Files to drop-down list, click Alternate Location.
13. In Alternate Location, type the path (or browse) to the local folder to which you are restoring the backup, and then click Next. We recommend restoring to a folder named NTDSRESTORE, if space permits, on the volume that will host the Ntds.dit file when Dcpromo is run. Otherwise, restore to a folder named \NTDSRESTORE on another volume that has sufficient free space. 14. On the How to Restore page, accept the default selection Leave existing files (Recommended), and then click Next. 15. On the Advanced Restore Options page, accept the default selections Restore security settings and Preserve existing volume mount points, and then click Next. 16. On the Completing the Backup or Restore Wizard page, click Finish.
If for any reason you neglected to perform this procedure prior to shipping the server, you can enable Remote Desktop remotely by using the registry. Administrative credentials To complete this procedure, you must be a member of the local Administrators group. To enable Remote Desktop remotely by using the registry 1. On any computer that is running a version of Windows Server 2003 or Windows XP Professional, click Start, click Run, type regedit, and then click OK. 2. On the File menu, click Connect Network Registry. 3. In the Select Computer dialog box, type the computer name and then click Check Names. 4. In the Enter Network Password dialog box, provide Domain Admins credentials for the domain of the server, and then click OK. 5. After the computer name resolves, click OK. 6. In the computer node that appears in the Registry Editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server. 7. In the console tree, click Terminal Server and then, in the details pane, double-click fDenyTSConnections. 8. In the Edit DWORD Value box, in Value data, type 0, and then click OK. 9. To implement the change, reboot the server remotely, as follows: Open a command prompt, type the following, and then press Enter: shutdown -m \\DomainControllerName -r
To perform this procedure, you must be a member of the Authenticated Users group on the local computer on which you create the answer file. To create an answer file for domain controller installation 1. On a local computer, insert the Windows Server 2003 CD-ROM into the CDROM drive or DVD-ROM drive. Press and hold down the SHIFT key as you insert the CD to prevent it from starting automatically. 2. Start Windows Explorer, and then open the Support\Tools folder on the Windows Server 2003 CD-ROM. 3. In the console tree, click Tools, and then, in the details pane, double-click Deploy.cab. 4. In the details pane, right-click Ref.chm, and then click Extract. 5. In the Select a Destination dialog box, navigate to or create a new folder for the expanded Ref.chm file, and then click Extract. 6. In its extracted location, open Ref.chm. 7. On the Contents tab in the scope pane, double-click Unattend.txt, and then click [DCInstall]. 8. In the details pane, scroll to Sample, select the entire sample, beginning at [DCInstall], and then copy the sample. 9. Open Notepad, paste the sample into the Notepad file, and save the text file. 10. Edit the text file to contain at least the following entries (additional entries and their descriptions are available in Ref.chm): [DCINSTALL] UserName=SAM account name that has Domain Admins credentials in the target domain. This account must be used by the administrator who runs the Dcpromo command. Password=Password for the account name. If you leave this blank, Dcpromo prompts the user during installation. Dcpromo deletes this value following installation. UserDomain=Domain name for the user account in UserName. DatabasePath=Location of the Ntds.dit file. (The default is %systemroot%\ntds.) If you omit this entry, Dcpromo uses the default location. LogPath=Location of the database log files. (The default is %systemroot%\ntds.)
If you omit this entry, Dcpromo uses the default location. SYSVOLPath=Location of the shared SYSVOL tree. (The default is %systemroot %\ntds.) If you omit this entry, Dcpromo uses the default location. SafeModeAdminPassword=Password for the administrator account that must be used to start the domain controller in Directory Services Restore Mode. If you leave this blank, Dcpromo prompts the user for the password during installation. Dcpromo deletes this value following installation. Passwords are removed from the answer file when Dcpromo is executed. CriticalReplicationOnly=Yes or no, to specify whether to skip noncritical portions of replication and allow Dcpromo to complete before replication is complete. SiteName=The name of the Active Directory site in which this domain controller will be placed. This site must be created in advance in the Active Directory Sites and Services snap-in. ReplicaOrNewDomain=Specify either Replica for an additional domain controller in an existing domain or NewDomain for the first domain controller in a new domain. ReplicaDomainDNSName=The fully qualified domain name of the domain of the new domain controller. ReplicationSourceDC=The name of an existing domain controller in the domain to use as the source replication partner during installation. When you install Active Directory from restored backup media, you can use this entry in conjunction with ReplicateFromMedia if you want to specify the domain controller from which Active Directory changes and SYSVOL changes are replicated. ReplicateFromMedia=Yes for installation from media, no for installation by replication. ReplicationSourcePath=When the installation is by replication, the path to the installation CD or network share. When the installation is from restored backup media, the local drive and path to the restored backup files. RebootOnSuccess=Yes if you want the domain controller to restart automatically following a successful installation, no if you want to restart the domain controller manually. If you do not want the domain controller to restart automatically and you do not want to be prompted, use the value NoAndNoPromptEither. ApplicationPartitionsToReplicate=Comma-separated distinguished names, with the entire string enclosed in quotation marks, of application directory partitions that you want to include when you use restored backup media to install Active Directory (or * to include all application directory partitions). Using this entry
requires Windows Server 2003 with Service Pack 1 (SP1) and Windows Server 2003 forest functional level. For more information about using this entry, see Include application directory partitions in an Active Directory installation from backup media. 11. Save the answer file to the location on the installation server from which it is to be called by Dcpromo, or save the file to a network share or removable media for distribution.
See Also
Include application directory partitions in an Active Directory installation from backup media
See Also
Enable Remote Desktop
See Also
Restore system state to an alternate location Include application directory partitions in an Active Directory installation from backup media
Include application directory partitions in an Active Directory installation from backup media
You can use this procedure to install Active Directory from restored backup media that includes application directory partitions to create an additional domain controller in an existing domain. In this procedure, you edit a domain controller installation answer file to provide instructions for including application directory partitions in the installation. You must have already created the answer file according to the directions in Create an answer file for domain controller installation. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group in the domain into which you are installing the additional domain controller. To include application directory partitions in an Active Directory installation from backup media 1. Open the answer file that you created to install the domain controller. 2. To include application directory partitions that are contained in the system state backup, add the following entry to the end of the answer file: ApplicationPartitionsToReplicate= 3. Provide a value for ApplicationPartitionsToReplicate as follows: If you want to include all application directory partitions, use the value *.
If you want to include specific application directory partitions, type the distinguished name of each directory partition. Separate each distinguished name with a space, and enclose the entire list in quotation marks, as shown in the following example:
ApplicationPartitionsToReplicate="dc=app1,dc=contoso,dc=com dc=app2,dc=contoso,dc=com" 4. In the entry ReplicationSourcePath=, type the path to the folder that contains the restored system state backup files on the installation computer. 5. If you do not want Dcpromo to prompt the user for passwords, type the password in the Password= entry for the account that you will use to install the domain controller, type the password in the SafeModeAdminPassword= entry that you will use to provide access to Directory Services Restore Mode, and then save the answer file. Note Passwords are automatically deleted from the answer file when Dcpromo runs. 6. Open a command prompt, and then change directories to the location of the answer file. 7. At the command prompt, type the following command, and then press ENTER: dcpromo /adv /answer:"Drive:\PathToAnswerFile\AnswerFileName" Active Directory installation occurs automatically. If you left passwords blank in the answer file, Dcpromo prompts you for your administrative password and for the Directory Services Restore Mode password. If you specified "no" for the RebootOnSuccess= entry in the answer file, Dcpromo prompts you to restart the server after installation.
are called "lingering objects." Lingering objects that are security principals, such as users or groups, can cause problems with Active Directory searches and e-mail delivery. Lingering objects can also jeopardize security if a user is allowed access to a resource by virtue of membership in a group that has been deleted. For more information about lingering objects, see "Maintaining Directory Consistency When Disconnecting a Domain Controller" in Known Issues for Adding Domain Controllers in Remote Sites. By taking preliminary precautions, you can ensure that long-term disconnections do not result in directory inconsistency from lingering objects. To complete this task, perform the following procedures: 1. Determine the anticipated length of the disconnection. 2. Determine the tombstone lifetime for the forest. 3. Determine the maximum safe disconnection period by subtracting a generous estimate of the end-to-end replication latency from the tombstone lifetime. Either find the latency estimate in the design documentation for your deployment or request the information from a member of your design or deployment team. If the anticipated time of disconnection exceeds the maximum safe disconnection period, make a decision about whether to extend the tombstone lifetime. To change the tombstone lifetime, see Determine the tombstone lifetime for the forest and change the value in the tombstoneLifetime attribute. If the estimated time of disconnection does not exceed the maximum safe disconnection time, proceed with disconnection. 4. View the current operations master role holders to determine whether the domain controller is an operations master role holder. 5. Transfer the domain-level operations master roles, if appropriate. 6. Transfer the schema master, if appropriate. 7. Transfer the domain naming master, if appropriate. 8. Prepare a domain controller for nonauthoritative SYSVOL restart on the domain controller that you are disconnecting. This process ensures an up-to-date SYSVOL when the domain controller is restarted. This process might result in a new copy of SYSVOL being replicated from another domain controller in the domain. To avoid full replication of SYSVOL, additional preparation is required. For more information about ensuring that SYSVOL does not require full synchronization following restart, see "Seeding the SYSVOL tree from restored files during IFM promotion" in article 311078, "How to use the Install from Media feature to promote Windows Server 2003-based domain controllers," in the Microsoft Knowledge Base on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=37924). These instructions are not specific to
installing from backup media, but they apply to preparing SYSVOL on any domain controller so that full synchronization is not required. 9. Enable strict replication consistency on the domain controller that you are disconnecting. You can use this command-line procedure as an option to enable strict replication consistency on additional other domain controllers or on all domain controllers in the forest. 10. Synchronize replication with all partners. Update the domain controller with the latest changes just before you disconnect it. 11. Verify successful replication to a domain controller for the domain controller that you are disconnecting. 12. Label the domain controller with the date and time of disconnection and the maximum safe disconnection period.
See Also
Known Issues for Adding Domain Controllers in Remote Sites Managing Operations Master Roles Managing SYSVOL Reconnecting a Domain Controller After a Long-Term Disconnection Windows Server 2003 Technical Reference
CN=Windows NT. 3. Right-click CN=Directory Service, and then click Properties. 4. In the Attribute column, click tombstoneLifetime. 5. Note the value in the Value column. If the value is <not set>, the default value is in effect as follows: On a domain controller in a forest that was created on a domain controller running Windows Server 2003 with Service Pack 1 (SP1), the default value is 180 days. On a domain controller in a forest that was created on a domain controller running Windows 2000 Server or Windows Server 2003, the default value is 60 days.
exit this menu. 6. At the fsmo maintenance: prompt, type select operation target and press ENTER. 7. At the select operations target: prompt, type list roles for connected server and press ENTER. The system responds with a list of the current roles and the Lightweight Directory Access Protocol (LDAP) name of the domain controllers currently assigned to host each role. 8. Type quit and press ENTER to exit each prompt in Ntdsutil.exe. Type quit and press ENTER at the ntdsutil: prompt to close the window.
4. At the top of the console tree, right-click Active Directory Users and Computers, point to All Tasks, and then click Operations Masters. The name of the current operations master role holder appears in the Operations master box. The name of the server to which you want to transfer the role appears in the lower box. 5. Click the tab for the role you want to transfer: RID, PDC, or Infrastructure. Verify the computer names that appear and then click Change. Click Yes to transfer the role, and then click OK. 6. Repeat steps 4 and 5 for each role that you want to transfer.
4. In the console tree, right-click Active Directory Schema. Click Operations Master. The Change Schema Master box displays the name of the server that is currently holding the role. The targeted domain controller is listed in the second box. 5. Click Change. Click Yes to confirm your choice. The system confirms the operation. Click OK again to confirm that the operation succeeded. 6. Click Close to close the Change Schema Master dialog box. Note Hosting the infrastructure master on a global catalog server is not recommended. If you attempt to transfer the infrastructure master role to a domain controller that is a global catalog, the system displays a warning stating that this is not recommended.
4. In the Name column, click the domain controller (to select it) to which you want to transfer the role. Click OK. 5. Right-click Active Directory Domains and Trusts, and then click Operations Master. 6. The name of the current domain naming master appears in the first text box. The server to which you want to transfer the role should appear in the second text box. If this is not the case, repeat steps 1 through 4. 7. Click Change. To confirm the role transfer, click Yes. Click OK again to close the message box indicating the transfer took place. Click Close to close the Change Operations Master dialog box.
Caution The Registry Editor bypasses standard safeguards, allowing settings that can damage your system or even require you to reinstall Windows. If you must edit the registry, back up system state first. For information about backing up system state, see Administering Active Directory Backup and Restore. Administrative Credentials To perform this procedure, you must be a member of the Domain Admins group in Active Directory. To prepare a domain controller for nonauthoritative SYSVOL restart 1. Click Start, click Run, type regedit and then click OK. 2. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters 3. Expand Parameters. 4. Modify one of the BurFlags entries as follows: To modify the global BurFlags entry: a. Expand Backup/Restore and then click Process at Startup. b. In the details pane, right-click BurFlags and click Modify. c. In the Value data box, type D2 hexadecimal or 210 decimal.
d. Click OK and close Registry Editor. To modify the replica-set-specific BurFlags entry: a. Expand both Cumulative Replica Sets and Replica Sets. b. Match the GUID under Replica Sets to the identical GUID under Cumulative Replica Sets, and click the matching GUID under Cumulative Replica Sets. c. In the details pane, right click BurFlags and click Modify.
d. In the Value data box, type D2 hexadecimal or 210 decimal. e. Click OK and close Registry Editor.
