Solved

using CSVDE to update proxyAddresses

Posted on 2008-10-20
2
2,501 Views
Last Modified: 2012-05-05
using CSVDE I've exported a csv file.
I've deleted all columns except for:

DNobjectClass
distinguishedNameproxyAddresses
sAMAccountName


I've revised the contents of the proxyAddresses and now would like to import
(really update) it to modify the contents of the proxyAddresses field.

but the error msg I get is as follows:

csvde -i -f imp.csv
Connecting to "(null)"
Logging in as current user using SSPI
Importing directory from file "imp.csv"
Loading entries.
Add error on line 2: Already Exists
The server side error is "The specified account already exists."
0 entries modified successfully.
An error has occurred in the program
No log files were written.  In order to generate a log file, please
specify the log file path via the -j option.


thank you.
0
Comment
Question by:rastafaray
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 31

Accepted Solution

by:
Henrik Johansson earned 250 total points
ID: 22766955
You can only insert/import new imports with CSVDE, but not update objects that already exist.
To update, you nead to use LDIFDE as described in KB. Same syntax for arguments of both commands, so you can first do an export with 'ldifde -f export.ldf'.
http://support.microsoft.com/kb/313823

0
 
LVL 70

Expert Comment

by:KCTS
ID: 22767035
CSVDE cannot modify objects - you need to use LDIFDE (or DSMOD or a VBSCRPT)
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question