?
Solved

ADSIedit and AD schema mmc

Posted on 2007-11-21
3
Medium Priority
?
1,622 Views
Last Modified: 2012-05-05
can someone explain to me when should we use ADSIedit mmc and when to use AD SChema mmc?
thanks
0
Comment
Question by:jskfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 48

Assisted Solution

by:Jay_Jay70
Jay_Jay70 earned 600 total points
ID: 20332107
preferably never :)

ADSIEDIT is usually the best way to get in remove stuffed or dead objects from AD

Schema MMC should not be touched lightly..this is used to actually extend the schema - add custom attributes and fields etc

both can be exceedingly dangerous
0
 
LVL 30

Accepted Solution

by:
LauraEHunterMVP earned 800 total points
ID: 20332214
ADSI Edit - manually create/edit/delete objects in any naming context - Schema, Domain, Configuration.

AD Schema MMC - only used to create/edit objects in the Schema NC.

And, as Jay mentions, both can cause nasty effects on your AD infrastructure since you are making manual edits and working completely "without a net" - IOW, if your first question after reading the above is "What's a naming context?", probably better to stick to those administrative tools that have more safety measures involved, a la AD Users & Computers.
0
 
LVL 11

Assisted Solution

by:bsharath
bsharath earned 600 total points
ID: 20332360
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question