On domain controllers running Windows Server 2003 with Service Pack 1 (SP1), you do not have to edit the registry directly to enable strict replication consistency. It is best to avoid editing the registry directly if possible. You can use a Repadmin command that enables strict replication consistency on one or all domain controllers in the forest. This command is available only in the version of Repadmin that is included with Windows Support Tools in Windows Server 2003 SP1. This command can be applied only on domain controllers running Windows Server 2003 with SP1. Administrative credentials To complete this procedure on a single domain controller, you must be a member of the Domain Admins group in the domain. To complete this procedure on all domain controllers, you must be a member of the Enterprise Admins group in the forest. Requirements: Operating system: Windows Server 2003 with SP1 Note To enable strict replication consistency on a domain controller that is not running Windows Server 2003 with SP1, use a registry editor to set the value in the Strict Replication Consistency entry to 1. Caution It is recommended that you do not directly edit the registry unless there is no other alternative. Modifications to the registry are not validated by the registry editor or by Windows before they are applied, and as a result, incorrect values can be stored. This can result in unrecoverable errors in the system. When possible, use Group Policy or other Windows tools, such as Microsoft
Management Console (MMC), to accomplish tasks rather than editing the registry directly. If you must edit the registry, use extreme caution. To enable strict replication consistency 1. Open a command prompt, type the following command, and then press ENTER: repadmin /regkey DC_LIST {+|-}key Term DC_LIST Definition The name of a single domain controller. (* applies the change to all domain controllers in the forest.) For the domain controller name, you can use the Domain Name System (DNS) name, the distinguished name of the domain controller computer object, or the distinguished name of the domain controller server object. + to enable and - to disable, and key is strict. For example, +strict enables strict replication consistency; -strict disables it.
{+|-}key
2. Repeat step 1 for every domain controller on which you want to enable strict replication consistency. Note For more naming options and information about the syntax of the DC_LIST parameter, at the command prompt type repadmin /listhelp.
To perform this procedure, you must be a member of the Domain Admins group in the domain of the selected domain controller or the Enterprise Admins group in the forest, or you must have been delegated the appropriate authority. If you want to synchronize the configuration and schema directory partitions on a domain controller in a child domain, you must have Domain Admins credentials in the forest root domain or Enterprise Admins credentials in the forest. To synchronize replication with all partners 1. At a command prompt, type the following command, and then press ENTER: repadmin /syncall DCName /e /d /A /P /q Term DCName Definition The Domain Name System (DNS) name of the domain controller on which you want synchronize replication with all partners Enterprise; includes partners in all sites. Identifies servers by distinguished name in messages. All; synchronizes all directory partitions that are held on the home server. Pushes changes outward from the home server. Runs in quiet mode; suppresses callback messages.
/e /d /A /P /q
2. Check for replication errors in the output of the command in the previous step. If there are no errors, replication is successful. For replication to complete, any errors must be corrected.
See Also
Verify successful replication to a domain controller
If @ [Never] appears in the output for a directory partition, replication of that directory partition has never succeeded from the identified source replication partner over the listed connection. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group in the domain of the destination domain controller. To verify successful replication to a domain controller 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl servername /u:domainname\username /pw:* Term servername domainname Definition Specifies the name of the destination domain controller. Specifies the single-label name of the domain of the destination domain controller. (You do not have to use a fully qualified Domain Name System (DNS) name.) Specifies the name of an administrative account in that domain.
username
3. When you are prompted for a password, type the password for the user account that you provided, and then press ENTER. You can also use Repadmin to generate the details of replication to and from all replication partners in a spreadsheet. The spreadsheet displays data in the following columns: Showrepl_COLUMNS Destination DC Site Destination DC Naming Context Source DC Site Source DC Transport Type Number of Failures Last Failure Time Last Success Time Last Failure Status The following procedure shows how to create this spreadsheet and set column headers for improved readability. To generate a repadmin /showrepl spreadsheet for all replication partners 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl * /csv >showrepl.csv 3. Open Microsoft Excel. 4. On the File menu, click Open, navigate to showrepl.csv, and then click Open. 5. Hide or delete column A as well as the Transport Type column, as follows: 6. Select a column that you want to hide or delete. To hide the column, on the Format menu, click Column, and then click Hide. Or
To delete the column, right-click the selected column, and then click Delete. 7. Select row 1 beneath the column heading row, and then, on the Window menu, click Freeze Panes. 8. Select the entire spreadsheet. On the Data menu, click Filter, and then click AutoFilter. 9. In the Last Success Time column, click the down arrow, and then click Sort Ascending. 10. In the Source DC column, click the down arrow, and then click Custom. 11. In the Custom AutoFilter dialog box, under Show rows where, click does not contain. In the adjacent text box, type del to eliminate from view the results for deleted domain controllers. 12. Repeat step 10 for the Last Failure Time column, but use the value does not equal, and type the value 0. 13. Resolve replication failures. The last successful attempt should agree with the replication schedule for intersite replication, or the attempt should be within the last hour for intrasite replication. If Repadmin reports any of the following conditions, see Troubleshooting Active Directory Replication Problems: The last successful intersite replication was prior to the last scheduled replication. The last intrasite replication was longer than one hour ago. Replication was never successful.
See Also
Troubleshooting Active Directory Replication Problems
procedures. By default, the Knowledge Consistency Checker (KCC) on a domain controller runs five minutes after the domain controller starts, automatically incorporating the reconnected domain controller into the replication topology.
Updating SYSVOL
As described in Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection, the recommended practice to ensure consistency of SYSVOL is to modify the registry before disconnecting the domain controller so that SYSVOL is updated
automatically when the domain controller is restarted. In addition, if you want to avoid a full synchronization of SYSVOL through intersite replication, you must take preparatory steps before disconnection. For information about how to ensure that SYSVOL is sourced locally and updated over the network only for changes, see "Seeding the SYSVOL tree from restored files during IFM promotion" in article 311078, "How to use the Install from Media feature to promote Windows Server 2003-based domain controllers," in the Microsoft Knowledge Base on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=37924). To update SYSVOL as soon as possible after reconnecting a domain controller, plan the time that you restart the domain controller to optimize the replication schedule, as follows: If the closest replication partner for the domain is in a different site, view site link properties to determine the replication schedule, and then restart the domain controller as soon as possible after replication is scheduled to start. If a replication partner for the domain is available within the site, verify replication success on that partner before restarting the domain controller. Important Do not use file copy utilities, such as Xcopy or Robocopy, to update an outdated SYSVOL. Copying SYSVOL files is recommended only for recreating a nonfunctioning SYSVOL, which requires several preliminary procedures. Copying SYSVOL files from one domain controller to another without following these procedures causes invalid data to be replicated and causes the system volumes on other domain controllers to become inconsistent. For information about how to recreate a nonfunctioning SYSVOL, see Restoring and Rebuilding SYSVOL. To complete this task, perform the following procedures: 1. Determine the tombstone lifetime for the forest. 2. Determine whether the maximum safe disconnection time has been exceeded. The maximum safe disconnection time should have been established at the time of disconnection, as follows: Subtract a generous estimate of the amount of time for end-to-end replication latency from the tombstone lifetime. Either find the latency estimate in the design documentation for your deployment or request the information from a member of your design or deployment team. 3. If the maximum safe disconnection time has not been exceeded, proceed with the reconnection process as follows: If the site in which you are reconnecting the domain controller has one or more other domain controllers that are authoritative for the domain, start the domain controller anytime.
If the site in which you are reconnecting the domain controller has no other domain controllers that are authoritative for the domain, proceed as follows: Determine when intersite replication is scheduled to begin by viewing the replication properties on the site link that connects this site to the next closest site that includes a domain controller that is authoritative for this domain. As soon as possible after the next replication cycle begins, start the domain controller. If the maximum safe disconnection time has been exceeded, proceed in the appropriate manner according to the operating system, as described in "Reconnecting an Outdated Domain Controller" earlier in this topic. 4. After replication is complete, Verify successful replication to a domain controller (the reconnected domain controller) of the domain, configuration, and schema directory partitions. If the domain controller is a global catalog server, check for successful replication of all domain directory partitions.
See Also
Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection
4. In the SiteLinkName Properties dialog box, click Change Schedule. Note the block of days and hours during which replication is allowed (Replication Available), and then click OK. 5. In the Replicate every _____ minutes box, note the number of minutes for the intervals at which replication polling takes place during an open schedule window, and then click OK.
repadmin /showreplDomainControllerName where DomainControllerName is the NetBIOS name of the domain controller whose GUID you want to determine. 2. In the top portion of the output, note the value in DC object GUID: If the destination domain controller and source domain controller are both running Windows Server 2003, you can remove lingering objects by using Repadmin. If either domain controller is running Windows 2000 Server, follow instructions in article 314282, "Lingering objects may remain after you bring an out-of-date global catalog server back online," in the Microsoft Knowledge Base on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=37924). Administrative Credentials To complete this procedure, you must be a member of the Domain Admins group in the DirectoryPartition domain. To use Repadmin to remove lingering objects 1. At a command prompt, type the following command, and then press ENTER: repadmin /removelingeringobjects ServerName ServerGUID DirectoryPartition /advisory_mode Term ServerName ServerGUID DirectoryPartition Definition The DNS name or the distinguished name of the domain controller that has or might have lingering objects. The GUID of a domain controller that has an up-to-date writable replica of the directory partition The distinguished name of the domain directory partition that might have lingering objects. For example, DC=RegionalDomainName,DC=ForestRootDomainName,DC=com. Also run the command against the configuration directory partition (CN=configuration,DC=ForestRootDomainName,DC=com), the schema directory partition (CN=schema,CN=configuration,DC=ForestRootDomainName), and any application directory partitions that are hosted on the domain controller you are checking for lingering objects.
/advisory_mode logs the lingering objects that will be removed so that you can review
them, but it does not remove them. 2. If lingering objects are found, repeat step 1 without /advisory_mode to delete the identified lingering objects from the directory partition. 3. Repeat steps 1 and 2 for every domain controller that might have lingering objects. Note The ServerName parameter uses the DC_LIST syntax for repadmin, which allows the use of * for all domain controllers in the forest and gc: for all global catalog servers in the forest. To see the DC_LIST syntax, type repadmin /listhelp.
See Also
Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042)
If @ [Never] appears in the output for a directory partition, replication of that directory partition has never succeeded from the identified source replication partner over the listed connection. Administrative credentials To perform this procedure, you must be a member of the Domain Admins group in the domain of the destination domain controller.
To verify successful replication to a domain controller 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl servername /u:domainname\username /pw:* Term servername domainname Definition Specifies the name of the destination domain controller. Specifies the single-label name of the domain of the destination domain controller. (You do not have to use a fully qualified Domain Name System (DNS) name.) Specifies the name of an administrative account in that domain.
username
3. When you are prompted for a password, type the password for the user account that you provided, and then press ENTER. You can also use Repadmin to generate the details of replication to and from all replication partners in a spreadsheet. The spreadsheet displays data in the following columns: Showrepl_COLUMNS Destination DC Site Destination DC Naming Context Source DC Site Source DC Transport Type Number of Failures Last Failure Time Last Success Time Last Failure Status
The following procedure shows how to create this spreadsheet and set column headers for improved readability. To generate a repadmin /showrepl spreadsheet for all replication partners 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: repadmin /showrepl * /csv >showrepl.csv 3. Open Microsoft Excel. 4. On the File menu, click Open, navigate to showrepl.csv, and then click Open. 5. Hide or delete column A as well as the Transport Type column, as follows: 6. Select a column that you want to hide or delete. To hide the column, on the Format menu, click Column, and then click Hide. Or To delete the column, right-click the selected column, and then click Delete. 7. Select row 1 beneath the column heading row, and then, on the Window menu, click Freeze Panes. 8. Select the entire spreadsheet. On the Data menu, click Filter, and then click AutoFilter. 9. In the Last Success Time column, click the down arrow, and then click Sort Ascending. 10. In the Source DC column, click the down arrow, and then click Custom. 11. In the Custom AutoFilter dialog box, under Show rows where, click does not contain. In the adjacent text box, type del to eliminate from view the results for deleted domain controllers. 12. Repeat step 10 for the Last Failure Time column, but use the value does not equal, and type the value 0. 13. Resolve replication failures. The last successful attempt should agree with the replication schedule for intersite replication, or the attempt should be within the last hour for intrasite replication.
If Repadmin reports any of the following conditions, see Troubleshooting Active Directory Replication Problems: The last successful intersite replication was prior to the last scheduled replication. The last intrasite replication was longer than one hour ago. Replication was never successful.
See Also
Troubleshooting Active Directory Replication Problems
The following files are required to complete this task: Ref.chm (in the Support\Tools folder on the Windows Server 2003 operating system CD) Unattend.txt Domain controller answer file
To complete this task, perform the following procedures: 1. Create an answer file for domain controller installation 2. Install Active Directory using an answer file
See Also
Include application directory partitions in an Active Directory installation from backup media
[DCINSTALL] UserName=SAM account name that has Domain Admins credentials in the target domain. This account must be used by the administrator who runs the Dcpromo command. Password=Password for the account name. If you leave this blank, Dcpromo prompts the user during installation. Dcpromo deletes this value following installation. UserDomain=Domain name for the user account in UserName. DatabasePath=Location of the Ntds.dit file. (The default is %systemroot%\ntds.) If you omit this entry, Dcpromo uses the default location. LogPath=Location of the database log files. (The default is %systemroot%\ntds.) If you omit this entry, Dcpromo uses the default location. SYSVOLPath=Location of the shared SYSVOL tree. (The default is %systemroot %\ntds.) If you omit this entry, Dcpromo uses the default location. SafeModeAdminPassword=Password for the administrator account that must be used to start the domain controller in Directory Services Restore Mode. If you leave this blank, Dcpromo prompts the user for the password during installation. Dcpromo deletes this value following installation. Passwords are removed from the answer file when Dcpromo is executed. CriticalReplicationOnly=Yes or no, to specify whether to skip noncritical portions of replication and allow Dcpromo to complete before replication is complete. SiteName=The name of the Active Directory site in which this domain controller will be placed. This site must be created in advance in the Active Directory Sites and Services snap-in. ReplicaOrNewDomain=Specify either Replica for an additional domain controller in an existing domain or NewDomain for the first domain controller in a new domain. ReplicaDomainDNSName=The fully qualified domain name of the domain of the new domain controller. ReplicationSourceDC=The name of an existing domain controller in the domain to use as the source replication partner during installation. When you install Active Directory from restored backup media, you can use this entry in conjunction with ReplicateFromMedia if you want to specify the domain controller from which Active Directory changes and SYSVOL changes are replicated. ReplicateFromMedia=Yes for installation from media, no for installation by
replication. ReplicationSourcePath=When the installation is by replication, the path to the installation CD or network share. When the installation is from restored backup media, the local drive and path to the restored backup files. RebootOnSuccess=Yes if you want the domain controller to restart automatically following a successful installation, no if you want to restart the domain controller manually. If you do not want the domain controller to restart automatically and you do not want to be prompted, use the value NoAndNoPromptEither. ApplicationPartitionsToReplicate=Comma-separated distinguished names, with the entire string enclosed in quotation marks, of application directory partitions that you want to include when you use restored backup media to install Active Directory (or * to include all application directory partitions). Using this entry requires Windows Server 2003 with Service Pack 1 (SP1) and Windows Server 2003 forest functional level. For more information about using this entry, see Include application directory partitions in an Active Directory installation from backup media. 11. Save the answer file to the location on the installation server from which it is to be called by Dcpromo, or save the file to a network share or removable media for distribution.
