Rejoining removed DC controller after hardware failure / removal

Posted on 2006-04-19
Last Modified: 2010-04-13
We had a hardware crash on a domain controller in a mixed mode Win2K. It looked grim for the machine, so we removed it from the Active Directory with ntdsutil. The machine has a global catalog but no FMSO roles. I walked through the process with MS support, and we did a thorough removal.

The hardware was repaired, and to my great surprise, the data survived the RAID controller failure.

I'd like to rejoin to the domain. My recollection from the MS guy was that all that was required was to hook it back in after at least one complete replication cycle.

Is it really that easy?
Question by:Tsdjws
    LVL 48

    Accepted Solution

    Hi Tsdjws,

    make sure that your current machine holds no roles still - if there is any on it then your network will fall over when you add it back in

    i tke it you seized all the FSMO roles with MS over the phone onto the current DC, you need to run ntdsutil on the old DC as well if you havent so far :)

    LVL 48

    Expert Comment


    but besides that yup, it is that easy

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How your wiki can always stay up-to-date

    Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
    - Increase transparency
    - Onboard new hires faster
    - Access from mobile/offline

    NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    This video discusses moving either the default database or any database to a new volume.

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now