Windows 2000 Domain, Win2k/Exch2k on the DC, upgrading to Win 2003 Domain: 1 Exch 2003 Serv, 1 Windows 2003 DC Serv

Posted on 2006-04-11
Last Modified: 2010-04-13

I have a client who has 3 servers in their Windows 2000 Domain.  The domain controller is currently running Exchange 2000 on it.  The current server is old, and Exchange is approaching the limit, so I am replacing the single DC with two servers: one server will be a dedicated Win 2003 DC, pretty much nothing else on it maybe some file shares, the other will be an Exchange 2003 server.  

What should I upgrade first, the Domain or Exchange?  Any recommended articles?  The existing Windows 2000 DC will not be upgraded to Windows 2003, if anything it will just become a file server.  Do I have to demote that machine after the domain is upgraded to Windows 2003, can you do that with Exchange still on it?

Question by:darrin-miller
    1 Comment
    LVL 5

    Accepted Solution

    You first need to run adprep on your W2K server to extend the schema to support a W2K3 server as a DC. If you get W2K3 R2, then you'll need to run the adprep off disk 2, which is a whole other topic. Simple, just hidden until you know to use disk 2.

    At that point, join your W2K3 servers to the domain, promote them to be DCs, and maybe move the FSMO roles to your main one.

    On your new exchange server, the install for Exch2003 into an Exch2000 organization is pretty painless. The are both pretty close underneath. Just put the CD in a walk through the wizard. If you had exchange 5.5, it is a little more involved.

    Once you have Exch2003 installed, be sure to apply SP2. Since you are pushing the limits of Exch2000 right now, I'm guessing you're at the 16GB limit. There is a new default limit of 18GB in Exch2003, but with a registry key, can be set up to 75 GB.

    When you are all done, you don't have to demote the old W2K server. I'd leave it as a DC just so you have another copy of the AD replica.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
    Digital marketing agencies have encountered both the opportunities and difficulties that emerge from working with a wide-ranging organizations.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now