See Also
Include application directory partitions in an Active Directory installation from backup media
Answerfile
The path to the answer file, including the filename. 2. Click OK.
See Also
Create an answer file for domain controller installation Include application directory partitions in an Active Directory installation from backup media Verifying Active Directory Installation
To complete this task, perform the following procedures: 1. Determine whether a Server object has child objects 2. Verify that an IP address maps to a subnet and determine the site association You must ensure that the new domain controller is located in the proper site so that after the installation is complete, the new domain controller can locate replication partners and become part of the replication topology. If the site is not correct, you can
use the Active Directory Sites and Services snap-in to move the Server object for the domain controller to the proper site after Active Directory installation is complete. Note The last dialog box displayed by the Active Directory Installation Wizard lists the site where the new domain controller is installed. If this is not the proper site, you must move the Server object after the server is restarted. 3. Move the Server object to the new site 4. Configure DNS server forwarders 5. Complete all procedures for the Verifying DNS configuration task. 6. Check the status of the shared SYSVOL 7. Verify DNS registration and functionality 8. Verify domain membership for a new domain controller 9. Verify communication with other domain controllers 10. Verify replication with other domain controllers 11. Verify the availability of the operations masters
Child objects.
Verify that an IP address maps to a subnet and determine the site association
Use this procedure to determine the site to which you want to add a Server object prior to installing Active Directory, or to verify the appropriate site prior to moving a Server object to it. To be associated with a site, the IP address of a domain controller must map to a Subnet object that is defined in Active Directory. The site to which the subnet is associated is the site of the domain controller. The subnet address, which is computed from the IP network address and the subnet mask, is the name of a Subnet object in Active Directory. When you know the subnet address, you can locate the Subnet object and determine the site to which the subnet is associated. Administrative Credentials To perform this procedure, you must be a member of the Domain Users group. To verify that an IP address maps to a subnet and determine the site association 1. Log on locally or open a Terminal Services connection to the server for which you want to check the IP address. 2. On the desktop, right-click My Network Places, and then click Properties. 3. In the Network Connections dialog box, right-click Local Area Connection, and then click Properties. 4. Double-click Internet Protocol (TCP/IP). 5. Use the values in IP address and Subnet mask to calculate the subnet address and then click OK. 6. Click OK again and close the Network Connections dialog box. 7. Open Active Directory Sites and Services. 8. Expand the Sites container, and then click the Subnets container.
9. In the Name column in the details pane, find the Subnet object that matches the subnet address. 10. In the Site column, note the site to which the IP subnet address is associated. If the site that appears in the Site box is not the appropriate site, contact a supervisor and find out whether the IP address is incorrect or whether to move the Server object to the site indicated by the subnet.
DNS resource records has failed. If this error occurs, contact a supervisor and pursue DNS troubleshooting.
To complete this task, perform the following procedures: 1. Create a delegation for a domain controller If the parent DNS zone of any zone that is hosted by this DNS server contains a delegation to this DNS server, use this procedure to update the IP address in all such delegations. If your forest root domain has a parent DNS domain, perform this procedure on a DNS server in the parent domain. If you just added a new domain controller to a child domain, perform this procedure on a DNS server in the DNS parent domain. By following recommended practices, the parent domain is the forest root domain. 2. Configure the DNS client settings 3. Create a secondary zone
6. In the New Resource Record dialog box, in the IP address box, type IPAddress (where IPAddress is the IP address of the child domain controller), click Add, and then click OK.
To configure the DNS client settings 1. On the desktop, right-click My Network Places and click Properties. 2. In the Network Connections dialog box, right-click the connection that represents the connection this computer uses to attach to your network. The default label is Local Area Connection, but this can be changed so it might not be labeled the same on your computer. Click Properties. 3. In the Local Area Connection Properties dialog box, click once on Internet Protocol (TCP/IP) to highlight it (be sure you do not clear the check box in front of it), then click Properties. 4. In the Internet Protocol (TCP/IP) Properties dialog box, verify that Use the following DNS server addresses: is selected. 5. If the new domain controller is located in the forest root domain, set the Preferred DNS server IP address to that of another DNS server in the forest root domain. Try to choose a server that is located near the new domain controller. Set the Alternate DNS server address to the IP address of the new domain controller (so that it is referencing itself). If the new domain controller is located in a child domain, set the Preferred DNS server IP address to the IP address of the new domain controller (so that it is referencing itself). Set the Alternate DNS server address to that of another DNS server in the same domain. Try to choose a server that is located near the new domain controller. 6. Click OK to close the dialog box.
To perform this procedure, you must be a member of the Domain Admins group in Active Directory. To check the status of the shared SYSVOL 1. Open Event Viewer. 2. In the Event Viewer tree, click File Replication Service to display the FRS events. 3. Look for an event 13516 with a date and time stamp that corresponds with the recent restart. It can take 15 minutes or more to appear. An event 13508 indicates that FRS is in the process of starting the service. An event 13509 indicates that the service has started successfully. Event 13516 indicates that the service is started, the folders are shared, and the domain controller is functional. 4. To verify the shared folder is created, open a command prompt and type net share to display a list of the shared folders on this domain controller, including Net Logon and SYSVOL. 5. At a command prompt, type dcdiag /test:netlogons and press ENTER. 6. Look for a message that states computername passed test NetLogons where computername is the name of the domain controller. If you do not see the test passed message, some problem will prevent replication from functioning. This test verifies that the proper logon privileges are set to allow replication to occur. If this test fails, verify the permissions set on the Net Logon and SYSVOL shared folders.
2. Type the following command and then press ENTER: netdiag /test:dns Note For a more detailed response from this command, add /v to the end of the command. If DNS is functioning, the last line of the response is DNS Test..: Passed. The verbose option lists specific information about what was tested. This information can help with troubleshooting if the test fails. If the test fails, do not attempt any additional steps until you determine and fix the problem that prevents proper DNS functionality.
you want to add the new domain controller. The verbose option provides a detailed list of the operations masters that were tested. Near the bottom of your screen, a message confirms that the test succeeded. Press ENTER. If these tests fail, do not attempt any additional steps until you determine and fix the problem that prevents locating operations masters and verifying that they are functioning properly.
Renaming a domain controller is a common operation in many organizations and usually occurs when: New hardware is purchased to replace an existing domain controller.
Domain controllers are decommissioned, or promoted, and renamed to maintain a naming convention. Domain controllers are moved or placed in sites.
Note It is important to note that domain controller names have a primary impact on administration, rather than client access. Renaming a domain controller is an optional exercise, and the impacts should be well understood prior to renaming. Although you can use the System Properties user interface (UI) to rename a domain controller (as you can for any computer), Active Directory and DNS replication latency might temporarily prevent clients from locating or authenticating to the renamed domain controller, or both. To avoid this delay, use the Netdom command-line tool to rename a domain controller. Task requirements The following tools are required to perform the procedures for this task: System Properties or Netdom.exe Ldp.exe or Adsiedit.msc
If you want to use Netdom, the domain functional level must be set to Windows Server 2003. To complete this task, use one of the following two sets of procedures: 1. Rename a domain controller using System Properties 2. Update the FRS member object Or 1. Rename a domain controller using Netdom
See Also
Rename a domain controller using Netdom
Term NewComputerName
Definition The new name for the computer. The NewComputerName must be a fully qualified domain name (FQDN). The primary DNS suffix that is specified in the FQDN for NewComputerName must be the same as the primary DNS suffix of CurrentComputerName, or it must match the DNS name of the Active Directory domain that is hosted by this domain controller, or it must be contained in the list of allowed DNS suffixes that is specified in the msDSAllowedDNSSuffixes attribute of the domainDns object.
4. Restart the computer. 5. After the computer restarts, open a Command Prompt. 6. Type the following command to remove the old domain controller name, and then press ENTER: netdom computername NewComputerName /remove:OldComputerName Term NewComputerName OldComputerName Definition The new FQDN that you added for the computer in step 2. The old FQDN of the renamed computer.
See Also
Rename a domain controller using System Properties
To complete this task, perform the following procedures: 1. View the current operations master role holders To avoid problems, transfer any operations master roles prior to running the Active Directory Installation Wizard to decommission a domain controller so that you can control the operations master role placement. If you need to transfer any roles from a domain controller, understand all the recommendations for role placement before performing the transfer. Caution During the decommissioning process, the Active Directory Installation Wizard will attempt to transfer any remaining operations master roles to other domain controllers without any user interaction. However, if a failure occurs, the wizard will continue to uninstall Active Directory and leave your domain without roles. Also, you do not have control over which domain controller receives the roles. The wizard transfers the roles to any available domain controller and does not indicate which domain controller hosts them. 2. Transfer the schema master 3. Transfer the domain naming master 4. Transfer the domain-level operations master roles 5. Determine whether a domain controller is a global catalog server If you remove Active Directory from a domain controller that hosts a global catalog, the Active Directory Installation Wizard confirms that you want to continue with removing Active Directory. This confirmation ensures that you are aware that you are removing a global catalog from your environment. Do not remove the last global catalog server from your environment because users cannot log on without an available global catalog server. If you are not sure, do not proceed with removing Active Directory until you know that at least one other global catalog server is available. 6. Verify DNS registration and functionality 7. Verify communication with other domain controllers During the removal of Active Directory, contact with other domain controllers is required to ensure: Any unreplicated changes are replicated to another domain controller.
Removal of the domain controller from the directory. Transfer of any remaining operations master roles.
If the domain controller cannot contact the other domain controllers during Active Directory removal, the decommissioning operation fails. As with the installation process, test the communication infrastructure prior to running the installation wizard. When you remove Active Directory, use the same connectivity tests that you used during the installation of Active Directory. 8. Verify the availability of the operations masters Important If any of the verification tests fail, do not continue until you determine and fix the problems. If these tests fail, the uninstallation is also likely to fail. 9. Uninstall Active Directory 10. Determine whether a Server object has child objects 11. Delete a Server object from a site Note The administrator may not want to remove the Server object if it hosts something in addition to Active DirectoryMicrosoft Exchange, for example.
2. At the ntdsutil: prompt, type roles and press ENTER. 3. At the fsmo maintenance: prompt, type connections and press ENTER. 4. At the server connections: prompt, type connect to server servername (where servername is the name of the domain controller that belongs to the domain containing the operations masters). 5. After receiving confirmation of the connection, type quit and press ENTER to exit this menu. 6. At the fsmo maintenance: prompt, type select operation target and press ENTER. 7. At the select operations target: prompt, type list roles for connected server and press ENTER. The system responds with a list of the current roles and the Lightweight Directory Access Protocol (LDAP) name of the domain controllers currently assigned to host each role. 8. Type quit and press ENTER to exit each prompt in Ntdsutil.exe. Type quit and press ENTER at the ntdsutil: prompt to close the window.
Transfer the schema master 1. Open the Active Directory Schema snap-in. 2. In the console tree, right-click Active Directory Schema, and click Change Domain Controller. 3. In the Change Domain Controller dialog box, click Specify Name. Then, in the text box, type the name of the server to which you want to transfer the schema master role. Click OK. 4. In the console tree, right-click Active Directory Schema. Click Operations Master. The Change Schema Master box displays the name of the server that is currently holding the role. The targeted domain controller is listed in the second box. 5. Click Change. Click Yes to confirm your choice. The system confirms the operation. Click OK again to confirm that the operation succeeded. 6. Click Close to close the Change Schema Master dialog box. Note Hosting the infrastructure master on a global catalog server is not recommended. If you attempt to transfer the infrastructure master role to a domain controller that is a global catalog, the system displays a warning stating that this is not recommended.
To transfer the domain naming master 1. Open Active Directory Domains and Trusts. 2. In the console tree, right-click Active Directory Domains and Trusts, and then click Connect to Domain Controller. 3. Ensure that the proper domain name is entered in the Domain box. The available domain controllers from this domain are listed. 4. In the Name column, click the domain controller (to select it) to which you want to transfer the role. Click OK. 5. Right-click Active Directory Domains and Trusts, and then click Operations Master. 6. The name of the current domain naming master appears in the first text box. The server to which you want to transfer the role should appear in the second text box. If this is not the case, repeat steps 1 through 4. 7. Click Change. To confirm the role transfer, click Yes. Click OK again to close the message box indicating the transfer took place. Click Close to close the Change Operations Master dialog box.
To transfer a domain-level operations master role 1. Open Active Directory Users and Computers. 2. At the top of the console tree, right-click Active Directory Users and Computers. Click Connect to Domain Controller. 3. In the list of available domain controllers, click the name of the server to which you want to transfer the role, and then click OK. 4. At the top of the console tree, right-click Active Directory Users and Computers, point to All Tasks, and then click Operations Masters. The name of the current operations master role holder appears in the Operations master box. The name of the server to which you want to transfer the role appears in the lower box. 5. Click the tab for the role you want to transfer: RID, PDC, or Infrastructure. Verify the computer names that appear and then click Change. Click Yes to transfer the role, and then click OK. 6. Repeat steps 4 and 5 for each role that you want to transfer.
