Quantcast
Channel: Directory Services forum
Viewing all 31638 articles
Browse latest View live

An Active Directory Domain Controler for the domain cannot be contacted

$
0
0

Hello. I have a system down situation.

We had our Windows Server 2003 domain controller die. We replaced the drive and reinstalled the OS. I created a domain based on the name the workstations (Windows 7) had.. <name>.local.

I log into the workstation with local administrator, remove them from the domain. Reboot, then try to add them to the domain with <name>.local. The workstation throws the error up "An Active Directory Domain Controler for the domain <name>.local cannot be contacted.

The workstations have internet access. DHCP and DNS are being provided by the Firewall and I can resolve espn.com fine.

I can ping the Domain Server by name and by IP. However, I cannot get the workstations to connect to the domain. I REALLY could use some help on this one.

Thanks!


Sean




What is the best practice to connect 2 sites and replicate ADDS between 2 different sites using windows server 2012 r2?

$
0
0

I found that there is new features remote access inside windows server 2012 r2 which is much more easier. Is there anybody can suggest me how to connect 2 different sites and it will be the tunnel to replicate ADDS (RW) between both sites.

Promoting a Member Server of a Child Domain in AD to Read Only Domain Controller

$
0
0

I need to know if a member of the Enterprise Administrator's parent Domain Group can do DCPROMO on a member server of a Child Domain?  There seems to be a lot of discussion about groups, but shouldn't the Enterprise Administrator's group membership be able to do this?

Charlie

Broken root domain without a valid backup. Any chance to get it back to work properly ?

$
0
0

Hi guys,
i came across the following issue:
Imagine a standard enterprise environment with a forest. The root domain is called contoso.com and there is a subdomain called company.contoso.com. There are also subdomains of company.contoso.com, but they are not important for the problem description.

The functional level of the forest is Windows 2003-interim & the domain level of the root domain is Windows 2003, as is the domain level of all subdomains. All Domain Controllers are Windows 2003 SP2.

There have been people in the environment with too many rights, that used to promote DCs and then also just decommission them without properly demoting them. This left several unreachable domain controllers in both the root domain & the subdomain.

I cleared all those DCs that are no longer available, which made company.contoso.com stable and reliable. All DCs within the subdomain are properly talking to each other and replicating fine.

Then i discovered the main issue here. The replication in the root domain is broken. The is only one domain controller left in the root domain, nevertheless the server is suffering from USN rollback. Digging deeper i found out that the domain controllers have been virtualized years ago, but no one ever cared about the root domain. So i found out that replication stopped in 2006 when obv. the last healthy domain controller was removed from the root domain.

So i have basically a crippled root domain with a crippled domain controller. I am not able to set the forest level to 2003 native, as the domain controller says that the domain contoso.com is still Windows 2000. This is not correct, i have checked msDS-Behaviour-Version and nTMixedDomain. They are properly set to 2 & 0.

My idea was to introduce a new installed 2003 server and promote it to a DC. Then get rid of the broken one. Unfortunately the broken DC is not replicating. Due to USN rollback the netlogon service goes constantly to paused state & of course both inbound& outbound replication are disabled. Even when i reenable the replication it is just a matter of seconds before they get disabled again. I also tried to introduce a new 2012R2 DC, but that fails of course due to the forest level not beeing 2003.

So i am a little stuck here. Any thoughts about how to continue to troubleshoot ?

I have a final idea:
Install a new forest with the same name contoso.com and set up a trust with company.contoso.com.
The question would be, how can i convince company.contoso.com that the new installed forest and domain are its parent ?

AD 2003 Tombstone Lifetime error

$
0
0

Dears,

Site A (Main) : 2 DC (win 2003 R2 Sp2)

Site B : 1 DC ( win 2003 R2 Sp2)

On of my clients has a DC replication problem and after investigating using replmon we discovered that the DC on Site B is ran out of Tombstone Lifetime !

And when i checked the Attribute "tombstoneLifetime" of the object cn=directory service,cn=windows,cn=services in the Configuration-Partition , I found the value <not set> , which means from what I know its 60 days !

Now i need to know what if I changed the Attribute "tombstoneLifetime" to 180 days , would I face any problem if I did that ? , because I need to enable replication again between both sites !


mwahab

While running dcdiag /test:dns getting Warning: The AAAA record for this DC was not found

$
0
0

DCDIAG /test:dns result is pested here.

