Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to remove a non-existant BDC from FRS

Posted on 2008-10-07
2
Medium Priority
?
497 Views
Last Modified: 2012-05-05
Nearly a year ago our BDC crashed and burned. The server itself was replaced. I never did promote the new fileserver to a BDC and I've seen errors in the event viewer regarding FRS trying to replicate with the now non-existent BDC. I removed every trace of the old server from AD and DNS but apparently this isnt where FRS info is stored because I still saw errors trying to replicate with the old server.

Now I believe we're experiencing problems with AD because (I assume) FRS has reached a limitation in errors/attempts.

How might I go about removing the DC knowledge of the now non-existent BDC server so this issue doesnt repeat?
0
Comment
Question by:waltb123
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 22660536
Treat it as a failed DC and follow the instructions at http://www.petri.co.il/delete_failed_dcs_from_ad.htm
0
 

Author Closing Comment

by:waltb123
ID: 31503886
Thank you kindly. Awesome website btw.
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question