4. On the General tab, if the Global Catalog box is selected, the domain controller is designated as a global catalog server.
To perform this procedure, you must be a member of the Domain users group in Active Directory. To verify communication with other domain controllers 1. Open a Command Prompt. 2. Type the following command and then press ENTER: netdiag /test:dsgetdc Note For a more detailed response from this command, add /v to the end of the command. If domain controllers are successfully located, the last line of the response is DC discovery test..: Passed. The verbose option lists the specific domain controllers that are located. If the test fails, do not attempt any additional steps until you determine and fix the problem that prevents communication with other domain controllers.
command, you can use the verbose option by adding /v to the end of the command to see the detailed response. To verify the availability of the operations masters 1. Open a Command Prompt. 2. Type the following command to ensure that the operations masters can be located and then press ENTER: dcdiag /s: domaincontroller /test:knowsofroleholders /verbose where domaincontroller is the name of a domain controller in the domain in which you want to add the new domain controller. The verbose option provides a detailed list of the operations masters that were tested. Near the bottom of the screen, a message confirms that the test succeeded. If you use the verbose option, look carefully at the bottom part of the displayed output. The test confirmation message appears immediately after the list of operations masters. Press ENTER. 3. Type the following command to ensure that the operations masters are functioning properly and are available on the network: dcdiag /s: domaincontroller /test:fsmocheck where domaincontroller is the name of a domain controller in the domain in which you want to add the new domain controller. The verbose option provides a detailed list of the operations masters that were tested. Near the bottom of your screen, a message confirms that the test succeeded. Press ENTER. If these tests fail, do not attempt any additional steps until you determine and fix the problem that prevents locating operations masters and verifying that they are functioning properly.
To uninstall Active Directory 1. Click Start, click Run, type dcpromo and then click OK. 2. The Active Directory Installation Wizard appears. Click Next at the Welcome screen. 3. You have an option to select This server is the last domain controller in the domain. If you select this option, the wizard attempts to remove the domain from the forest. Do not select this option. Click Next. 4. At the Administrative Password screen, enter and confirm the password that you want to assign to the local Administrator account after Active Directory is removed. Click Next. 5. At the Summary screen, verify that the information is correct and then click Next to proceed with the removal. 6. The wizard proceeds to remove Active Directory. After it finishes, the wizard displays a completion screen. Click Finish to close the wizard. 7. Click Restart to restart the domain controller.
Child objects.
requires connectivity to the domain. Forced removal is not intended to replace the normal Active Directory removal procedure in any way. It is virtually equivalent to permanently disconnecting the domain controller. Active Directory stores a considerable amount of metadata about a domain controller. During the normal process of uninstalling Active Directory on a domain controller, this metadata is removed from Active Directory through a connection to another domain controller in the domain. A forced removal assumes that there is no connectivity to the domain; therefore, it does not attempt any metadata removal (cleanup). Consequently, forced removal of Active Directory from a domain controller should always be followed by the metadata cleanup procedure, which removes all references to the domain controller from the domain and forest. Forced demotion should not be performed on the last domain controller in a domain. Task Requirements The following tools are required to perform the procedures for this task: Active Directory Sites and Services Dcpromo.exe Ntdsutil.exe
To complete this task, perform the following procedures: 1. Identify replication partners. Connect to one of these domain controllers when you clean up server metadata in procedure 3. 2. Force domain controller removal 3. Clean up server metadata
To identify replication partners 1. Open Active Directory Sites and Services. 2. In the console tree, expand the Sites container to display the list of sites. 3. Double-click the site that contains the domain controller for which you want to determine Connection objects. Note If you do not know the site in which the domain controller is located, open a command prompt and type ipconfig to get the IP address of the domain controller. Use the IP address to verify that an IP address maps to a subnet and determine the site association. 4. Expand the Servers folder to display the list of servers in that site. 5. Expand the name of your domain controller to display its NTDS settings. 6. Double-click NTDSSettings to display the list of Connection objects in the details pane (these represent inbound connections used for replication). The From Server column displays the names of the domain controllers that are the replication partners.
Definition The distinguished name of the domain controller whose metadata you want to remove, in the form cn=ServerName,cn=Servers,cn=SiteName, cn=Sites,cn=Configuration,dc=ForestRootDomain The DNS name of the domain controller to which you want to connect and from which you want to remove server metadata
ServerName2
If you are performing metadata cleanup by using the version of Ntdsutil.exe that is included with Windows Server 2003 with no service pack, perform metadata cleanup as follows: a. At the metadata cleanup: prompt, type: connection b. At the server connections: prompt, type: connect to server Server c. At the server connections: prompt, type:
quit d. At the metadata cleanup: prompt, type: select operation target e. At the select operation target: prompt, type: list sites A numbered list of sites appears. f. At the select operation target: prompt, type:
select site SiteNumber g. At the select operation target: prompt, type: list domains in site A numbered list of domains in the selected site appears. h. At the select operation target: prompt, type: select domain DomainNumber i. At the select operation target: prompt, type:
list servers in site A numbered list of servers in a domain and site appears. j. At the select operation target: prompt, type:
remove selected server Value Server Description The DNS name of a domain controller that you want to connect to The number associated with the site of the server that you want to clean up that appears in the list The number associated with the domain of the server that you want to clean up that appears in the list The number associated with the server that you want to clean up that appears in the list
SiteNumber
DomainNumber
ServerNumber
At this point, Active Directory confirms that the domain controller was removed successfully. If you receive an error message that indicates that the object cannot be found, Active Directory might have already removed the domain controller. 5. At the metadata cleanup: and ntdsutil: prompts, type quit.
Identity and Directory Services Community on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=20151) Windows Server Active Directory Newsgroup on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=43065) For development information about Active Directory, see the following resources: Active Directory Platform SDK on the Microsoft Web site (http://go.microsoft.com/fwlink/?linkid=142) Lightweight Directory Access Protocol Platform SDK on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkID=2972) RFC Pages and Internet-Drafts on the Internet Engineering Task Force Web site (http://go.microsoft.com/fwlink/?LinkID=121) Note Web addresses can change, so you might be unable to connect to the Web site or sites mentioned here.
This initial release of the Active Directory Troubleshooting guide includes troubleshooting recommendations and procedures for diagnosing and fixing problems that may occur with Active Directory replication. This content focuses primarily on responses to Directory Service event log messages and tool-based error messages that might be reported by the Repadmin.exe and Dcdiag.exe tools, which are available in Windows Support Tools. Installation of Windows Server 2003 with SP1 is encouraged for improved diagnostic support in both Windows Support Tools, which you must install separately, and the Ntdsutil.exe administrative command-line tool, which is included with the operating system. Acknowledgments Key Technical Reviewers: Arren Conner, Gregory Johnson, Rob Kochman, Ajit Krishnan, Dave Tesar
You can also run some tools, such as Repadmin.exe and Dcdiag.exe, on computers running Windows XP Professional, Windows XP Professional with SP1, or Windows XP Professional with Service Pack 2 (SP2). Options for other tools vary by tool. In this guide, the operating system that is required for running a tool is specified as a prerequisite for each procedure.
Use the following procedure to change the logging level for a diagnostic entry. Caution It is recommended that you do not directly edit the registry unless there is no other alternative. Modifications to the registry are not validated by the registry editor or by Windows before they are applied, and as a result, incorrect values can be stored. This can result in unrecoverable errors in the system. When possible, use Group Policy or other Windows tools, such as Microsoft Management Console
(MMC), to accomplish tasks rather than editing the registry directly. If you must edit the registry, use extreme caution. Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the domain of the domain controller on which you are setting the logging level. Tools: Regedit.exe
To change the logging level for a diagnostic entry 1. Click Start, click Run, type regedit, and then click OK. 2. Navigate to the entry for which you want to set logging in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnosti cs. 3. Double-click the entry, and for the Base click Decimal. 4. In the Value data box, type an integer from 0 through 5, and then click OK.
Intentional Disconnections
If replication errors are reported by a domain controller that is attempting replication with a domain controller that has been built in a staging site and is currently offline awaiting its deployment in the final production site (remote), you can account for those errors. To avoid separating a domain controller from the replication topology for extended periods, which causes continuous errors until the domain controller is reconnected, consider adding such computers initially as member servers and using the install-from-media method to install Active Directory. You can back up an up-to-date domain controller to removable media (CD/DVD or other media) and ship the media to the destination site. Then, you can use the media to promote the domain controllers at the site, without requiring replication. For more information about installing from media, see Installing a Domain Controller in an Existing Domain Using Restored Backup Media.
Root Causes
If you rule out intentional disconnections, hardware failures, and outdated Windows 2000 domain controllers, the remainder of replication problems almost always have one of the following root causes: Network connectivity: The network connection might be unavailable or network settings are not configured properly. Name resolution: DNS misconfigurations are a common cause for replication failures. Authentication and authorization: Authentication and authorization problems cause "Access denied" errors when a domain controller tries to connect to its replication partner. Directory database (store): The directory database might not be able to process transactions fast enough to keep up with replication timeouts. Replication engine: If intersite replication schedules are too short, replication queues might be too large to process in the time that is required by the outbound replication schedule. In this case, replication of some changes can be stalled indefinitely potentially, long enough to exceed the tombstone lifetime.
Replication topology: Domain controllers must have intersite links in Active Directory that map to real wide area network (WAN) or virtual private network (VPN) connections. If you create objects in Active Directory for the replication topology that are not supported by the actual site topology of your network, replication that requires the misconfigured topology fails.
For more information about forcing Active Directory removal, see Forcing the Removal of a Domain Controller.
Use Repadmin (Windows Support Tools) to monitor replication status daily by running a command that assesses the replication status of all domain controllers in your forest. The procedure generates a .csv file that you can open in Excel and filter for replication failures. Use the following procedure to retrieve the replication status of all domain controllers in the forest. Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the forest root domain or the Enterprise Admins group in the forest. Tools:
Repadmin.exe (Windows Support Tools) Excel (Microsoft Office) To retrieve replication status 1. Open a command prompt, type the following command, and then press ENTER:
repadmin /showrepl * /csv >showrepl.csv 2. In Excel, on the File menu, click Open. 3. In Files of type, click Text Files (*.prn;*.txt;*.csv). 4. In Look in, navigate to showrepl.csv, and then click Open. 5. In the Excel spreadsheet, right-click the column heading for showrepl_COLUMNS (column A) and then click Hide. Repeat for the column labeled Transport Type. 6. Select the row just under the column headings, and then, on the Window menu, click Freeze Pane. 7. Click the upper-left corner of the spreadsheet to highlight the entire spreadsheet. On the Data menu, point to Filter, and then click AutoFilter. 8. In the heading of the Last Success column, click the down arrow, and then click Sort Ascending. 9. In the heading of the Source DC column, click the down arrow, and then click Custom. In the Custom AutoFilter dialog box, complete the custom filter as follows: a. Under Source DC, click does not contain. b. In the corresponding text box, type del to filter deleted domain controllers from the spreadsheet. 10. In the heading of the Last Failure column, click the down arrow, and then click Custom. In the Custom AutoFilter dialog box, complete the custom filter as follows: a. Under Last Failure, click does not equal. b. In the corresponding text box, type 0 to filter for only domain controllers that are experiencing failures. For every domain controller in the forest, the spreadsheet shows the source replication partner, the time that replication last occurred, and the time that the last replication failure occurred for each naming context (directory partition). By using Autofilter in Excel, you can view the replication health for working domain controllers only, failing domain controllers only, or domain controllers that are the least or most current, and you can see the replication partners that are replicating successfully.
A domain controller has failed Event ID 2042: It has been inbound replication with the too long since this machine named source domain replicated controller long enough for a deletion to have been tombstoned, replicated, and garbage-collected from Active Directory. If no items appear in the Fixing Replication Inbound Neighbors section Connectivity Problems of the output that is (Event ID 1925) generated by repadmin /showrepl, the domain controller was not able to establish replication links with another domain controller.
No inbound neighbors.
Root cause
Solution
A replication link exists Fixing Replication Security between two domain Problems controllers, but replication cannot be performed properly due to an authentication failure. This problem can be related to connectivity, DNS, or authentication issues. If this is a DNS error, the local domain controller could not resolve the globally unique identifier (GUID)based DNS name of its replication partner. Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088) Fixing Replication Security Problems Fixing Replication Connectivity Problems (Event ID 1925) Fixing Replication Security Problems
Last attempt at <date - time> failed with the Target account name is incorrect.
The domain controller computer account might not be synchronized with the Key Distribution Center (KDC). The administration tool could not contact Active Directory. The progress of inbound replication was interrupted by a higher priority replication request, such as a request generated manually with the repadmin /sync command. The domain controller posted a replication request and is waiting for an answer. Replication is in progress from this source.
Cannot open LDAP connection to local host Active Directory replication has been preempted.
Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088) Wait for replication to complete. This informational message indicates normal operation.
Wait for replication to complete. This informational message indicates normal operation.
The replication Fixing Replication Topology Problems (Event ID configuration 1311) information in Active Directory does not accurately reflect the physical topology of the network. Strict replication Fixing Replication Lingering Object Problems consistency is not in (Event IDs 1388, 1988, 2042) effect, and a lingering object has been replicated to the domain controller. The attempt to establish a replication link for a writable directory partition failed. This event can have different causes, depending on the error. Fixing Replication Connectivity Problems (Event ID 1925) Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088)
Root cause The local domain controller has attempted to replicate an object from a source domain controller that is not present on the local domain controller because it may have been deleted and already garbage-collected. Replication will not proceed for this directory partition with this partner until the situation is resolved. Replication has not occurred with this partner for a tombstone lifetime, and replication cannot proceed. Active Directory could not resolve the DNS host name of the source domain controller to an Internet Protocol (IP) address, and replication failed.
