Solved

Syncronization of W2K server with NT4 server

Posted on 2004-04-13
1
218 Views
Last Modified: 2010-04-13
I have an NT4 Server running as a PDC.  I also have a W2K server on the same network.  I plan to shut down the NT4 box.  I have set up a 2 way trust and I can sucessfully access both servers.  How can I replecate the user accounts from the Nt4 box to the W2K server?
0
Comment
Question by:TShafer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 16

Accepted Solution

by:
JamesDS earned 125 total points
ID: 10820923
TShafer

I am assuming the W2k box is an AD server - you can't migrate from a domain to a standalone server without recreating the user accounts from scratch.

To migrate to a NEW AD domain without upgrading the existing NT4 domain you will need to use ADMT - The Active Directory Migration Tool.

Start here and read on:
http://www.microsoft.com/technet/prodtechnol/windows2000serv/downloads/w2kadmt.mspx

Alternatively, you can do the following:
Rebuild W2k box as NT4 BDC
Perform in-place OS upgrade of BDC to W2k with AD and once the accounts are transferred over, kill the old PDC

Cheers

JamesDS
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
If you need a simple but flexible process for maintaining an audit trail of who created, edited, or deleted data from a table, or multiple tables, and you can do all of your work from within a form, this simple Audit Log will work for you.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question