C:\Users\administrator.SUD>dcdiag /test:dns

Directory Server Diagnosis

Performing initial setup:
   Trying to find home server...
   Home Server = MUM-ADS-01
   * Identified AD Forest.
   Done gathering initial info.

Doing initial required tests

   Testing server: Default-First-Site-Name\MUM-ADS-01
      Starting test: Connectivity
         ......................... MUM-ADS-01 passed test Connectivity

Doing primary tests

   Testing server: Default-First-Site-Name\MUM-ADS-01

      Starting test: DNS

         DNS Tests are running and not hung. Please wait a few minutes...
         ......................... MUM-ADS-01 passed test DNS

   Running partition tests on : ForestDnsZones

   Running partition tests on : DomainDnsZones

   Running partition tests on : Schema

   Running partition tests on : Configuration

   Running partition tests on : sud

   Running enterprise tests on : sud.in
      Starting test: DNS
         Test results for domain controllers:

            DC: MUM-ADS-01.sud.in
            Domain: sud.in


               TEST: Basic (Basc)
                  Warning: The AAAA record for this DC was not found

               TEST: Forwarders/Root hints (Forw)
                  Error: Root hints list has invalid root hint server:
                  a.root-servers.net. (198.41.0.4)
                  Error: Root hints list has invalid root hint server:
                  b.root-servers.net. (128.9.0.107)
                  Error: Root hints list has invalid root hint server:
                  c.root-servers.net. (192.33.4.12)
                  Error: Root hints list has invalid root hint server:
                  d.root-servers.net. (128.8.10.90)
                  Error: Root hints list has invalid root hint server:
                  e.root-servers.net. (192.203.230.10)
                  Error: Root hints list has invalid root hint server:
                  f.root-servers.net. (192.5.5.241)
                  Error: Root hints list has invalid root hint server:
                  g.root-servers.net. (192.112.36.4)
                  Error: Root hints list has invalid root hint server:
                  h.root-servers.net. (128.63.2.53)
                  Error: Root hints list has invalid root hint server:
                  i.root-servers.net. (192.36.148.17)
                  Error: Root hints list has invalid root hint server:
                  j.root-servers.net. (192.58.128.30)
                  Error: Root hints list has invalid root hint server:
                  k.root-servers.net. (193.0.14.129)
                  Error: Root hints list has invalid root hint server:
                  l.root-servers.net. (198.32.64.12)
                  Error: Root hints list has invalid root hint server:
                  m.root-servers.net. (202.12.27.33)

               TEST: Delegations (Del)
                  Error: DNS server: sud-ad.sud.in. IP:<Unavailable>
                  [Missing glue A record]

               TEST: Records registration (RReg)
                  Network Adapter
                  [00000006] Intel(R) PRO/1000 MT Network Connection:
                     Warning:
                     Missing AAAA record at DNS server 10.1.6.132:
                     MUM-ADS-01.sud.in

                     Warning:
                     Missing AAAA record at DNS server 10.1.6.132:
                     gc._msdcs.sud.in

                     Warning:
                     Missing AAAA record at DNS server 10.1.6.133:
                     MUM-ADS-01.sud.in

                     Warning:
                     Missing AAAA record at DNS server 10.1.6.133:
                     gc._msdcs.sud.in

               Warning: Record Registrations not found in some network adapters

         Summary of test results for DNS servers used by the above domain
         controllers:

            DNS server: 128.63.2.53 (h.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 128.63.2.53
            DNS server: 128.8.10.90 (d.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 128.8.10.90
            DNS server: 128.9.0.107 (b.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 128.9.0.107
            DNS server: 192.112.36.4 (g.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 192.112.36.4
            DNS server: 192.203.230.10 (e.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 192.203.230.10
            DNS server: 192.33.4.12 (c.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 192.33.4.12
            DNS server: 192.36.148.17 (i.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 192.36.148.17
            DNS server: 192.5.5.241 (f.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 192.5.5.241
            DNS server: 192.58.128.30 (j.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 192.58.128.30
            DNS server: 193.0.14.129 (k.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 193.0.14.129
            DNS server: 198.32.64.12 (l.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 198.32.64.12
            DNS server: 198.41.0.4 (a.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 198.41.0.4
            DNS server: 202.12.27.33 (m.root-servers.net.)
               1 test failure on this DNS server
               PTR record query for the 1.0.0.127.in-addr.arpa. failed on the DN
S server 202.12.27.33
         Summary of DNS test results:

                                            Auth Basc Forw Del  Dyn  RReg Ext
            _________________________________________________________________
            Domain: sud.in
               MUM-ADS-01                   PASS WARN FAIL FAIL PASS WARN n/a

         ......................... sud.in failed test DNS

Access to all servers (except DC´s) without Domain Admins privilegies

$
0
0

Hi,

We would like to allow some functional accounts (ITS Accounts)can access to all company´s servers but without be domain admin and neither add them manually on local admin group in each server.


