Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Computer naming

Posted on 2007-03-27
5
Medium Priority
?
234 Views
Last Modified: 2010-03-18
At my company, after we join a new computer to the net work, we rename it based on a naming convention.

CC-CEN-WS15 or CC-CEN-WS16

Now that we've been open a while, I'd like to fill in the holes, ( we only have 80 PC's, and we have computer names like CC-CEN-WS105 )

But when I try to rename a computer with a number that I know is not in use, it tells me it is. How do I delete these dummy computer names?

we are running server 2003 W/ AD

thanks
0
Comment
Question by:centurian102
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 27

Expert Comment

by:Jason Watkins
ID: 18801562
Clear the NetBIOS name server cache on the DC, and restart WINS (if it is in use).  
0
 

Author Comment

by:centurian102
ID: 18801569
Sorry....Where and how?
0
 
LVL 27

Accepted Solution

by:
Jason Watkins earned 375 total points
ID: 18801800
0
 
LVL 85

Expert Comment

by:oBdA
ID: 18802074
These are probably machines that have been in use at some point and got replaced. Make sure that the machine with the new name is really not existing, then delete the respective computer object from AD (in the Computers container if you left them there, otherwise in whichever OU you're placing your machines).
0
 
LVL 27

Expert Comment

by:Jason Watkins
ID: 18802560
Thanks for the points, did it do the trick?

/F
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question