Solved

How do you force a workstation to use a particular BDC?

Posted on 2004-04-30
6
220 Views
Last Modified: 2010-03-18
I have a bunch of computers in a remote office along with a BDC in that office.  They are on a different subnet from the PDC and across a much slower connection.  But for some reason if the network between them is down, none of those computers can login.  They can get to the machine no problem because all of their files are stored there.  How do I tell which DC a computer will log in to, and how do I force a change if it's using the wrong one?

Thanks
0
Comment
Question by:bennybutler
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 4

Expert Comment

by:averyb
ID: 10961338
The tool you want is setprfdc.

It is included in Windows NT Service Pack 4; not in the Resource Kit.

This article has information about it
http://www.winnetmag.com/Windows/Article/ArticleID/4804/4804.html


0
 
LVL 4

Expert Comment

by:averyb
ID: 10961384
0
 
LVL 1

Author Comment

by:bennybutler
ID: 11321130
I didn't clarify that this was a windows 2000 active directory, not an NT4 domain.

The solution to the probelm was to tell the bdc to be a global catalog server.
0
 

Accepted Solution

by:
modulo earned 0 total points
ID: 11425687
PAQed, with points refunded (125)

modulo
Community Support Moderator
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question