Could we do this using Group Policy management? or Active Directory delegation? (our AD is 2012).

Could anyone help me please?


Thanks and regards


Manuel Osorio

Delay in passwrod changed in Active Directory 2012

$
0
0

hi, I need help with the following problem.  I have an application which serves as A&A.  Currently the application is running in old .net framework and active directory level 2003.  Everything is running ok.  I just had new servers built in Windows server 2012 R2 and we have a new domain (2012 level).  The problem I just found out that when I change the password (from the portal/application), it changes ok, however, the first 5 mins after the password is changed, I can login with both old and new passwords.  After 5 mins, the old password is no longer valid, and I only can login using my new password.  Why is the delay in password changed?  Prod doesn't have this problem.  I am thinking there maybe a catch account/credential that causes this, but don't quite sure.  Can you please help me with this?

Thanks a lot.


How to use just one account in the domain to login to the right server having access to the right resources. Even when a user works on 4 different sites ...

$
0
0

We have one domain with about 36 sites.  On the sites we use (2008R2 / 2012R2) RODC's .

All workstations have Windows 7.

Some users work on several sites. We want the user to just be able to use one account and the environment to see on which site the user logs in, so the right script can be loaded and the appropiate resources like data and printers are available.

We have several users working on 4 sites (different schools) doing their work fot that specific site overthere.

I want the system to see where a user logs in  (can be on IP address), so we can give the users just one account that will work as it should.

I like to get some ideas or advise on how to get it done.

Thanks,

Ben.


Ben van der Meer



Replication between DC and ADC

$
0
0
we all know that is there any changes happen in dc it will automatically replicate to ADC.some time quickly or some time very late. i just have a one query how should ADC knows that there have been some changes happens in DC

Abp

PasswordNeverExpires

$
0
0

Hello,

I am trying to create a script for auditing purposes. For ease of use, I would like all the information in the same script, but I am strugling with PasswordNeverExpires property of the users object. Everything else works like a charm. Can anyone tell me why the underlined code does not output True or False?

$NumDays = 0
 $LogDir = ".\Users-Last-Logon.csv"

 $currentDate = [System.DateTime]::Now
 $currentDateUtc = $currentDate.ToUniversalTime()
 $lltstamplimit = $currentDateUtc.AddDays(- $NumDays)
 $lltIntLimit = $lltstampLimit.ToFileTime()
 $adobjroot = [adsi]''
 $objstalesearcher = New-Object System.DirectoryServices.DirectorySearcher($adobjroot)
 $objstalesearcher.filter = "(&(objectCategory=person)(objectClass=user)(lastLogonTimeStamp<=" + $lltIntLimit + "))"
 $objstalesearcher.PageSize=4000

 $users = $objstalesearcher.findall() | select `
 @{e={$_.properties.cn};n='Display Name'},`
 @{e={$_.properties.samaccountname};n='Username'},`
 @{e={[datetime]::FromFileTimeUtc([int64]$_.properties.lastlogontimestamp[0])};n='Last Logon'},`
 @{e={$_.properties.description};n='Description'},`
 @{e={$_.properties.passwordneverexpires};n='PW'},`
 @{e={[string]$adspath=$_.properties.adspath;$account=[ADSI]$adspath;$account.psbase.invokeget('AccountDisabled')};n='Account Is Disabled'}

 $users | Export-CSV -NoType $LogDir


DCPromo error: The wizard cannot gain access to the list of domains in the forest

$
0
0

Hello folks,

I cant promote a member server to be a DC. This server was not even able to get added to the domain. I got that taken care of by offline join (djoin). I'm able to ping/nslookup any other DC, DNS, domain name, forest name, etc

