Solved

Using netdom for workstation renames creates duplicate dns or host names?

Posted on 2006-10-31
6
519 Views
Last Modified: 2008-01-09
Hi,
If I use netdom to rename a workstation, I can ping both the old and new computernames indefinitely.  I don't know how to get rid of the old names, and I don't know how to prevent this from happening.

Thanks
0
Comment
Question by:reduakm
  • 3
  • 2
6 Comments
 
LVL 16

Expert Comment

by:Wadski
Comment Utility
It would be best to clear the redundant entries out of your DNS server unless you need to keep them there for reference.

0
 
LVL 1

Author Comment

by:reduakm
Comment Utility
How would I do that?  But I guess what is more important to me is being able to use netdom without this happening.  If I rename a pc from the pc, I am fine.  I renamed a pc with netdom about a month ago and the old name still exists in addition to the new name.
0
 
LVL 8

Expert Comment

by:xxgenius
Comment Utility
Are there two names in Active Directory Users and Computers listed?  Does one have a red X on it?
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 16

Accepted Solution

by:
Wadski earned 250 total points
Comment Utility
Renaming the PC with netdom in effect forces the rename without performing a proper 'handover' of the name in the Active directory.

Your specific error is because the name entries in the DNS Server both point to the smae IP address therefore both will reply to the ping.  If you manage the DNS entries on the DNS you will be able to find these entries and remove them without bother.


0
 
LVL 1

Author Comment

by:reduakm
Comment Utility
Oh, so I guess for me it would be more of a hassle to use netdom.  How would I be able to remove the names from dns?  The only place that I know to look is under forward lookup zones, and I only see the new computer names.

Thanks again
0
 
LVL 1

Author Comment

by:reduakm
Comment Utility
It seems to have gone away after some time.  This is fine with me!
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now