Solution Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042)
Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042)
Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088)
Root cause Active Directory could not resolve the DNS host name of the source domain controller to an IP address, but replication succeeded. Update sequence number (USN) rollback has occurred and replication has been stopped. This error indicates an improper Active Directory restore, possibly of a virtual machine file (.vhd).
Solution Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088)
For an explanation of this problem and recommendations for solutions, see Running Domain Controllers in Virtual Server 2005 on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=38330).
A machine account Fixing Replication Security Problems failed to authenticate, which is usually caused by either multiple instances of the same computer name or the computer name not replicating to every domain controller.
For more information about replication concepts, see Active Directory Replication Technologies in the Windows Server 2003 Technical Reference on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=41950). In this section Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042)
Fixing Replication Security Problems Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088) Fixing Replication Connectivity Problems (Event ID 1925) Fixing Replication Topology Problems (Event ID 1311)
Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042)
If a domain controller does not replicate for a period of time that is longer than the tombstone lifetime and the domain controller is then reconnected to the replication topology, objects that were deleted from Active Directory while the domain controller was offline can remain on the domain controller as lingering objects.
Note The tombstone lifetime value that is in effect when a domain controller is upgraded to Windows Server 2003 SP1 is not changed by upgrading. The existing value is maintained until you change it manually. After the tombstone is removed permanently, the object deletion can no longer be replicated. Therefore, the tombstone lifetime defines how long domain controllers in the forest retain knowledge of a deleted object and thus the time during which a unique
deletion must be received by all direct and transitive replication partners of the originating domain controller.
A bridgehead server is overloaded, and replication becomes backlogged. Excessively high replication load on a global catalog server, in combination with a short intersite replication interval, can result in updates not being replicated. Note Global catalog servers replicate read-only replicas of all domain directory partitions in the forest. The replication of read-only replicas has a lower priority than the replication of writable replicas. In addition, global catalog servers are often bridgehead servers, which adds to the replication load. If the replication load on global catalog servers acting as bridgehead servers is too high as a result of an extremely short replication interval, excessive numbers of concurrent outbound replication partners, or a combination of both, the replication queue can become backlogged. If the condition persists, read-only replicas can remain in the queue indefinitely. These conditions can result in lingering objects on a global catalog server. Wide area network (WAN) connections are unavailable for long periods. For example, a domain controller onboard a cruise ship might be unable to replicate because the ship is at sea for longer than the tombstone lifetime. The reported event is a false positive because an administrator shortened the tombstone lifetime to force tombstone deletion (garbage collection). The reported event is a false positive because the system clock on the source or destination domain controller is improperly rolled forward or back in time. Clock skews are most common following a system reboot and can have the following causes: System clock battery or motherboard problems.
The time source for a computer is improperly configured, including a time source server configured with Windows Time service (W32time), third-party time servers, and network routers. The system clock is advanced or rolled back by an administrator attempting to extend the useful life of a system state backup or accelerate the garbage collection of deleted objects. Make sure that the system clock reflects the actual time and that event logs do not contain events from the future or invalid past.
to create an object with the same name in the domain or with the same user principal name (UPN) in the forest. However, the existence of lingering objects can cause problems, especially if the object is a security principal.
If you have a domain controller that is running Windows Server 2003 with SP1, you do not need to edit the registry to set strict replication consistency. Instead, you can use Repadmin to set the value for one or all domain controllers in the forest. To set strict replication consistency for specific domain controllers or for all domain controllers, see Event ID 1388 or 1988: A lingering object is detected. For more information about strict replication consistency, see "How the Active Directory Replication Model Works" in the Windows Server 2003 Technical Reference on the Microsoft Web site at http://go.microsoft.com/fwlink/?LinkId=27636.
A deleted account remains in the Address Book, e-mail is not received, or a duplicate account exists Event ID 2042: It has been too long since this machine replicated
See Also
Configuring a Computer for Troubleshooting Active Directory
Event ID 1388
This event indicates that a destination domain controller that does not have strict replication consistency enabled has received a request to update an object that does not reside in the local copy of the Active Directory database. In response, the destination domain controller has requested the full object from the source replication partner. In this way, a lingering object has been replicated ("reanimated") to the destination domain controller. Important When event ID 1388 occurs, if either the source domain controller (the replication partner that is outbound-replicating the lingering object) or the destination domain controller (the inbound replication partner that reports event ID 1388) is running Windows 2000 Server, you cannot use the Repadmin tool to remove lingering objects. For information about how to remove lingering objects in this case, see article 314282, "Lingering objects may remain after you bring an out-of-date global catalog server back online," on the Microsoft Web site at http://go.microsoft.com/fwlink/?LinkId=41410. The procedures and information in this article apply to the removal of lingering objects from global catalog servers as well as from domain controllers that are not global catalog servers. The event text identifies the source domain controller and the outdated (lingering) object. An example version of the event text is as follows:
Event Type:Error
Event Source:NTDS Replication Event Category:Replication Event ID:1388 Date:2/21/2005 Time:9:19:48 AM User:NT AUTHORITY\ANONYMOUS LOGON Computer:DC3 Description: Another domain controller (DC) has attempted to replicate into this DC an object which is not present in the local Active Directory database. The object may have been deleted and already garbage collected (a tombstone lifetime or more has past since the object was deleted) on this DC. The attribute set included in the update request is not sufficient to create the object. The object will be re-requested with a full attribute set and re-created on this DC. Source DC (Transport-specific network address): 4a8717eb-8e58-456c-995a-c92e4add7e8e._msdcs.contoso.com Object: CN=InternalApps,CN=Users,DC=contoso,DC=com Object GUID: a21aa6d9-7e8a-4a8f-bebf-c3e38d0b733a Directory partition: DC=contoso,DC=com Destination highest property USN: 20510 User Action: Verify the continued desire for the existence of this object. To discontinue re-creation of future similar objects, the following registry key should be created. Registry Key: HKLM\System\CurrentControlSet\Services\NTDS\Parameters\Strict Replication Consistency
Event ID 1988
This event indicates that a destination domain controller that has strict replication consistency enabled has received a request to update an object that does not exist in its local copy of the Active Directory database. In response, the destination domain controller has blocked replication of the directory partition containing that object from that source domain controller. The event text identifies the source domain controller and the outdated (lingering) object. An example version of the event text is as follows:
Event Event Event Event Type:Error Source:NTDS Replication Category:Replication ID:1988
Date:2/21/2005 Time:9:13:44 AM User:NT AUTHORITY\ANONYMOUS LOGON Computer:DC3 Description: Active Directory Replication encountered the existence of objects in the following partition that have been deleted from the local domain controllers (DCs) Active Directory database. Not all direct or transitive replication partners replicated in the deletion before the tombstone lifetime number of days passed. Objects that have been deleted and garbage collected from an Active Directory partition but still exist in the writable partitions of other DCs in the same domain, or read-only partitions of global catalog servers in other domains in the forest are known as "lingering objects". This event is being logged because the source DC contains a lingering object which does not exist on the local DCs Active Directory database. This replication attempt has been blocked. The best solution to this problem is to identify and remove all lingering objects in the forest. Source DC (Transport-specific network address): 4a8717eb-8e58-456c-995a-c92e4add7e8e._msdcs.contoso.com Object: CN=InternalApps,CN=Users,DC=contoso,DC=com Object GUID: a21aa6d9-7e8a-4a8f-bebf-c3e38d0b733a
Cause
An object that has been permanently deleted from Active Directory (that is, its tombstone has been garbage-collected) remains on a domain controller. The domain controller failed to receive direct or transitive replication of the object deletion because it was disconnected (offline or experiencing an inbound replication failure) from the replication topology for a period that exceeded a tombstone lifetime. That object has been updated on the domain controller, causing a replication notification to the replication partner that an update is ready for replication. The replication partner has responded according to its replication consistency setting. This notification applies to attempted replication of a writable object. A copy of the writable lingering object might also exist on a global catalog server.
Solution
If replication of a lingering object has been detected, you can remove the object from Active Directory, along with any read-only replicas of the object, by identifying the domain
controllers that might store this object (including global catalog servers) and running a repadmin command to remove lingering objects against these servers (repadmin /removelingeringobjects). This command is available on domain controllers that are running the version of Repadmin.exe that is included with Windows Support Tools in Windows Server 2003. If the lingering object is present in a writable or read-only directory partition on a domain controller running Windows Server 2003 or Windows Server 2003 with Service Pack 1 (SP1), you can remove lingering objects by running the repadmin /removelingeringobjects command against that target domain controller. To remove lingering objects, do the following: 1. Use the event text to identify the following: a. Directory partition of the object b. Source domain controller that attempted replication of the lingering object 2. Install Windows Support Tools on the domain controller that received the event, if necessary. See "Install Windows Support Tools" in Configuring a Computer for Troubleshooting Active Directory. 3. Use Repadmin to Identify the GUID of an Authoritative Domain Controller 4. Use Repadmin to Remove Lingering Objects 5. Enable Strict Replication Consistency, if necessary.
To identify the GUID of a domain controller 1. At a command prompt, type the following command, and then press ENTER: repadmin /showrepl ServerName where ServerName is the name of the domain controller for which you want to display the GUID. 2. In the first section of the output, locate the objectGuid entry. Select and copy the GUID value into a text file so that you can use it elsewhere.
ServerGUID
Term DirectoryPartition
Definition The distinguished name of the directory partition that is identified in the event message. For example, DC=RegionalDomainName,DC=ForestRootDomainName,DC=com for a domain directory partition, CN=configuration,DC=ForestRootDomainName,DC=com for the configuration directory partition, or CN=schema,CN=configuration,DC=ForestRootDomainName,DC=com for the schema directory partition
/advisory_mode logs the lingering objects that will be removed so that you can review them, but it does not remove them. 2. Repeat step 1 without /advisory_mode to delete the identified lingering objects from the directory partition. 3. Repeat steps 1 and 2 for every domain controller that might have lingering objects. Note The ServerName parameter uses the DC_LIST syntax for repadmin, which allows the use of * for all domain controllers in the forest and gc: for all global catalog servers in the forest. To see the DC_LIST syntax, type repadmin /listhelp.
To complete this procedure on a single domain controller, you must be a member of the Domain Admins group. To complete this procedure on all domain controllers in the forest, you must be a member of the Enterprise Admins group in the forest. Tool: Repadmin.exe (Windows Support Tools that are included with Windows Server 2003 SP1) To use Repadmin to enable strict replication consistency 1. Open a command prompt, type the following command, and then press ENTER: repadmin /regkey DC_LIST +strict where DC_LIST is the name of a single domain controller. (* applies the change to all domain controllers in the forest.) For the domain controller name, you can use the Domain Name System (DNS) name, the distinguished name of the domain controller computer object, or the distinguished name of the domain controller server object. 2. If you do not use * to apply the change to all domain controllers, repeat step 1 for every domain controller on which you want to enable strict replication consistency. Note For more naming options and information about the syntax of the DC_LIST parameter, at the command prompt, type repadmin /listhelp.
Requirements:
Operating system: Windows Server 2003, Windows 2000 Server with SP3, Windows 2000 Server with SP4 Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group. Tool: Registry editor (for example, Regedit.exe) Caution It is recommended that you do not directly edit the registry unless there is no other alternative. Modifications to the registry are not validated by the registry editor or by Windows before they are applied, and as a result, incorrect values can be stored. This can result in unrecoverable errors in the system. When possible, use Group Policy or other Windows tools, such as Microsoft Management Console (MMC), to accomplish tasks rather than editing the registry directly. If you must edit the registry, use extreme caution. To edit the registry to enable strict replication consistency 1. Open a registry editor. 2. Navigate to Strict Replication Consistency entry in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Paramete rs. 3. Set the value in the Strict Replication Consistency entry to 1.
A deleted account remains in the Address Book, e-mail is not received, or a duplicate account exists
Deleted accounts remaining in the global address list (GAL), e-mail messages for existing accounts not being received, or duplicate objects existing in Active Directory are all symptoms that can indicate a lingering object problem. If you have no error or event that identifies the lingering object and its directory partition (for example, event ID 1388 or event ID 1988), you must search the global catalog for an object that you believe might be causing the problem. When you identify the lingering object and the directory partition of the object, you can perform the procedures to remove it.
Solution
Based on these symptoms of a lingering object, you usually have a good idea of the name of the object and you can use the following steps to solve the problem: Use this name to identify the object in the global catalog. Identify the directory partition of the object.
Remove all lingering objects from that directory partition on all global catalog servers in the forest.
To establish the distinguished name of an object 1. Click Start, click Run, type Ldp, and then click OK. 2. On the Connection menu, click Connect. 3. In Port, type 3268, and then click OK. 4. On the Connection menu, click Bind. 5. In the Bind dialog box, provide credentials for a user account in the forest, and then click OK. 6. On the View menu, click Tree. 7. In the Tree View dialog box, in BaseDN, type the distinguished name of the forest root domain, and then click OK. 8. In the console tree, right-click the forest root domain, and then click Search. 9. In the Search dialog box, in Filter, replace the default filter (objectClass=*) to create a filter of the following form:
(attribute=value) where attribute is the Lightweight Directory Access Protocol (LDAP) name of an attribute and value is the value that you know or suspect to be associated with the object that you are searching for. For example, use ([email protected]), (sAMAccountName=JanD), or (sn=Dryml) to locate the duplicate user object Jan Dryml. You can use the asterisk (*) in the value field if you want to search all objects. 10. In the Scope box, click Subtree, and then click Run. 11. Click Close, and then view the results. You must identify which of the displayed objects should be removed from Active Directory. An indication that you have found a lingering object that exists only on a global catalog server is that the object does not exist in a writable replica of the directory partition. 12. If necessary, repeat steps 8 through 10 to rephrase the query, and then run it again.