Please see the C:\Windows\debug\dcpromoui.log and the screenshot

dcpromoui 810.E14 0000 14:49:10.837 opening log file C:\Windows\debug\dcpromoui.log
dcpromoui 810.E14 0001 14:49:10.837 C:\Windows\system32\wsmprovhost.exe
dcpromoui 810.E14 0002 14:49:10.837 file timestamp 08/22/2013 04:03:07.107
dcpromoui 810.E14 0003 14:49:10.838 C:\Windows\system32\dcpromocmd.dll
dcpromoui 810.E14 0004 14:49:10.838 file timestamp 11/03/2014 09:01:41.277
dcpromoui 810.E14 0005 14:49:10.838 local time 11/05/2014 14:49:10.838
dcpromoui 810.E14 0006 14:49:10.838 running Windows NT 6.3 build 9600  (BuildLab:9600.winblue_r3.140827-1500) amd64
dcpromoui 810.E14 0007 14:49:10.838 logging flags 0001007C
dcpromoui 810.E14 0008 14:49:10.838 Enter GetExistingAccountForComputerInReplicaDomain
dcpromoui 810.E14 0009 14:49:10.838   START TEST: GetExistingAccountForComputerInReplicaDomain
dcpromoui 810.E14 000A 14:49:10.838   Enter Computer::RemoveLeadingBackslashes 
dcpromoui 810.E14 000B 14:49:10.838   Using empty constructor
dcpromoui 810.E14 000C 14:49:10.838   Enter Computer::Refresh
dcpromoui 810.E14 000D 14:49:10.838     Enter IsLocalComputer
dcpromoui 810.E14 000E 14:49:10.838     Enter RefreshLocalInformation
dcpromoui 810.E14 000F 14:49:10.838     Enter GetProductTypeFromRegistry
dcpromoui 810.E14 0010 14:49:10.838       Enter RegistryKey::Open System\CurrentControlSet\Control\ProductOptions
dcpromoui 810.E14 0011 14:49:10.838       Enter RegistryKey::GetValue-String ProductType
dcpromoui 810.E14 0012 14:49:10.838       ServerNT
dcpromoui 810.E14 0013 14:49:10.839       prodtype : 0x3
dcpromoui 810.E14 0014 14:49:10.839     Enter GetSafebootOption
dcpromoui 810.E14 0015 14:49:10.839       Enter RegistryKey::Open System\CurrentControlSet\Control\SafeBoot\Option
dcpromoui 810.E14 0016 14:49:10.839       HRESULT = 0x80070002
dcpromoui 810.E14 0017 14:49:10.839       returning : 0x0
dcpromoui 810.E14 0018 14:49:10.839     Enter DetermineRoleAndMembership
dcpromoui 810.E14 0019 14:49:10.839       Enter MyDsRoleGetPrimaryDomainInformation
dcpromoui 810.E14 001A 14:49:10.839         Enter MyDsRoleGetPrimaryDomainInformationHelper
dcpromoui 810.E14 001B 14:49:10.839           Calling DsRoleGetPrimaryDomainInformation
dcpromoui 810.E14 001C 14:49:10.839           lpServer  : (null)
dcpromoui 810.E14 001D 14:49:10.839           InfoLevel : 0x1 (DsRolePrimaryDomainInfoBasic)
dcpromoui 810.E14 001E 14:49:10.839           HRESULT = 0x00000000
dcpromoui 810.E14 001F 14:49:10.839         MachineRole      : 0x3
dcpromoui 810.E14 0020 14:49:10.839         Flags            : 0x1000000
dcpromoui 810.E14 0021 14:49:10.839         DomainNameFlat   : Houston
dcpromoui 810.E14 0022 14:49:10.839         DomainNameDns    : Houston.contoso.com
dcpromoui 810.E14 0023 14:49:10.839         DomainForestName : contoso.com
dcpromoui 810.E14 0024 14:49:10.839       Enter IsDcInRepairMode
dcpromoui 810.E14 0025 14:49:10.839   HRESULT = 0x00000000
dcpromoui 810.E14 0026 14:49:10.839   Enter State::DetermineRunContext
dcpromoui 810.E14 0027 14:49:10.839     Enter DS::GetPriorServerRole
dcpromoui 810.E14 0028 14:49:10.839       Enter MyDsRoleGetPrimaryDomainInformation
dcpromoui 810.E14 0029 14:49:10.839         Enter MyDsRoleGetPrimaryDomainInformationHelper
