Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Remove lingering object

Posted on 2007-12-05
1
Medium Priority
?
847 Views
Last Modified: 2011-10-03
I'm having replication problems that appear to be related to a lingering object - a printer I removed physically from our network. I have tried running repadmin but just can't seem to get the syntax correct. Need some guidance please.
0
Comment
Question by:joecochran
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 26

Accepted Solution

by:
Pber earned 1000 total points
ID: 20457092
I assume you are attempting this:
http://technet2.microsoft.com/windowsserver/en/library/fd758463-dd8c-4b6e-a26d-643912b013411033.mspx?
mfr=true

The syntax would be:
repadmin /removelingeringobjects ServerName ServerGUID DirectoryPartition /advisory_mode

Use this to find the DC guid: http://support.microsoft.com/kb/224544
The DirectoryPartition would be the domain partition as printer objects are sub-objects of computer objects.
Thus:  DC=yourdomain,DC=com
The "/advisory_mode" just lets you see the changes but won't perform the action.

The whole thing would be:
repadmin /removelingeringobjects yourDCname e99e82d5-deed-11d2-b15c-00c04f5cb503
 dc=yourdomain,dc=com /advisory_mode

the above example just has a sample guid.




0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question