Event ID 2042: It has been too long since this machine replicated
If a domain controller has not replicated with its partner for longer than a tombstone lifetime, it is possible that a lingering object problem exists on one or both domain controllers. When this condition occurs, inbound replication with the source partner is stopped on the destination domain controller and event ID 2042 is logged in the Directory
Services event log. The event identifies the source domain controller and the appropriate steps to take to either remove the outdated domain controller or remove lingering objects and restore replication from the source domain controller. An example of the event text is as follows:
Event Type:Error Event Source:NTDS Replication Event Category:Replication Event ID:2042 Date:3/22/2005 Time:7:28:49 AM User:NT AUTHORITY\ANONYMOUS LOGON Computer:DC3 Description: It has been too long since this machine last replicated with the named source machine. The time between replications with this source has exceeded the tombstone lifetime. Replication has been stopped with this source. The reason that replication is not allowed to continue is that the two machine's views of deleted objects may now be different. The source machine may still have copies of objects that have been deleted (and garbage collected) on this machine. If they were allowed to replicate, the source machine might return objects which have already been deleted. Time of last successful replication: 2005-01-21 07:16:03 Invocation ID of source: 0397f6c8-f6b8-0397-0100-000000000000 Name of source: 4a8717eb-8e58-456c-995a-c92e4add7e8e._msdcs.contoso.com Tombstone lifetime (days): 60 The replication operation has failed. User Action: Determine which of the two machines was disconnected from the forest and is now out of date. You have three options: 1. Demote or reinstall the machine(s) that were disconnected. 2. Use the "repadmin /removelingeringobjects" tool to remove inconsistent deleted objects and then resume replication. 3. Resume replication. Inconsistent deleted objects may be introduced. You can continue replication by using the following registry key. Once the systems replicate once, it is recommended that you remove the key to reinstate the protection. Registry Key: HKLM\System\CurrentControlSet\Services\NTDS\Parameters\Allow Replication With Divergent and Corrupt Partner
Solution
Treat this occurrence as a lingering object condition, and do the following: Run the repadmin /showrepl command on the domain controller that received the error to determine which domain controller has been disconnected for longer than a tombstone lifetime. Remove lingering objects. Follow the instructions for removing lingering objects from the source and destination domain controllers as described in Event ID 1388 or 1988: A lingering object is detected. Restart replication on the destination domain controller. After you remove lingering objects, you must restart replication on the domain controller that logged the event by editing the registry setting that allows replication with a potentially out-of-date domain controller. You can also perform this procedure if you do not want to wait to remove lingering objects and you want to start replication immediately. Reset the registry to protect the domain controller against outdated replication. After replication has resumed on the domain controller that logged the event, reset the registry so that this domain controller continues to log events if replication is attempted with a domain controller where the last successful replication occurred longer than a tombstone lifetime ago.
Caution It is recommended that you do not directly edit the registry unless there is no other alternative. Modifications to the registry are not validated by the registry editor or by Windows before they are applied, and as a result, incorrect values can be stored. This can result in unrecoverable errors in the system. When possible, use Group Policy or other Windows tools, such as Microsoft Management Console (MMC), to accomplish tasks rather than editing the registry directly. If you must edit the registry, use extreme caution. Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the domain of the domain controller. Tool: Regedit.exe
To restart replication following event ID 2042 1. Click Start, click Run, type regedit, and then click OK. 2. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Paramet ers 3. In the details pane, create or edit the registry entry as follows: If the registry entry exists in the details pane, modify the entry as follows: a. In the details pane, right-click Allow Replication With Divergent and Corrupt Partner, and then click Modify. b. In the Value data box, type 1, and then click OK. If the registry entry does not exist, create the entry as follows: a. Right-click Parameters, click New, and then click DWORD Value. b. Type the name Allow Replication With Divergent and Corrupt Partner, and then press ENTER. c. Double-click the entry. In the Value data box, type 1, and then click OK.
Note If you did not remove the lingering objects, attempting replication might result in replication of a lingering object. If strict replication consistency is enabled on the destination domain controller, replication with the source domain controller will be blocked again.
1398* 1722*
Use the procedures in An "Access denied" or other security error has caused replication problems to diagnose and fix replication security problems.
Cause
A replication destination domain controller cannot contact its source replication partner to get Active Directory updates as a result of one or more security errors occurring on the connection between the two domain controllers.
Solution
Run the replication security error diagnostic test that is available in the version of Dcdiag in Windows Support Tools that is included in Windows Server 2003 SP1.
Although you can run the enhanced version of Dcdiag on computers running Windows XP Professional and Windows Server 2003 with no service pack installed, to run the new replication security test (/test:CheckSecurityError), you must run Dcdiag on a domain controller running Windows Server 2003 with SP1. You can run the new Dcdiag replication security tests against domain controllers that are running the following operating systems: Windows 2000 Server with Service Pack 3 (SP3) Windows 2000 Server with Service Pack 4 (SP4) Windows Server 2003 Windows Server 2003 with SP1 To test a domain controller for replication security errors 1. At a command prompt, type the following command, and then press ENTER: dcdiag /test:CheckSecurityError /s:DomainControllerName where DomainControllerName is the Domain Name System (DNS) name, network basic input/output system (NetBIOS) name, or distinguished name of the domain controller on which you want to test. If you do not use the /s: switch, the test is run against the local domain controller. You can also test all domain controllers in the forest by using /e: instead of /s:. 2. Copy the report into Notepad or an equivalent text editor 3. Scroll to the Summary table near the bottom of the Dcdiag log file. 4. Note the names of all domain controllers that reported Warn or Fail status in the Summary table. 5. Find the detailed breakout section for the problem domain controller by searching on the string DC: DomainControllerName. 6. Make the required configuration changes on the domain controllers. Rerun Dcdiag /test:CheckSecurityError with the /e: or /s: switch to validate the configuration changes.
Test the Connection Between Two Domain Controllers for Replication Security Errors
You can test the connection between two domain controllers in your forest for replication security errors. The domain controller that represents the source of the inbound connection
does not have to be an existing source to run this test; that is, a connection object from that domain controller does not have to exist on the destination domain controller. The test is useful in the following scenarios: A connection exists between a source and a destination, and you receive a security error. A connection should be created automatically by the Knowledge Consistency Checker (KCC) and you want to test why the connection does not exist. You are trying to create a connection between two domain controllers and you receive a security error. You want to determine whether a connection could be created if you wanted to add one on this destination from the specified source. Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group to test the connection between domain controllers in your domain or a member of the Enterprise Admins group to test the connection between domain controllers in different domains. Tool: Dcdiag.exe (Windows Support Tools) included in Windows Server 2003 SP1 Operating system: Although you can run the enhanced version of Dcdiag on computers that are running Windows XP Professional and Windows Server 2003 with no service pack installed, to run the new replication security test (/test:CheckSecurityError), you must run Dcdiag on a domain controller running Windows Server 2003 with SP1. You can run the new Dcdiag replication security tests against domain controllers running the following operating systems: Windows 2000 Server with SP3 Windows 2000 Server with SP4 Windows Server 2003 Windows Server 2003 with SP1 To test the connection between two domain controllers for replication security errors 1. At a command prompt, type the following command, and then press ENTER: dcdiag /test:CheckSecurityError /ReplSource:SourceDomainControllerName
where SourceDomainControllerName is the DNS name, NetBIOS name, or distinguished name of the real or potential "from" server that is represented by a real or potential connection object that you want to test. This command tests the connection between the domain controller on which you run the command and the source domain controller. 2. Copy the report into Notepad or an equivalent text editor. 3. Scroll to the Summary table near the bottom of the Dcdiag log file. 4. Note the names of all domain controllers that reported Warn or Fail status in the Summary table 5. Find the detailed breakout section for the problem domain controller by searching on the string DC: DomainControllerName. 6. Make the required configuration changes on the domain controllers. 7. Rerun Dcdiag /test:CheckSecurityError /ReplSource:SourceDomainControllerName to validate configuration changes.
Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088)
Domain controllers running Windows 2000 Server or Windows Server 2003 cannot replicate Active Directory updates if Domain Name System (DNS) lookup failures prevent a destination domain controller from contacting its source replication partner to request changes. Lookup failures occur when a destination domain controller cannot resolve its source replication partner's globally unique identifier (GUID)-based canonical name (CNAME) resource record to an Internet Protocol (IP) address by using DNS. GUID-based CNAME resource records are always registered in the DNS zone _msdcs.ForestRootDomain. The most common DNS failures occur when DNS client settings are misconfigured on the destination or source domain controller, or the direct and intermediate DNS servers that are used to resolve the query are misconfigured. Network problems or domain controller disconnection problems might also be present. If the problem is due to DNS configuration errors or replication latency, the effect on Active Directory replication is minimized by new improvements to domain controller name resolution in Windows Server 2003 Service Pack 1 (SP1).
In the CNAME resource record (DSA_GUID._msdcs.ForestRootDNSDomainName), DSA_GUID is the GUID of the NTDS Settings object (also called the Directory System Agent (DSA) object) for the domain controller. ForestRootDNSDomainName is the DNS name of the forest where the domain controller is located. Destination domain controllers use the CNAME resource record to identify and locate their replication partners.
The Net Logon service on the domain controller registers all SRV resource records when the operating system starts up and at regular intervals thereafter. The DNS client service on the domain controller registers the DNS host A resource record. A domain controller uses the following steps to locate its replication partner: 1. The destination domain controller queries its DNS server to look for the CNAME resource record of its replication partner. On domain controllers running Windows 2000 Server or Windows Server 2003 with no service pack applied, if this lookup fails to resolve the CNAME resource record to an IP address, DNS lookup (and replication) fails. 2. On domain controllers running Windows Server 2003 with SP1, if the CNAME lookup is unsuccessful, the domain controller looks for the DNS A resource record of its replication partner. For example, the domain controller looks for DC03.corp.contoso.com. 3. If the DNS A resource record lookup is unsuccessful, the domain controller performs a network basic input/output system (NetBIOS) broadcast by using the host name of its replication partner. For example, the domain controller uses DC03. When lookups fail, events that describe the condition are logged in the Directory Service event log.
If lookup succeeds but either the first or second attempt fails, event ID 2088 is logged. On domain controllers running Windows 2000 Server or Windows Server 2003 with no service pack applied, the destination domain controller that cannot successfully locate its replication partner in DNS logs event ID 1925. Regardless of whether replication succeeds or fails, if you receive event ID 1925, event ID 2087, or event ID 2088, you should investigate and correct the cause of the failure because incorrect DNS configuration can affect other essential operations including logon authentication and access to network resources on member computers, domain controllers, and application servers. In addition, although fallback name resolution might allow replication to occur, it introduces unnecessary latency and overhead into the replication process.
result of configuration changes on the source domain controller. In this case, DNS lookup can fail as a result of replication latency, as follows: If the source domain controller changes the DNS server on which it registers its CNAME and host A resource records, it is possible that the initial DNS server that the destination domain controller queries to resolve the name of the source domain controller is different than any of the DNS servers on which the CNAME and host A resource records for the source domain controller are currently registered. In this case, DNS replication latency or failures might prevent DNS records that are successfully registered on the DNS servers that the source controller uses from being located by the DNS server that is queried by the destination domain controller. If the Active Directory domain of the DNS server that the destination domain controller uses initially has a parent-child relationship with the Active Directory domain of the servers on which the source domain controller registers its resource records, the forwarder and delegation configuration on both the DNS servers that the source domain controller uses and the DNS servers that the destination domain controller uses, as well as any intermediate DNS servers that are used to resolve the DNS query, must be valid. Any required records on those DNS servers might be subject to replication latency and failure. Understanding these basic requirements for name resolution that locates the source replication partner provides a more meaningful context for working through solutions when you have replication DNS lookup problems. Choose a problem from the following list that best describes your situation, and then step through the suggested fix: Event ID 1925: Attempt to establish a replication link failed due to DNS lookup problem Event ID 2087: DNS lookup failure caused replication to fail Event ID 2088: DNS lookup failure occurred with replication success
Event ID 1925: Attempt to establish a replication link failed due to DNS lookup problem
If you receive event ID 1925 with the error message that Domain Name System (DNS) lookup failed, inbound replication of a directory partition has failed on the destination domain controller, and you must fix the DNS problem. An example of the event text is as follows:
Event Type:Warning Event Source:NTDS KCC Event Category:Knowledge Consistency Checker Event ID:1925 Date:3/24/2005 Time:9:15:46 AM User:NT AUTHORITY\ANONYMOUS LOGON Computer:DC3 Description: The attempt to establish a replication link for the following writable directory partition failed. Directory partition: CN=Configuration,DC=contoso,DC=com Source domain controller: CN=NTDS Settings,CN=DC1,CN=Servers,CN=Default-First-SiteName,CN=Sites,CN=Configuration,DC=contoso,DC=com Source domain controller address: f8786828-ecf5-4b7d-ad12-8ab60178f7cd._msdcs.contoso.com Intersite transport (if any): This domain controller will be unable to replicate with the source domain controller until this problem is corrected. User Action Verify if the source domain controller is accessible or network connectivity is available. Additional Data Error value: 8524 The DSA operation is unable to proceed because of a DNS lookup failure.
Solution
Proceed with DNS testing as described in "Event ID 2087: DNS lookup failure caused replication to fail."
globally unique identifier (GUID) in the canonical name (CNAME) resource record, the fully qualified domain name (FQDN), and the network basic input/output system (NetBIOS) name to the Internet Protocol (IP) address of the source domain controller have all failed. Failure to locate the source replication partner prevents replication with that source until the problem is fixed. An example of the event text is as follows:
Event Type:Error Event Source:NTDS Replication Event Category:DS RPC Client Event ID:2087 Date:3/9/2005 Time:11:00:21 AM User:NT AUTHORITY\ANONYMOUS LOGON Computer:DC3 Description: Active Directory could not resolve the following DNS host name of the source domain controller to an IP address. This error prevents additions, deletions and changes in Active Directory from replicating between one or more domain controllers in the forest. Security groups, group policy, users and computers and their passwords will be inconsistent between domain controllers until this error is resolved, potentially affecting logon authentication and access to network resources. Source domain controller: dc2 Failing DNS host name: b0069e56-b19c-438a-8a1f-64866374dd6e._msdcs.contoso.com NOTE: By default, only up to 10 DNS failures are shown for any given 12 hour period, even if more than 10 failures occur. To log all individual failure events, set the following diagnostics registry value to 1: Registry Path: HKLM\System\CurrentControlSet\Services\NTDS\Diagnostics\22 DS RPC Client User Action: 1) If the source domain controller is no longer functioning or its operating system has been reinstalled with a different computer name or NTDSDSA object GUID, remove the source domain controller's metadata with ntdsutil.exe, using the steps outlined in MSKB article 216498. 2) Confirm that the source domain controller is running Active Directory and is accessible on the network by typing "net view \\<source DC name>" or "ping <source DC name>".