dcpromoui 810.E14 002A 14:49:10.839           Calling DsRoleGetPrimaryDomainInformation
dcpromoui 810.E14 002B 14:49:10.839           lpServer  : (null)
dcpromoui 810.E14 002C 14:49:10.839           InfoLevel : 0x2 (DsRoleUpgradeStatus)
dcpromoui 810.E14 002D 14:49:10.840           HRESULT = 0x00000000
dcpromoui 810.E14 002E 14:49:10.840         OperationState      : 0
dcpromoui 810.E14 002F 14:49:10.840         PreviousServerState : 0
dcpromoui 810.E14 0030 14:49:10.840     Enter Computer::GetNetbiosName
dcpromoui 810.E14 0031 14:49:10.840       USSLCRODC101
dcpromoui 810.E14 0032 14:49:10.840     Enter Computer::GetRole USSLCRODC101
dcpromoui 810.E14 0033 14:49:10.840       role: 3
dcpromoui 810.E14 0034 14:49:10.840     NT5_MEMBER_SERVER
dcpromoui 810.E14 0035 14:49:10.840   Enter State::GetRunContext NT5_MEMBER_SERVER
dcpromoui 810.E14 0036 14:49:10.840   Enter FS::GetPathSyntax C:\Windows\system32
dcpromoui 810.E14 0037 14:49:10.840   HRESULT = 0x00000000
dcpromoui 810.E14 0038 14:49:10.840   Enter State::SetMode STAGETWO
dcpromoui 810.E14 0039 14:49:10.840   Enter State::SetOperation REPLICA
dcpromoui 810.E14 003A 14:49:10.840   Enter GetCredentialsFunctInternal
dcpromoui 810.E14 003B 14:49:10.840     Enter ShouldSkipCredentialsPage
dcpromoui 810.E14 003C 14:49:10.840       Enter State::GetOperation REPLICA
dcpromoui 810.E14 003D 14:49:10.840     using empty user domain name
dcpromoui 810.E14 003E 14:49:10.840     Enter State::GetOperation REPLICA
dcpromoui 810.E14 003F 14:49:10.840     Enter GetForestName Houston.contoso.com
dcpromoui 810.E14 0040 14:49:10.840       Enter MyDsGetDcName
dcpromoui 810.E14 0041 14:49:10.840         Enter MyDsGetDcName2
dcpromoui 810.E14 0042 14:49:10.840           Calling DsGetDcName
dcpromoui 810.E14 0043 14:49:10.840           ComputerName : (null)
dcpromoui 810.E14 0044 14:49:10.840           DomainName   : Houston.contoso.com
dcpromoui 810.E14 0045 14:49:10.840           DomainGuid   : (null)
dcpromoui 810.E14 0046 14:49:10.840           SiteName     : (null)
dcpromoui 810.E14 0047 14:49:10.840           Flags        : 0x40000000
dcpromoui 810.E14 0048 14:49:10.841           HRESULT = 0x00000000
dcpromoui 810.E14 0049 14:49:10.842           DomainControllerName    : \\USHOUDC100.Houston.contoso.com
dcpromoui 810.E14 004A 14:49:10.842           DomainControllerAddress : \\10.131.18.10
dcpromoui 810.E14 004B 14:49:10.842           DomainGuid              : {DD7C193F-9912-4E8F-A310-EA750D8329D4}
dcpromoui 810.E14 004C 14:49:10.842           DomainName              : Houston.contoso.com
dcpromoui 810.E14 004D 14:49:10.842           DnsForestName           : contoso.com
dcpromoui 810.E14 004E 14:49:10.842           Flags                   : 0xE000F1FD:
dcpromoui 810.E14 004F 14:49:10.842           DcSiteName              : USHouston
dcpromoui 810.E14 0050 14:49:10.842           ClientSiteName          : USSaltLakeCity
dcpromoui 810.E14 0051 14:49:10.842     using forest name contoso.com
dcpromoui 810.E14 0052 14:49:10.842     Enter State::GetOperation REPLICA
dcpromoui 810.E14 0053 14:49:10.842     Enter State::SetForestName contoso.com
dcpromoui 810.E14 0054 14:49:10.842     Enter State::SetTargetDomainName Houston.contoso.com
dcpromoui 810.E14 0055 14:49:10.842     Enter CheckUserIsLocal
