demoting old 2000 DC....

Posted on 2005-04-07
Last Modified: 2010-04-10
I have a 2000 DC which used to be the only one in the domain.
I have since brought up a 2003 DC and then transfered all the roles, but if I turn the old 2000 one off, exchange will start prompting people for their passwords and everything will stop working.
Is this just because the 2003 DC is trying to replicate with the 2000 one and it's not there, or are there some 'leftovers' that need to be removed before I do the demotion of the 2000 DC?
Question by:wlandymore
    LVL 8

    Expert Comment

    Did you also do a dcpromo to demote the 2000 DC?  Can you check your DNS for your AD site and see what machine is referenced under_tcp

    If you've properly removed the 2000 dc then it shouldn't show up at all.  These records tell certain services which server to point to.

    You also need to ensure that the 2003dc is also the global catalog holder, a quick search in help will reveal where to find this.  Hint--->it is in AD Sites and Services.

    Good luck
    LVL 1

    Author Comment

    I already ran the dcpromo and it seemed to take almost everything out. However, there is something that the exchange server is still pointing to the old 2000 DC for because exchange is still prompting for a password all the time and won't open up the mail box,even though the password is correct.

    The DNS is gone and I looked through the registry and references to the old 2000 DC are gone too.

    I don't know what setting is still left that's pointing to this machine....
    LVL 1

    Author Comment


    This was all because of a DNS entry. Someone had taken out the entry for the 2003 DC so it was only looking for the old 2000 DC DNS in the TCP/IP properties of the exchange server. It started failing badly when it had no DNS, etc.
    Once I deleted the old entry and put in the entry for the 2003 DC everything started working well.

    LVL 8

    Expert Comment

    I don't have a problem with that.

    Accepted Solution

    Question answered by asker or dialog deemed valuable.
    Closed, 125 points refunded.
    ee_ai_construct (replacement part #xm34)
    Community Support Admin

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Join & Write a Comment

    Some time ago I was asked to set up a web portal PC to put at our entrance. When customers arrive, they could see a webpage 'promoting' our company. So I tried to set up a windows 7 PC as a kiosk PC.......... I will spare you all the annoyances I…
    Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    731 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now