3) Verify that the source domain controller is using a valid DNS server for DNS services, and that the source domain controller's host record and CNAME record are correctly registered, using the DNS Enhanced version of DCDIAG.EXE available on http://www.microsoft.com/dns dcdiag /test:dns 4) Verify that that this destination domain controller is using a valid DNS server for DNS services, by running the DNS Enhanced version of DCDIAG.EXE command on the console of the destination domain controller, as follows: dcdiag /test:dns 5) For further analysis of DNS error failures see KB 824449: http://support.microsoft.com/?kbid=824449 Additional Data Error value: 11004 The requested name is valid, but no data of the requested type was found.
Cause
Failure to resolve the current CNAME resource record of the source domain controller to an IP address can have the following causes: The source domain controller is powered off, is offline, or resides on an isolated network, and Active Directory and Domain Name System (DNS) data for the offline domain controller has not been deleted to indicate that the domain controller is inaccessible. One of the following conditions exists: The source domain controller has not registered its resource records in DNS. The destination domain controller is configured to use an invalid DNS server. The source domain controller is configured to use an invalid DNS server.
The DNS server that is used by the source domain controller does not host the correct zones or the zones are not configured to accept dynamic updates. The direct DNS servers that are queried by the destination domain controller cannot resolve the IP address of the source domain controller as a result of nonexistent or invalid forwarders or delegations.
Active Directory has been removed on the source domain controller and then reinstalled with the same IP address, but knowledge of the new NTDS Settings GUID has not reached the destination domain controller. Active Directory has been removed on the source domain controller and then reinstalled with a different IP address, but the current host address (A) resource record for the IP address of the source domain controller is either not registered or does not exist on the DNS servers that are queried by the destination domain controller as a result of replication latency or replication error. The operating system of the source domain controller has been reinstalled with a different computer name, but its metadata either has not been removed or has been removed and not yet inbound-replicated by the destination domain controller.
Solution
First, determine whether the source domain controller is functioning. If the source domain controller is not functioning, remove its remaining metadata from Active Directory. If the source domain controller is functioning, continue with procedures to diagnose and solve the DNS problem, as needed: Use Dcdiag to diagnose DNS problems. Register DNS SRV resource records plus host records. Synchronize replication between the source and destination domain controllers. Verify consistency of the NTDS Settings GUID.
To determine whether a domain controller is functioning To confirm that the domain controller is running Active Directory and is accessible on the network, at a command prompt type the following command, and then press ENTER:
net view \\SourceDomainControllerName where SourceDomainControllerName is the NetBIOS name of the domain controller. This command displays the Netlogon and SYSVOL shares, indicating that the server is functioning as a domain controller. If this test shows that the domain controller is not functioning on the network, determine the nature of the disconnection and whether the domain controller can be recovered or whether its metadata must be removed from Active Directory manually. If the domain controller is not functioning and cannot be restored, use the procedure in the following section, "Clean Up Domain Controller Metadata," to delete the data from Active Directory that is associated with that server.
To clean up server metadata 1. Open a Command Prompt. 2. Type the following command, and then press ENTER: ntdsutil
3. At the ntdsutil: command prompt, type the following command, and then press ENTER: metadata cleanup 4. Perform metadata cleanup as follows: Note If you are removing domain metadata as well as server metadata, skip the following procedure and use the procedure that begins at step a. If you are performing server metadata cleanup only and you are using the version of Ntdsutil.exe that is included with Windows Server 2003 SP1, at the metadata cleanup: command prompt, type the following, and then press ENTER: remove selected server ServerName Or remove selected server ServerName1onServerName2 Value ServerName, ServerName1 Description The distinguished name of the domain controller whose metadata you want to remove, in the form cn=ServerName,cn=Servers,cn=SiteName, cn=Sites,cn=Configuration,dc=ForestRootDomain The DNS name of the domain controller to which you want to connect and from which you want to remove server metadata
ServerName2
If you are performing metadata cleanup by using the version of Ntdsutil.exe that is included with Windows Server 2003 with no service pack, or if you are performing both domain metadata cleanup and server metadata cleanup, perform metadata cleanup as follows: a. At the metadata cleanup: command prompt, type the following command, and then press ENTER: connection b. At the server connections: command prompt, type the following command, and then press ENTER:
connect to server Server c. At the connection: command prompt, type the following command, and then press ENTER: quit d. At the metadata cleanup: command prompt, type the following command, and then press ENTER: select operation target e. At the select operation target: command prompt, type the following command, and then press ENTER: list sites f. A numbered list of sites appears. Type the following command, and then press ENTER: select site SiteNumber g. At the select operation target: command prompt, type the following command, and then press ENTER: list domains in site h. A numbered list of domains in the selected site appears. Type the following command, and then press ENTER: select domain DomainNumber i. At the select operation target: command prompt, type the following command, and then press ENTER: list servers in site j. A numbered list of servers in a domain and site is displayed. Type the following command, and then press ENTER: select server ServerNumber k. At the select operation target: command, type the following command, and then press ENTER: quit l. At the metadata cleanup: command, type the following command, and then press ENTER: remove selected server
m. If the server whose metadata you have removed is the last domain controller in the domain and you want to remove the domain metadata, at the metadata cleanup: command prompt, type the following command, and then press ENTER: remove selected domain Metadata for the domain that you selected in step h is removed. n. At the metadata cleanup: and ntdsutil: command prompts, type quit, and then press ENTER. Value Server Description The DNS name of a domain controller that you want to connect to The number that is associated with the site of the server that you want to clean up, which appears in the list The number that is associated with the domain of the server that you want to clean up, which appears in the list The number that is associated with the server that you want to clean up, which appears in the list
SiteNumber
DomainNumber
ServerNumber
Before you begin these procedures, gather the following information, which is contained in the event ID 2087 message text: The FQDN of the source domain controller and destination domain controller The IP address of the source domain controller
The updated version of Dcdiag that is included in Windows Support Tools in Windows Server 2003 SP1 contains tests that provide consolidated and improved testing of basic and advanced DNS features. You can use this tool to diagnose basic DNS functionality and dynamic updates. When you use the enhanced SP1 version of Dcdiag for DNS testing, there are specific requirements that do not apply to all Dcdiag tests. Requirements Administrative credentials: To complete the new DNS tests that are available in the SP1 version of Dcdiag, you must be a member of the Enterprise Admins group. Tools: Dcdiag.exe Operating system: You can run the enhanced version of Dcdiag on computers running the following operating systems: Windows XP Professional Windows Server 2003 Windows Server 2003 with SP1 You can run the new Dcdiag DNS tests against Microsoft DNS servers that are installed on domain controllers running the following operating systems: Windows 2000 Server with Service Pack 3 (SP3) Windows 2000 Server with Service Pack 4 (SP4) Windows Server 2003 Windows Server 2003 with SP1 Note You can use the /f: switch in Dcdiag commands to save the output to a text file. Use /f:FileName to generate the file in the location that is indicated in FileName, for example, /f:c:\Test\DnsTest.txt.
DNS client configuration: The test confirms that DNS servers on all adapters are reachable. Resource record registrations: The test confirms that the address (A) resource record of each domain controller is registered on at least one of the DNS servers that is configured on the client. Zone and server of authority (SOA): If the domain controller is running the DNS Server service, the test confirms that the Active Directory domain zone and SOA record for the Active Directory domain zone are present. Root zone: Checks if the root (.) zone is present.
To verify basic DNS functionality 1. At a command prompt, type the following command, and then press ENTER: dcdiag /test:dns /s:SourceDomainControllerName /DnsBasic where SourceDomainControllerName is the distinguished name, NetBIOS name, or DNS name of the domain controller. As an alternative, you can test all domain controllers in the forest by typing /e: instead of /s:.
2. Copy the report into Notepad or an equivalent text editor. 3. Scroll to the Summary table near the bottom of the Dcdiag log file. 4. Note the names of all domain controllers that report Warn or Fail status in the Summary table. 5. Find the detailed breakout section for the problem domain controller by searching on the string DC: DomainControllerName. 6. Make the required configuration changes on DNS clients and DNS servers. 7. To validate the configuration changes, rerun Dcdiag /test:DNS with the /e: or /s: switch. If the basic DNS test shows no errors, continue by verifying that resource records that are used to locate domain controllers are registered in DNS.
PDC SRV (the service resource records that locate primary domain controller (PDC) operations masters) As an alternative, you can use the following procedure to check for only the CNAME resource record. To verify CNAME resource record registration 1. In the DNS console, locate any domain controller that is running the DNS Server service, where the server hosts the DNS zone with the same name as the
Active Directory domain of the domain controller. 2. In the console tree, click the zone that is named _msdcs.Dns_Domain_Name. Note In Windows 2000 Server DNS, _msdcs.Dns_Domain_Name is a subdomain of the DNS zone for the Active Directory domain name. In Windows Server 2003 DNS, _msdcs.Dns_Domain_Name is a separate zone. 3. In the details pane, verify that the following resource records are present: A CNAME resource record that is named Dsa_Guid._msdcs.Dns_Domain_Name A corresponding A resource record for the name of the DNS server
If the CNAME resource record is not registered, verify that dynamic updates are functioning properly. Use the test in the following section.
dcdiag /test:dns /s:SourceDomainControllerName /DnsDynamicUpdate where SourceDomainControllerName is the distinguished name, NetBIOS name, or DNS name of the domain controller. As an alternative, you can test all domain controllers by using the /e: switch instead of the /s: switch. If secure dynamic update is not configured, use the following procedure to configure it. To enable secure dynamic updates 1. Open the DNS console. 2. In the console tree, right-click the applicable zone, and then click Properties.
3. On the General tab, verify that the zone type is Active Directoryintegrated. 4. In Dynamic Updates, click Secure only.
To register DNS resource records manually 1. To initiate registration of domain controller Locator resource records manually on the source domain controller, at a command prompt type the following commands, and then press ENTER after each command: net stop net logon & net start net logon 2. To initiate registration of the host A resource record manually, at a command prompt type the following command, and then press ENTER: ipconfig /flushdns & ipconfig /registerdns 3. Wait 15 minutes, and then review events in Event Viewer to ensure proper registration of the resource records. Repeat the procedure in the "Verify Resource Record Registration" section earlier in this guide to verify that the resource records appear in DNS.
Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the domain of the destination domain controller. Tool: Active Directory Sites and Services
To synchronize replication from a source domain controller 1. Open Active Directory Sites and Services. 2. In the console tree, double-click the Sites container, double-click the site of the domain controller to which you want to synchronize replication, double-click the Servers container, double-click the server object of the domain controller, and then click NTDS Settings. 3. In the details pane, in the From Server column, locate the connection object that shows the name of the source domain controller. 4. Right-click the appropriate connection object, and then click Replicate Now. 5. Click OK. If replication does not succeed, use the procedure in the following section to verify consistency of the NTDS Settings GUID.
To verify consistency of the NTDS Settings GUID 1. Click Start, click Run, type Ldp, and then click OK. 2. On the Connection menu, click Connect. 3. In the Connect dialog box, leave the Server box empty.
4. In Port, type 389, and then click OK. 5. On the Connection menu, click Bind. 6. In the Bind dialog box, provide Enterprise Admins credentials. If it is not already selected, click Domain. 7. In Domain, type the name of the forest root domain, and then click OK. 8. On the View menu, click Tree. 9. In the Tree View dialog box, type: CN=Configuration,DC=Forest_Root_Domain and then click OK. 10. Navigate to the object CN=NTDS Settings,CN=SourceServerName,CN=Servers,CN=SiteName, CN=Sites,CN=configuration,DC=ForestRootDomain. 11. Double-click the NTDS Settings object and, in the details pane, view the value for the attribute objectGUID. Right-click that value, and then copy it to Notepad. 12. On the Connection menu, click Disconnect. 13. Repeat steps 2 through 11, but in step 3, type the name of the source domain controller, for example, DC03. 14. In Notepad, compare the values of the two GUIDs. 15. If the values do not match, the destination domain controller must receive replication of the valid GUID. Check the GUID value on other domain controllers and attempt replication on the destination domain controller with a different domain controller that has the correct GUID. 16. If the values match, verify that the GUID matches the GUID in the Dsa_Guid._msdcs.Dns_Domain_Name resource record for the source domain controller, as follows: a. Note the primary DNS servers that each domain controller identifies in the TCP/IP properties in their Network Settings. All the DNS servers that are listed in the respective TCP/IP properties should be able to indirectly or directly resolve this CNAME resource record. b. From the servers that are listed, identify the authoritative name server or servers for this domain zone by looking at the server names that are listed for the name server (NS) resource records at the root of the zone. (In the DNS console, select the forward lookup zone for the root domain, and view the NS
records in the details pane). c. On the name server or servers obtained in step b, open the DNS console, and double-click the forward lookup zone for the forest root domain name. Double-click the _msdcs folder, and note the CNAME resource records that exist for your server name. d. If there are no records present or the records are incorrect, see article 241505, SRV Records Missing After Implementing Active Directory and Domain Name System, on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=69994).