dcpromoui 810.E14 0056 14:49:10.842     Enter State::GetOperation REPLICA
dcpromoui 810.E14 0057 14:49:10.842     Enter State::ReadDomains
dcpromoui 810.E14 0058 14:49:10.842       Enter State::GetTargetDomainName
dcpromoui 810.E14 0059 14:49:10.842         Enter State::GetOperation REPLICA
dcpromoui 810.E14 005A 14:49:10.842         target domain name: Houston.contoso.com
dcpromoui 810.E14 005B 14:49:10.842       Enter CDomains::ReadDomains
dcpromoui 810.E14 005C 14:49:10.842         Enter MyDsEnumerateDomainTrusts
dcpromoui 810.E14 005D 14:49:10.842           Enter GetDcName
dcpromoui 810.E14 005E 14:49:10.842             Enter GetDcName2
dcpromoui 810.E14 005F 14:49:10.842               Enter MyDsGetDcName2
dcpromoui 810.E14 0060 14:49:10.842                 Calling DsGetDcName
dcpromoui 810.E14 0061 14:49:10.842                 ComputerName : (null)
dcpromoui 810.E14 0062 14:49:10.842                 DomainName   : Houston.contoso.com
dcpromoui 810.E14 0063 14:49:10.842                 DomainGuid   : (null)
dcpromoui 810.E14 0064 14:49:10.842                 SiteName     : (null)
dcpromoui 810.E14 0065 14:49:10.842                 Flags        : 0x40000011
dcpromoui 810.E14 0066 14:49:11.020                 HRESULT = 0x00000000
dcpromoui 810.E14 0067 14:49:11.020                 DomainControllerName    : \\ushoudc102.Houston.contoso.com
dcpromoui 810.E14 0068 14:49:11.020                 DomainControllerAddress : \\10.131.18.12
dcpromoui 810.E14 0069 14:49:11.020                 DomainGuid              : {DD7C193F-9912-4E8F-A310-EA750D8329D4}
dcpromoui 810.E14 006A 14:49:11.020                 DomainName              : Houston.contoso.com
dcpromoui 810.E14 006B 14:49:11.020                 DnsForestName           : contoso.com
dcpromoui 810.E14 006C 14:49:11.020                 Flags                   : 0xE000F1FC:
dcpromoui 810.E14 006D 14:49:11.020                 DcSiteName              : USHouston
dcpromoui 810.E14 006E 14:49:11.020                 ClientSiteName          : USSaltLakeCity
dcpromoui 810.E14 006F 14:49:11.020               Enter Computer::RemoveLeadingBackslashes \\ushoudc102.Houston.contoso.com
dcpromoui 810.E14 0070 14:49:11.020               ushoudc102.Houston.contoso.com
dcpromoui 810.E14 0071 14:49:11.020           Enter AutoWNetConnection::Init
dcpromoui 810.E14 0072 14:49:11.020             Enter AutoWNetConnection::CloseExistingConnection
dcpromoui 810.E14 0073 14:49:11.020             The current user security context is being used therefore there is no need to establish a connection.
dcpromoui 810.E14 0074 14:49:11.020             HRESULT = 0x00000000
dcpromoui 810.E14 0075 14:49:11.920           NetStatus = 1722
dcpromoui 810.E14 0076 14:49:11.920           Enter AutoWNetConnection::CloseExistingConnection
dcpromoui 810.E14 0077 14:49:11.920           HRESULT = 0x800706BA
dcpromoui 810.E14 0078 14:49:11.920         HRESULT = 0x800706BA
dcpromoui 810.E14 0079 14:49:11.920         HRESULT = 0x800706BA
dcpromoui 810.E14 007A 14:49:11.920     failed trying to read domains, returned 0x800706BA
dcpromoui 810.E14 007B 14:49:11.921     Enter GetErrorMessage 800706BA
dcpromoui 810.E14 007C 14:49:11.921   GetExistingAccountForComputerInReplicaDomain error message: The wizard cannot gain access to the list of domains in the forest.

