Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to remove a non-existant BDC from FRS

Posted on 2008-10-07
2
Medium Priority
?
498 Views
Last Modified: 2012-05-05
Nearly a year ago our BDC crashed and burned. The server itself was replaced. I never did promote the new fileserver to a BDC and I've seen errors in the event viewer regarding FRS trying to replicate with the now non-existent BDC. I removed every trace of the old server from AD and DNS but apparently this isnt where FRS info is stored because I still saw errors trying to replicate with the old server.

Now I believe we're experiencing problems with AD because (I assume) FRS has reached a limitation in errors/attempts.

How might I go about removing the DC knowledge of the now non-existent BDC server so this issue doesnt repeat?
0
Comment
Question by:waltb123
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 22660536
Treat it as a failed DC and follow the instructions at http://www.petri.co.il/delete_failed_dcs_from_ad.htm
0
 

Author Closing Comment

by:waltb123
ID: 31503886
Thank you kindly. Awesome website btw.
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question