Active Directory forest, including logon authentication or access to network resources. You should immediately resolve this DNS configuration error so that this domain controller can resolve the IP address of the source domain controller using DNS. Alternate server name: dc1 Failing DNS host name: 4a8717eb-8e58-456c-995a-c92e4add7e8e._msdcs.contoso.com NOTE: By default, only up to 10 DNS failures are shown for any given 12 hour period, even if more than 10 failures occur. To log all individual failure events, set the following diagnostics registry value to 1: Registry Path: HKLM\System\CurrentControlSet\Services\NTDS\Diagnostics\22 DS RPC Client User Action: 1) If the source domain controller is no longer functioning or its operating system has been reinstalled with a different computer name or NTDSDSA object GUID, remove the source domain controller's metadata with ntdsutil.exe, using the steps outlined in MSKB article 216498. 2) Confirm that the source domain controller is running Active Directory and is accessible on the network by typing "net view \\<source DC name>" or "ping <source DC name>". 3) Verify that the source domain controller is using a valid DNS server for DNS services, and that the source domain controller's host record and CNAME record are correctly registered, using the DNS Enhanced version of DCDIAG.EXE available on http://www.microsoft.com/dns dcdiag /test:dns 4) Verify that that this destination domain controller is using a valid DNS server for DNS services, by running the DNS Enhanced version of DCDIAG.EXE command on the console of the destination domain controller, as follows: dcdiag /test:dns 5) For further analysis of DNS error failures see KB 824449: http://support.microsoft.com/?kbid=824449 Additional Data Error value: 11004 The requested name is valid, but no data of the requested type was found
Cause
Failure to resolve the source domain controller name by using the CNAME resource record in DNS can be due to DNS misconfigurations or delays in DNS data propagation.
Solution
Proceed with DNS testing as described in "Event ID 2087: DNS lookup failure caused replication to fail."
Event ID 1925: Attempt to establish a replication link failed due to connectivity problem
The description text in event ID 1925 reports that the attempt to establish a replication link for the following writable directory partition failed, and the description text provides the distinguished name of the directory partition that the destination is attempting to replicate from the source. The error code in the event gives more specific information about the cause of the problem. An example of the event text is as follows:
Event Event Event Event Type:Warning Source:NTDS KCC Category:Knowledge Consistency Checker ID:1925
Date:3/24/2005 Time:9:15:46 AM User:NT AUTHORITY\ANONYMOUS LOGON Computer:DC3 Description: The attempt to establish a replication link for the following writable directory partition failed. Directory partition: CN=Configuration,DC=contoso,DC=com Source domain controller: CN=NTDS Settings,CN=DC1,CN=Servers,CN=Default-First-SiteName,CN=Sites,CN=Configuration,DC=contoso,DC=com Source domain controller address: f8786828-ecf5-4b7d-ad12-8ab60178f7cd._msdcs.contoso.com Intersite transport (if any): CN=IP,CN=Inter-Site Transports,CN=Sites,CN=Configuration,DC=contoso,DC=com This domain controller will be unable to replicate with the source domain controller until this problem is corrected. User Action Verify if the source domain controller is accessible or network connectivity is available. Additional Data Error value: 1908 Could not find the domain controller for this domain.
Cause
When event ID 1925 contains error 1908, "Could not find the domain controller for this domain," Active Directory replication has failed as a result of a connectivity problem between the domain controller that reported the error and the source domain controller that is named in the event text.
Solution
Use the following tests to solve this problem: Verify wide area network (WAN) connectivity. Determine the maximum packet size, and change it if necessary. Force replication, and capture replication traffic in Network Monitor.
Analyze network traces to see if any traffic is not reaching the source domain controller.
To determine the lowest common packet size 1. From the destination domain controller, ping the source domain controller by its Internet Protocol (IP) address. At a command prompt, type the following command, and then press ENTER: ping IP_address -f -l 1472 2. From the source domain controller, use the command in step 1 to ping the destination domain controller by its IP address. 3. If the ping command completes in both directions, no additional modification is required.
4. If the ping command fails in either direction, monotonically lower the number that you use in the -l parameter until you find the lowest common packet size that works between the source and destination domain controllers. Note The version of Dcdiag that is included with Windows Server 2003 SP1 Support Tools provides the following method to perform this test: dcdiag /test:CheckSecurityError /s:SourceDomainControllerName You can edit the registry to set the maximum size of packets to the value that you determined by the PING method, less 8 bytes to account for header size. As an alternative, you can edit the registry so that the maximum number of bytes for using UDP is always exceeded and Kerberos always uses TCP. You can change the default value of 2,000 bytes by modifying the registry entry MaxPacketSize in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\ Kerberos\Parameters. Use the following procedure to change this registry setting. Caution It is recommended that you do not directly edit the registry unless there is no other alternative. Modifications to the registry are not validated by the registry editor or by Windows before they are applied, and as a result, incorrect values can be stored. This can result in unrecoverable errors in the system. When possible, use Group Policy or other Windows tools, such as Microsoft Management Console (MMC), to accomplish tasks rather than editing the registry directly. If you must edit the registry, use extreme caution. Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the domain of the domain controller. Tool: Regedit.exe change the maximum packet size
To change the maximum packet size 1. Click Start, click Run, type regedit, and then click OK. 2. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\ Kerberos\Parameters. 3. Edit or, if it does not exist in the details pane, create the entry MaxPacketSize as follows:
Right-click MaxPacketSize; click Modify; and then, in the Value data box, type 1 to force Kerberos to use TCP, or type the value that you established to lower the value to the appropriate maximum size. To create the entry if it does not exist in the details pane:
Right-click Parameters, click New DWORD Value, type the name MaxPacketSize, and then go to step 3a to edit the entry. 4. Click OK. 5. You must restart the domain controller for this change to take effect. For information about importing an Administrative Template into Group Policy so that this value can be set for all the Windows 2000based, Windows Server 2003-based, or Windows XP-based computers in the enterprise, see article 244474, "How to force Kerberos to use TCP instead of UDP in Windows Server 2003, in Windows XP, and in Windows 2000," on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=69997).
To create an address database 1. Open Network Monitor. 2. If you are prompted, select the local network from which you want to capture data by default. 3. On the Capture menu, click Start. 4. On the Capture menu, click Stop and View. 5. On the Display menu, click Find All Names. 6. In the Find All Names dialog box, click OK. All addresses are added to the address database. 7. On the Window menu, click the local connection. You can use the names in the addresses database to specify address pairs in the capture filter.
The INCLUDE or EXCLUDE keywords, which indicate how Network Monitor should respond to a frame that meets a filter's specifications. Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the forest root domain or the Enterprise Admins Group in the forest. Tool: Network Monitor
To capture network frames 1. Open Network Monitor. 2. If you are prompted, select the local network from which you want to capture
data by default. 3. On the Capture menu, click Buffer Settings. 4. In the Capture Buffer Settings dialog box, set the buffer and frame size as appropriate, and then click OK. 5. On the Capture menu, click Filter. 6. In the Capture Filter dialog box, double-click Address Pairs. 7. In the Address Expressions dialog box, select an address in Station 1 and an address in Station 2 for the computers whose traffic you want to capture. 8. In the Direction box, select one of the symbols: <--> to monitor the traffic that passes in either direction between the addresses that you have selected. --> or <-- to monitor only the traffic that passes in one direction between the computers.. 9. Click OK twice. 10. On the Capture menu, click Start.
Force Replication
When you have Network Monitor started to capture traffic between the two domain controllers, use the following procedure to force synchronization between the computers so that you can capture the replication traffic in Network Monitor. Requirements Credentials: To complete this procedure, you must be a member of the Domain Admins group in the forest root domain or the Enterprise Admins group in the forest. Tools: Active Directory Sites and Services (Administrative Tools)
To synchronize replication from a source domain controller 1. Open Active Directory Sites and Services. 2. Double-click the Sites container, double-click the site of the domain controller to which you want to synchronize replication, double-click the Servers container, double-click the server object of the domain controller, and then click NTDS Settings. 3. In the From Server column in the details pane, locate the connection object
that shows the name of the source domain controller. 4. Right-click the appropriate connection object, and then click Replicate Now. 5. Click OK. Analyze the traces from both domain controllers to see if there is any traffic that is not getting to the other domain controller. For information about using Network Monitor, see Network Monitor overview on the Microsoft Web site (http://go.microsoft.com/fwlink/? LinkId=41936).
Event ID 1311: Replication configuration does not reflect the physical network
Event ID 1311 is logged in the Directory Service log when configuration errors or unavailable domain controllers prevent replication of a directory partition between domain controllers in different sites.
Cause
This problem can have the following causes: Site link bridging is enabled on a network that does not support physical network connectivity between two domain controllers in different sites that are connected by a site link. Bridge all site links is enabled in Active Directory Sites and Services, but the network does not allow network connectivity between any two domain controllers in the forest.
Site links contain all sites, but the site links are not interconnected. This condition is known as disjointed site links. One or more domain controllers are offline.
Bridgehead domain controllers are online, but errors occur when they try to replicate a required directory partition between Active Directory sites. Administrator-defined preferred bridgehead servers are online, but they do not host the required directory partition. The most common misconfiguration is to define non global catalog servers as bridgehead servers. Preferred bridgeheads are defined correctly by the administrator, but they are currently offline. The bridgehead server is overloaded because the server is undersized, too many branch sites are trying to replicate changes from the same hub domain controller, or the replication schedules on site links or connection objects are too frequent. The Knowledge Consistency Checker (KCC) has built an alternate path around an intersite connection failure, but it continues to retry the failing connection every 15 minutes.
Solution
Use the following procedures for troubleshooting event ID 1311: Identify the scope of the problem. Check site link bridging. Determine whether the network is fully routed. Verify that all sites are connected. Check preferred bridgehead servers.
Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in a domain in the forest. Tool: Ldp (Windows Support Tools)
To locate the ISTG role holders for all sites 1. Click Start, click Run, type Ldp, and then click OK. 2. On the Connection menu, click Connect. 3. In the Connect dialog box, leave the Server box empty. 4. In Port, type 389, and then click OK. 5. On the Connection menu, click Bind. 6. In the Bind dialog box, provide Enterprise Admins credentials. Click Domain if it is not already selected. 7. In Domain, type the name of the forest root domain, and then click OK. 8. On the Browse menu, click Search. 9. In Base dn, type: CN=Sites,CN=Configuration,DC=Forest_Root_Domain 10. In Filter, type: (CN=NTDS Site Settings) 11. For Scope, click Subtree. 12. Click Options, and in the Attributes box, scroll to the end of the list, type: ;interSiteTopologyGenerator and then click OK. 13. In the Search dialog box, click Run. 14. Review the interSiteTopologyGenerator entries in the output, and make a note of the domain controller names. Determine the scope of the event by checking the Directory Service event logs of all ISTG role holders in the forest, or check at least a significant number of ISTG role holders. If event ID 1311 continues to be logged on ISTG role holders, continue with the next step.
Determine if site link bridging is enabled 1. Open Active Directory Sites and Services. 2. In the console tree, double-click the Sites container, and then double-click the Inter-Site Transports container. 3. Right-click the IP container. If Bridge all site links is selected, site link bridging is enabled. The Bridge all site links setting requires a fully routed network. If the network is not fully routed, you must create site link bridges manually.
Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the forest root domain or a member of the Enterprise Admins group. Tool: Active Directory Sites and Services (Administrative Tools)
Determine if site link bridging is enabled 1. Open Active Directory Sites and Services. 2. In the console tree, double-click the Sites container, and then double-click the Inter-Site Transports container. 3. Right-click the IP container. If Bridge all site links is selected, click it to disable it.
To create a site link bridge 1. Open Active Directory Sites and Services. 2. In the console tree, double-click the Sites container, and then expand the Inter-Site Transports container. 3. Right-click the IP container, and then click New Site Link Bridge. 4. In Name, type a name for the site link bridge. 5. Click two or more site links to be bridged, and then click Add. Wait for a period of time that is twice as long as the longest replication interval in the forest. If event ID 1311 continues to be logged on ISTG role holders, continue with the next step.
To view site links 1. At a command prompt, type the following command, and then press ENTER: repadmin /showism "CN=IP,CN=Inter-Site Transports,CN=Sites,CN=Configuration,DC=Forest_Root_Domain" where Forest_Root_Domain is the name of the forest root domain. 2. In the output, review the information for the sites that are listed. For each site, the output of the command shows a string of three numbers separated by colons. The numbers represent <cost>:<replication interval>:<options>. Strings with a value of -1:0:0 indicate a possible missing site link.
Administrative credentials: To complete this procedure, you must be a member of the Domain Users group in a domain in the forest. Tool: Adsiedit.msc (Windows Support Tools)
To view the list of preferred bridgehead servers 1. Click Start, click Run, type adsiedit.msc, and then click OK. 2. In the console tree, double-click Configuration Container, and then doubleclick CN=Configuration,DC=ForestRootDomainName, CN=Sites, and CN=Inter-Site Transports. 3. Right-click CN=IP, and then click Properties. 4. In Attributes, double-click bridgeheadServerListBL. 5. If any preferred bridgehead servers are selected in any site in the forest, the Values box displays the distinguished name for each server object that is currently selected as a preferred bridgehead server. Verify that all domain controllers in the list are online and functioning as domain controllers. Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Users group in the domain of the domain controller. Tool: Net view
To determine whether a domain controller is functioning To confirm that a domain controller is running Active Directory and is accessible on the network, at a command prompt type the following command, and then press ENTER: net view \\DomainControllerName where DomainControllerName is the network basic input/output system (NetBIOS) name of the domain controller. This command displays the Netlogon and SYSVOL shares, indicating that the server is functioning as a domain controller. If this test shows that the domain controller is not functioning on the network, determine the nature of the disconnection and whether the domain controller can be recovered. If a domain controller that is selected as a preferred bridgehead server is not available, use the following procedure to select another preferred bridgehead server in the site that can replicate the domain.
Requirements Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group in the domain of the selected domain controller or a member of the Enterprise Admins group. Tool: Active Directory Sites and Services (Administrative Tools)
To designate a preferred bridgehead server 1. Open Active Directory Sites and Services. 2. In the console tree, double-click the Sites container, and then expand the Servers container. 3. Right-click the server object for the domain controller that you want to make a preferred bridgehead server, and then click Properties. 4. On the General tab, click the intersite transport or transports for which this server will be a preferred bridgehead server, and then click Add.
For general information about how Active Directory works and how to manage and configure Active Directory, see the following resources: Administering Active Directory Operations