This condition may be caused by a DNS lookup problem. For information about troubleshooting common DNS lookup problems, please see the following Microsoft Web site: http://go.microsoft.com/fwlink/?LinkId=5171

The error is:
The RPC server is unavailable.

dcpromoui 810.E14 007D 14:49:11.921   Test Failed
dcpromoui 810.E14 007E 14:49:11.921   GetExistingAccountForComputerInReplicaDomain returns exit code: 26
dcpromoui 810.E14 007F 14:49:11.921   END TEST: GetExistingAccountForComputerInReplicaDomain
dcpromoui 810.E14 0080 14:49:11.921   Enter State::UnbindFromReplicationPartnetDC

Are there any security risks in two-way trusts?

$
0
0

Hello!

Can anybody enumerate security risks two-way trusts have? Security holes?

I mean two-way trusts between two domains from different forests Windows 2003\2008.

Thank you for any info.


I opened all of these ports that i could find with few exceptions and I still can't trust a windowsserver2003r2 and windows2008r2server

$
0
0

Neither domain will trust from either end.

The domain does not exist or network or other problems are preventing the connection.

all the ports I could find in the technet article


Droid Hacker

primary dns is down

$
0
0
in my environment i have a two dns server one is primary zone and another is secondary zone.as we know sencondary zone hold the copy of primary zone and its only readable not writable but if my primary zone dns is down the how should i edit the secondary zone

Abp


I'm confused

$
0
0

My computer is 2 months old. When I opened it and registered and connected to the FIOS router, I clicked to connect to devices, thinking I would only connect to the tv and vcr, however it downloaded an old laptop's information that I had years ago. I have done nothing but change passwords and account names in a desperate struggle to remove myself from spyware and viruses that were teeming in that old laptop. No viruses or spyware is being found, but yet my laptop is constantly running a marathon and it is full of groups and users and I seem to be in a classroom...........I'm quite certain I qualify for preschool computer class, but no one told me about it.  Should I have brought the crayons or the paste? I'm completely spent. You'll find me at the windowsill eating paint chips, while I wait for my 2014 laptop to update it's 1996 drivers :)

Oh...and another thing....who are you people and how did I get here?

DCDIAG question

$
0
0

I have 4 2003 DC's that i am running dcdiag on in preperation for an upgrade to a 2012 forest. The forest and domain are at a 2003 level. So far everything is looking good but i do not know what this is. Can someone tell me what this information from DCDIAG means? Also what I need to do to make this come up properly.

Thanks for your help.

Starting test: Replications
         * Replications Check
         * Replication Latency Check
            DC=ForestDnsZones,DC=domain,DC=com
               Latency information for 6 entries in the vector were ignored.
                  6 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC). 
            DC=DomainDnsZones,DC=Domain,DC=com
               Latency information for 6 entries in the vector were ignored.
                  6 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC). 
            CN=Schema,CN=Configuration,DC=Domain,DC=com
               Latency information for 6 entries in the vector were ignored.
                  6 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC). 
            CN=Configuration,DC=Domain,DC=com
               Latency information for 6 entries in the vector were ignored.
                  6 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC). 
            DC=Domain,DC=com
               Latency information for 6 entries in the vector were ignored.
                  6 were retired Invocations.  0 were either: read-only replicas and are not verifiably latent, or dc's no longer replicating this nc.  0 had no latency information (Win2K DC). 


Thanks for your help

Utilising ADFS to authenticate a machine

$
0
0
Is there any way to utilize ADFS 3.0 to authenticate the machine connecting by the certificate it has? My Security Manager wants this to be part of the authentication of who is connecting

Wrong fSMORoleOwner attribute value

$
0
0

Hello,
I have two Domain Controllers DC01 and DC02, members ofdomain.local and child.domain.local respectively.

DC01 has all FSMO roles (netdom query fsmo). Looking at fSMORoleOwnerattribute under the path CN=Infrastructure,DC=ForestDnsZones,DC=domain,DC=local it refers to DC02 instead of DC01 (FSMO roles). 

Question: could I change it manually ?

Notes:

  • Same fSMORoleOwner attribute value under the path CN=Infrastructure,DC=DomainDnsZones,DC=domain,DC=localis pointing to DC01 (rightly)
  • Script fixfsmo.vbs (Microsoft Support http://support.microsoft.com/kb/949257) doesn't help because it fix the attribute if current FSMO server was deleted but it isn't

Thank you,
Luca


Disclaimer: This posting is provided AS IS with no warranties or guarantees, and confers no rights. Whenever you see a helpful reply, click on [Vote As Help] and click on [Mark As Answer] if a post answers your question.

Using AD authentication without "logon to" permission

$
0
0

Hello

I want to authenticate users by Active Directory (from a web application). It works fine
 but it needs users to have "logon to" permission to the web server or the client they use..
I think there should be other ways without giving such permission to all users.
Can any body help me?


Viewing all 31638 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>