Solved

Changing forests

Posted on 2001-06-27
4
179 Views
Last Modified: 2010-04-13
I purchased a new server, installed Active Directory and had it join my existing forest as an additional Domain Controller.   I setup users and security policies.  I would like to move these (server, users, and policies) to a new forest, and take down the old forest, without losing the users and security policies that I have created.  If there is a way to backup the policies and users, that solution would work for me as well, because then Active Directory could just be removed/installed again.  Thank-you
0
Comment
Question by:stavesacre
4 Comments
 

Expert Comment

by:citadelgrad
ID: 6232760
You can use the Backup utility in 2000 to backup the system state with backups up the active directory and other critical system files.
0
 
LVL 12

Accepted Solution

by:
Housenet earned 100 total points
ID: 6233447
stavesacre as you probably know, no tools exist that will make this easy for you.. You can export & import users using ldifde, it does not do the password though.

-This article has a command line example to export users. I tried it, it works.
http://support.microsoft.com/support/kb/articles/Q237/6/77.ASP
-Policies is a whole other issue. I dont know of a tool that can export the domain policy, or domain security policy to a different forest..
http://www.microsoft.com/windows2000/techinfo/reskit/tools/existing/fazam2000-o.asp allows you to import & export to the same domain.. I dont think it would help you but you might as well be aware of its existance..
-You might have to go the long way, which is.. Look at a policy... Go to a catagory...right click ->export ... or note the settings in the policies on paper manually.
0
 
LVL 5

Expert Comment

by:cempasha
ID: 8237066
Dear questionner/expert(s)

No comment has been added lately, so it's time to clean up this TA.
I'll leave a recommendation in the Cleanup topic area that this question is to be:

- Answered by: Housenet

Please leave any comments here within the next seven days.

==> PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER ! <==

PaSHa

Cleanup volunteer



0
 

Expert Comment

by:modulo
ID: 8280142
Finalized as proposed

modulo

Community Support Moderator
Experts Exchange
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now